903 resultados para Fatal attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estimation of absolute risk of cardiovascular disease (CVD), preferably with population-specific risk charts, has become a cornerstone of CVD primary prevention. Regular recalibration of risk charts may be necessary due to decreasing CVD rates and CVD risk factor levels. The SCORE risk charts for fatal CVD risk assessment were first calibrated for Germany with 1998 risk factor level data and 1999 mortality statistics. We present an update of these risk charts based on the SCORE methodology including estimates of relative risks from SCORE, risk factor levels from the German Health Interview and Examination Survey for Adults 2008-11 (DEGS1) and official mortality statistics from 2012. Competing risks methods were applied and estimates were independently validated. Updated risk charts were calculated based on cholesterol, smoking, systolic blood pressure risk factor levels, sex and 5-year age-groups. The absolute 10-year risk estimates of fatal CVD were lower according to the updated risk charts compared to the first calibration for Germany. In a nationwide sample of 3062 adults aged 40-65 years free of major CVD from DEGS1, the mean 10-year risk of fatal CVD estimated by the updated charts was lower by 29% and the estimated proportion of high risk people (10-year risk > = 5%) by 50% compared to the older risk charts. This recalibration shows a need for regular updates of risk charts according to changes in mortality and risk factor levels in order to sustain the identification of people with a high CVD risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we propose a model for intelligent agents (sensors) on a Wireless Sensor Network to guard against energy-drain attacks in an energy-efficient and autonomous manner. This is intended to be achieved via an energy-harvested Wireless Sensor Network using a novel architecture to propagate knowledge to other sensors based on automated reasoning from an attacked sensor.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stealthy attackers move patiently through computer networks - taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10-20% size sampling rates without degrading the quality of detection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. The compared classification learning algorithms in this thesis are: C4.5, CART, k-NN and Naïve Bayes. The performance of these algorithms are compared with accuracy, error rate and average cost on modified versions of NSL-KDD train and test dataset where the instances are classified into normal and four cyber-attack categories: DoS, Probing, R2L and U2R. Additionally the most important features to detect cyber-attacks in all categories and in each category are evaluated with Weka’s Attribute Evaluator and ranked according to Information Gain. The results show that the classification algorithm with best performance on the dataset is the k-NN algorithm. The most important features to detect cyber-attacks are basic features such as the number of seconds of a network connection, the protocol used for the connection, the network service used, normal or error status of the connection and the number of data bytes sent. The most important features to detect DoS, Probing and R2L attacks are basic features and the least important features are content features. Unlike U2R attacks, where the content features are the most important features to detect attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introdução: A oclusão da artéria hipogástrica pode ser necessária na reparação endovascular de aneurismas da aorta abdominal (EVAR). A oclusão intencional da hipogástrica pode ter complicações isquémicas. As endopróteses de bifurcação ilíaca (IBD) surgiram como alternativa endovascular à oclusão da hipogástrica em doentes com elevado risco para isquemia pélvica. Os autores descrevem um caso de oclusão precoce do ramo hipogástrico de IBD com graves consequências clínicas. Caso clínico: Sexo masculino, de 74 anos, com aneurisma da aorta abdominal (diâmetro máximo de 55 mm) com envolvimento de ambas as bifurcações ilíacas e segmentos proximais das hipogástricas (diâmetro máximo de 31 e 32 mm), submetido a EVAR com revascularização hipogástrica esquerda via IBD (Cook Zenith®) e coiling+overstenting da artéria hipogástrica contralateral. O procedimento decorreu sem complicações e a angiografia final mostrava permeabilidade da hipogástrica revascularizada e escassa colateralidade pélvica. O pós-operatório imediato complicou-se de dor lombar e glútea bilateral associada a manifestações cutâneas isquémicas e monoparesia do membro inferior esquerdo. Por agravamento progressivo nas primeiras 24h e angioTC com oclusão do stent da hipogástrica esquerda, procedeu-se novamente a revascularização da hipogástrica, com bom resultado na angiografia final. Apesar da revascularização bem-sucedida, houve agravamento progressivo do estado geral, com isquemia pélvica irreversível e rabdomiólise. Óbito ao 5.