773 resultados para DDoS attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Migraine causes crippling attacks of severe head pain along with associated nausea, vomiting, photophobia and/or phonophobia. The aim of this study was to investigate single nucleotide polymorphisms (SNPs) in the adenosine deaminase, RNA-specific, B1 (ADARB1)and adenosine deaminase, RNA specific, B2 (ADARB2) genes in an Australian case-control Caucasian population for association with migraine. Both candidate genes are highly expressed in the central nervous system (CNS) and fit criteria for migraine neuropathology. SNPs in the ADARB2 gene were previously found to be positively associated with migraine in a pedigree-based GWAS using the genetic isolate of Norfolk Island, Australia. The ADARB1 gene was also chosen for investigation due to its important function in editing neurotransmitter receptor transcripts. Methods: Four SNPs in ADARB1 and nine in ADARB2 were selected by inspecting blocks of LD in Haploview for genotyping using either TaqMan or Sequenom assays. These SNPs were genotyped in two-hundred and ninety one patients who satisfied the International Classification of Headache Disorders, ICHD-II 2004 diagnostic criteria for migraine and three-hundred and fourteen controls and PLINK was used for association testing. Results: Chi-square (χ2) analysis found no significant association between any of the SNPs tested in the ADARB1 and ADARB2 genes in this study and the occurrence of migraine. Conclusions: In contrast to findings that SNPs in the ADARB2 gene were positively associated with migraine in the Norfolk Island population, we find no evidence to support the involvement of RNA editing genes in migraine susceptibility in an Australian Caucasian population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Testing the strategies of discourse and materiality, this practice-based and practice-led research experiments with how anonymous storytelling by vulnerable communities, like that of the sexual minorities and their allies in Malaysia, can better speak to their human rights issues without further subjecting them to personal attacks and targetted persecution. The research identifies the critical role of the voice in lending authenticity and credibility to first person narratives; and contextual credibility as a form of credibility which personal stories naturally aspire to achieve with audiences. Adopting a discursive view of persuasion and recognising too that the power of persuasion may in effect lie with those who receive these stories rather than with those who tell them, the insights and knowledge gained from the research informed the development of the field output, Persuasive Storytelling by Vulnerable Communities in Aggressive Contexts: A Human Rights Communication Framework.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first evidence for interspecific warfare in bees, a spectacular natural phenomenon that involves a series of aerial battles and leads to thousands of fatalities from both attacking and defending colonies. Molecular analysis of fights at a hive of the Australian stingless bee Tetragonula carbonaria revealed that the attack was launched by a related species, Tetragonula hockingsi, which has only recently extended its habitat into southeastern Queensland. Following a succession of attacks by the same T. hockingsi colony over a 4-month period, the defending T. carbonaria colony was defeated and the hive usurped, with the invading colony installing a new queen. We complemented our direct observations with a 5-year study of more than 260 Tetragonula hives and found interspecific hive changes, which were likely to be usurpation events, occurring in 46 hives over this period. We discuss how fighting swarms and hive usurpation fit with theoretical predictions on the evolution of fatal fighting and highlight the many unexplained features of these battles that warrant further study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigates the use of fusion techniques and mathematical modelling to increase the robustness of iris recognition systems against iris image quality degradation, pupil size changes and partial occlusion. The proposed techniques improve recognition accuracy and enhance security. They can be further developed for better iris recognition in less constrained environments that do not require user cooperation. A framework to analyse the consistency of different regions of the iris is also developed. This can be applied to improve recognition systems using partial iris images, and cancelable biometric signatures or biometric based cryptography for privacy protection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a message when the source’s presentation appears to be credible. However, many factors can impact the perceived credibility of a source, depending on its type and the characteristics of the environment. Our previous research showed that there are four dimensions of source credibility in terms of social engineering on Facebook: perceived sincerity, perceived competence, perceived attraction, and perceived worthiness. Because the dimensionalities of source credibility as well as their measurement scales can fluctuate from one type of source to another and from one type of context to another, our aim in this study includes validating the existence of those four dimensions toward the credibility of social engineering attackers on Facebook and developing a valid measurement scale for every dimension of them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Atheromatous plaque rupture h the cause of the majority of strokes and heart attacks in the developed world. The role of calcium deposits and their contribution to plaque vulnerability are controversial. Some studies have suggested that calcified plaque tends to be more stable whereas others have suggested the opposite. This study uses a finite element model