681 resultados para Malware attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Es descriu el disseny i posterior implementació de la nova plataforma d’automatització del servei ofert per Internet Security Auditors, S.L. destinada a l’anàlisi de dominis d’Internet amb la finalitat de detectar possibles infeccions que afectin a usuaris de la web. El sistema actual conté algunes deficiències, de manera que aquest text presenta una nova versió, la qual aporta millores molt significatives com ara una gestió més òptima, o un disseny renovat i escalable de la informació i els diferents processos. Així mateix es dota al sistema d’un control d’errors centralitzat, amb enviament d’alàrmes en temps real, i una agrupació i centralització dels resultats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: To highlight meningoencephalitis as a transient ischaemic attack (TIA) mimic and suggest clinical clues for differential diagnosis. METHODS: This was an observational study of consecutively admitted patients over a 9.75-year period presenting as TIAs at a stroke unit. RESULTS: A total of 790 patients with TIAs and seven with TIA-like symptoms but a final diagnosis of viral meningoencephalitis were recognised. The most frequent presentations of meningoencephalitis patients were acute sensory hemisyndrome (6) and cognitive deficits (5). Signs of meningeal irritation were minor or absent on presentation. Predominantly lymphocytic pleocytosis, hyperproteinorachia and a normal cerebrospinal fluid (CSF)/serum glucose index (in 5 out of 6 documented patients) were present. Meningeal thickening on a brain magnetic resonance imaging (MRI) scan was the only abnormal imaging finding. Six patients received initial vascular treatment; one thrombolysed. Finally, six patients were treated with antivirals and/or antibiotics. Although neither bacterial nor viral agents were identified on extensive testing, viral meningoencephalitis was the best explanation for all clinical and laboratory findings. CONCLUSIONS: Aseptic meningoencephalitis should be part of the differential diagnosis in patients presenting as TIA. The threshold for a lumbar puncture in such patients should be set individually and take into account the presence of mild meningeal symptoms, age and other risk factors for vascular disease, the results of brain imaging and the basic diagnostic work-up for a stroke source.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract-Due to the growing use of biometric technologies inour modern society, spoofing attacks are becoming a seriousconcern. Many solutions have been proposed to detect the use offake "fingerprints" on an acquisition device. In this paper, wepropose to take advantage of intrinsic features of friction ridgeskin: pores. The aim of this study is to investigate the potential ofusing pores to detect spoofing attacks.Results show that the use of pores is a promising approach. Fourmajor observations were made: First, results confirmed that thereproduction of pores on fake "fingerprints" is possible. Second,the distribution of the total number of pores between fake andgenuine fingerprints cannot be discriminated. Third, thedifference in pore quantities between a query image and areference image (genuine or fake) can be used as a discriminatingfactor in a linear discriminant analysis. In our sample, theobserved error rates were as follows: 45.5% of false positive (thefake passed the test) and 3.8% of false negative (a genuine printhas been rejected). Finally, the performance is improved byusing the difference of pore quantity obtained between adistorted query fingerprint and a non-distorted referencefingerprint. By using this approach, the error rates improved to21.2% of false acceptation rate and 8.3% of false rejection rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aquest document mostra els resultats d'una recerca basada en un cas d'estudi on s'avalua la fortalesa de dos comunitats de programari lliure. L'avaluació d'aquesta fortalesa es du a terme amb una exploració que té com a objectiu esbrinar si aquestes comunitats acompleixen una sèrie de procediments que les ajuden a protegir-se davant d'atacs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Economists have recently turned their attention to the effects of terrorism. One much debated effect of terrorist attacks is its impact on the results of democratic elections. We use the electoral consequences of the terrorist attacks of the 11-M in Madrid to analyze this issue. We consider this particular experiment since the attack took place only three days before the 2004 Congressional Election, which allows the use of credible identification criteria. In particular, we use the advance voting by Spanish residents abroad, who cast their vote before the terrorist attack, to identify the effect of the bombing. We exploit this macabre natural experiment to run a difference-in-differences estimation using data on three consecutive Congressional elections. Our empirical results indicate that a terrorist attack can have a large impact on the outcome of democratic