◦dia pós-operatório. Conclusão: A isquemia pélvica aguda é uma complicação grave e frequentemente fatal que pode advir da oclusão bilateral das artérias hipogástricas. A falência da revascularização por IBD pode ser fatal, pelo que os autores aconselham um cuidado redobrado no controlo angiográfico final e um baixo limiar para investigação na suspeita de complicações pós-operatórias. Se maior risco de falência técnica, embolização ou escassa colateralidade pélvica, a preservação bilateral de fluxo nas artérias hipogástricas pode estar recomendada.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Iowa fatal crashes and fatalities for the state of Iowa in 2015.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Iowa Fatal Crashes Associated with Key Emphases - January thru December,by Iowa Dept. of Transportation - Office of Traffic and Safety

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Iowa fatal crashes and fatalities for the state of Iowa on rural interstate system from 1970-2014.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection combined with increasing volumes of web traffic from the Internet of Things (IoT), cloud-hosted and on-premise business applications have made it evident that the existing approaches of mostly static signature lack the ability to cope with novel signatures. A SQLIA detection and prevention solution can be achieved through exploring an alternative bio-inspired supervised learning approach that uses input of labelled dataset of numerical attributes in classifying true positives and negatives. We present in this paper a Numerical Encoding to Tame SQLIA (NETSQLIA) that implements a proof of concept for scalable numerical encoding of features to a dataset attributes with labelled class obtained from deep web traffic analysis. In the numerical attributes encoding: the model leverages proxy in the interception and decryption of web traffic. The intercepted web requests are then assembled for front-end SQL parsing and pattern matching by applying traditional Non-Deterministic Finite Automaton (NFA). This paper is intended for a technique of numerical attributes extraction of any size primed as an input dataset to an Artificial Neural Network (ANN) and statistical Machine Learning (ML) algorithms implemented using Two-Class Averaged Perceptron (TCAP) and Two-Class Logistic Regression (TCLR) respectively. This methodology then forms the subject of the empirical evaluation of the suitability of this model in the accurate classification of both legitimate web requests and SQLIA payloads.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A case of non-fatal drowning with a successful outcome despite a submersion time of 25 min is described. Our case report emphasizes the role of accidental hypothermia in the survival of drowning victims with hypoxic brain injury, and supports the use of therapeutic hypothermia in the resuscitation of these patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: We report a fatal case of neuroleptic malignant-like syndrome, which occurred as a consequence of paralytic bowel in a 72-year-old woman on treatment with antiparkinson medication. Case description: Contrast enhanced computerized tomography of the chest and abdomen demonstrated the presence of paralytic bowel. Results: The patient died. Conclusions: Physicians involved in the treatment of patients affected by Parkinson’s disease should take into consideration the possibility of dopaminergic drug malabsorption due to paralytic bowel as a possible cause of neuroleptic malignant-like syndrome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Voluntary methadone administration for the purpose of sedation eventually resulting in the infant's death is extremely infrequent, though it has been observed. In this report, we describe an autopsy case pertaining to a 32-month-old infant who was repeatedly exposed to methadone by his parents. Autopsy revealed a coarctation of the aorta with a focal stenosis located at the junction of the distal aortic arch and the descending aorta. Left ventricular hypertrophy was also observed. Both these findings were considered to not have played a role in the child's death. Methadone was detected in the femoral blood (0.633 mg/l), urine (5.25 mg/l), bile (2.64 mg/l), and gastric contents (1.08 mg). A segmental hair analysis showed the presence of methadone and morphine in both the proximal and distal portion of the lock. Methadone was also detected in nail samples. A segmental hair analysis performed on the younger brother of the deceased revealed the presence of methadone and morphine in both the proximal and distal segments, as well as the presence of 6-monoacetylmorphine exclusively in the distal portion. Though the parents denied any involvement in methadone administration or exposure for the purpose of sedation, the manner of death was listed as homicide. The case emphasizes the usefulness of hair analysis to identify threatening situations for the children of drug-dependent parents and possibly support measures by the authorities to recognize and intervene in these potentially fatal situations.