872 resultados para Panic attacks
Resumo:
Pós-graduação em Saúde Coletiva - FMB
Resumo:
OBJECTIVES: The objectives of this study were to verify the degree of anxiety, respiratory distress, and health-related quality of life in a group of asthmatic patients who have experienced previous panic attacks. Additionally, we evaluated if a respiratory physiotherapy program (breathing retraining) improved both asthma and panic disorder symptoms, resulting in an improvement in the health-related quality of life of asthmatics. METHODS: Asthmatic individuals were assigned to a chest physiotherapy group that included a breathing retraining program held once a week for three months or a paired control group that included a Subtle Touch program. All patients were assessed using the Diagnostic and Statistical Manual of Mental Disorders IV, the Sheehan Anxiety Scale, the Quality of Life Questionnaire, and spirometry parameter measurements. RESULTS: Both groups had high marks for panic disorder and agoraphobia, which limited their quality of life. The Breathing Retraining Group program improved the clinical control of asthma, reduced panic symptoms and agoraphobia, decreased patient scores on the Sheehan Anxiety Scale, and improved their quality of life. Spirometry parameters were unchanged. CONCLUSION: Breathing retraining improves the clinical control of asthma and anxiety symptoms and the health-related quality of life in asthmatic patients.
Resumo:
BACKGROUND: Anti-NMDA receptor encephalitis is an autoimmune disease that was identified in 2007, and manifests in a stepwise manner with psychiatric, neurological and autonomic symptoms. The disease is caused by autoantibodies against NMDA receptors. It can have a paraneoplastic origin, mainly secondary to ovarian teratomas, but it can also be unrelated to the tumor. This disease can affect both sexes and all ages. CASE PRESENTATION: Here, we present a case of a 15 year-old female adolescent with first-episode psychosis with anti-NMDA receptor encephalitis not related to tumor, which manifested with delusion, hallucinations, panic attacks, agitation, and neurological symptoms, and later with autonomic instability. She was treated with immunotherapy and psychiatric medication resulting in improvement of her main psychiatric and neurological symptoms. CONCLUSION: Our main objective in presenting this case is to alert clinicians to this challenging and recent disease that has a clinical presentation that might resemble a functional psychiatric condition and can be underdiagnosed in the context of child and adolescent psychiatry
Resumo:
Dissertação de Mestrado apresentada no ISPA - Instituto Universitário
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.