elections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hereditary angioedema is a disease which develops as a result of a deficiency or dysfonction of C1-inhibitor, a key regulator of the complement, coagulation and contact cascades, resulting among others in excessive release of bradykinin. This disease mortality rate is high in absence of immediate and effective treatment, in particular in presence of acute attacks of the upper respiratory tract (laryngeal edema). Until now only administration of a purified C1-inhibitor extract was effective against these symptoms. This paper aims to synthesise essentials knowledge concerning news drugs, in particular icatibant, a selective bradykinin B2- receptor antagonist whose use should be widened to the treatment of angioedema with ACE-inhibitors intolerance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Familial Hemiplegic Migraine (FHM), characterized by a prolonged unilateral hemiparesis, mainly results from mutations in the alpha-1a subunit of the calcium channel gene CACNA1A that can also cause two other dominantly inherited neurological disorders, Episodic Ataxia type 2 (EA2, with sometimes migrainous headaches) and Spinocerebellar Ataxia type 6 (SCA6, late-onset and progressive). A same mutation can have different clinical expression in a family (hemiplegic migraine, migraine-coma, cerebellar ataxia). CACNA1A mutations in FHM are usually missense, leading to gain-of-function, while truncating mutations leading to loss-of-function are usually associated with EA2. Case report: This 9-year-old girl was seen as a baby for hypotonia and transient vertical nystagmus. Her first brain MRI was normal. She evolved as a congenital ataxia, but since the age of two, she had attacks of coma, hemiparesis (either side), partial seizures, dystonic movements and fever. Attacks were initially triggered by minor head bumps, subsequently spontaneous. Brain MRIs in the acute stage always showed transient unilateral hemisphere swelling. Follow-up images revealed atrophic lesions in the temporo-occipital regions and cerebellar atrophy. A prophylactic trial with flunarizine was ineffective. Acetazolamide was recently introduced. Methods: Since our patient shared features of both FHM and EA2, we studied the CACNA1A gene by direct sequencing in the patient's and parents' DNA. Results: We identified an unreported de novo heterozygous deletion of three base pairs (c.4503_4505delCTT) predicting the deletion of one amino acid (p.Phe1502del). The CACNA1A protein contains 4 domains, each formed by six transmembrane segments. The deletion is located in a highly conserved region in segment 6 (S6) of the third domain. Mutations in S6 segments of calcium channels change single-channel conductance and channel selectivity, most resulting in loss-of-function. Outlook: In vitro expression studies of the identified mutation are underway, aiming at understanding its functional consequences and finding an efficient treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to assess the vulnerabilities of a high resolution fingerprint sensor when confronted with fake fingerprints. The study has not been focused on the decision outcome of the biometric device, but essentially on the scores obtained following the comparison between a query (genuine or fake) and a template using an AFIS system. To do this, fake fingerprints of 12 subjects have been produced with and without their cooperation. These fake fingerprints have been used alongside with real fingers. The study led to three major observations: First, genuine fingerprints produced scores higher than fake fingers (translating a closer proximity) and this tendency is observed considering each subject separately. Second, scores are however not sufficient as a single measure to differentiate these samples (fake from genuine) given the variation due to the donors themselves. That explains why fingerprint readers without vitality detection can be fooled. Third, production methods and subjects greatly influence the scores obtained for fake fingerprints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Työn tarkoituksena on tutkia pinon ylikirjoitukseen perustuvien hyökkäysten toimintaa ja osoittaa kokeellisesti nykyisten suojaustekniikoiden olevan riittämättömiä. Tutkimus suoritetaan testaamalla miten valitut tietoturvatuotteet toimivat eri testitilanteissa. Testatut tuotteet ovat Openwall, PaX, Libsafe 2.0 ja Immunix 6.2. Testaus suoritetaan pääasiassa RedHat 7.0 ympäristössä testiohjelman avulla. Testeissä mitataan sekä tuotteiden kyky havaita hyökkäyksiä että niiden nopeusvaikutukset. Myös erityyppisten hyökkäysten ja niitä vastaan kehitettyjen metodien toimintaperiaatteet esitellään seikkaperäisesti ja havainnollistetaan yksinkertaistetuilla esimerkeillä. Esitellyt tekniikat sisältävät puskurin ylivuodot, laittomat muotoiluparametrit, loppumerkittömät merkkijonot ja taulukoiden ylivuodot. Testit osoittavat, etteivät valitut tuotteet estä kaikkia hyökkäyksiä, joten lopuksi perehdytään myös vahinkojen minimointiin onnistuneiden hyökkäysten varalta.