to evaluate the effect of calcium deposits on the stress within the fibrous cap by varying their location and size. Plaque fibrous cap, lipid pool and calcification were modeled as hyperelastic, Isotropic, (nearly) incompressible materials with different properties for large deformation analysis by assigning time-dependent pressure loading on the lumen wall. The stress and strain contours were illustrated for each condition for comparison. Von Mises stress only increases up to 1.5% when varying the location of calcification in the lipid pool distant to the fibrous cap. Calcification in the fibrous cap leads to a 43% increase of Von Mises stress when compared with that in the lipid pool. An increase of 100% of calcification area leads to a 15% stress increase in the fibrous cap. Calcification in the lipid pool does not increase fibrous cap stress when it is distant to the fibrous cap, whilst large areas of calcification close to or in the fibrous cap may lead to a high stress concentration within the fibrous cap, which may cause plaque rupture. This study highlights the application of a computational model on a simulation of clinical problems, and it may provide insights into the mechanism of plaque rupture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reactions of terminal borylene complexes of the type [CpFe(CO)(2)(BNR2)](+) (R = `Pr, Cy) with heteroallenes have been investigated by quantum-chemical methods, in an attempt to explain the experimentally observed product distributions. Reaction with dicyclohexylcarbodiimide (CyNCNCy) gives a bis-insertion product, in which 1 equiv of carbodiimide is assimilated into each of the Fe=B and B=N double bonds to form a spirocyclic boronium system. In contrast, isocyanates (R'NCO, R' = Ph, 2,6-wXy1, CY; XYl = C6H3Me2) react to give isonitrile complexes of the type [CpFe(CO)(2)(CNR')]+, via a net oxygen abstraction (or formal metathesis) process. Both carbodiimide and socyanate substrates are shown to prefer initial attack at the Fe=B bond rather than the B=N bond of the borylene complex. Further mechanistic studies reveal that the carbodiimide reaction ultimately leads to the bis-insertion compounds [CpFe(CO)(2)C(NCy)(2)B(NCY)(2)CNR2](+), rather than to the isonitrile system [CpFe(CO)(2)(CNCy)](+), on the basis of both thermodynamic (product stability) and kinetic considerations (barrier heights). The mechanism of the initial carbodiimide insertion process is unusual in that it involves coordination of the substrate at the (borylene) ligand followed by migration of the metal fragment, rather than a more conventional process: i.e., coordination of the unsaturated substrate at the metal followed by ligand migration. In the case of isocyanate substrates, metathesis products are competitive with those from the insertion pathway. Direct, single-step metathesis reactivity to give products containing a coordinated isonitrile ligand (i.e. [CpFe(CO)(2)(CNR')](+)) is facile if initial coordination of the isocyanate at boron occurs via the oxygen donor (which is kinetically favored); insertion chemistry is feasible when the isocyanate attacks initially via the nitrogen atom. However, even in the latter case, further reaction of the monoinsertion product so formed with excess isocyanate offers a number of facile (low energetic barrier) routes which also generate ['CpFe(CO)(2)(CNR')](+), rather than the bis-insertion product [CpFe(CO)(2)C(NR')(O)B(NR')(O)CNR2](+) (i.e., the direct analogue of the observed products in the carbodiimide reaction).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Underground tunnels are vulnerable to terrorist attacks which can cause collapse of the tunnel structures or at least extensive damage, requiring lengthy repairs. This paper treats the blast impact on a reinforced concrete segmental tunnel buried in soil under a number of parametric conditions; soil properties, soil cover, distance of explosive from the tunnel centreline and explosive weight and analyses the possible failure patterns. A fully coupled Fluid Structure Interaction (FSI) technique incorporating the Arbitrary Lagrangian-Eulerian (ALE) method is used in this study. Results indicate that the tunnel in saturated soil is more vulnerable to severe damage than that buried in either partially saturated soil or dry soil. The tunnel is also more vulnerable to surface explosions which occur directly above the centre of the tunnel than those that occur at any equivalent distances in the ground away from the tunnel centre. The research findings provide useful information on modeling, analysis, overall tunnel response and failure patterns of segmented tunnels subjected to blast loads. This information will guide future development and application of research in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the research on the Continuation War, interest in the events themselves had exceeded the interest in military planning. Careful consideration has not been given to the planning process and the options that were available. This study shows how the planning of these operations was carried out and identifies the persons responsible. Contrary to earlier research this study shows that persons other than Field-Marshal Carl Gustaf Mannerheim and Quartermaster-General Aksel Airo took part in the planning. Furthermore, the plan was to carry out the operations further east than was ultimately done. The operation plans were coordinated by the Operations Department of Headquarters, which had the opportunity to influence on both Mannerheim and Airo. Part of the actual planning was made outside Headquarters, but final decisions were taken at Headquarters. It is worth observing that many times Mannerheim asked President Risto Ryti for his opinion concerning these operations. The Germans tried to influence the Finnish plans, but the Finns took their decisions independently, although they took German requests into account. It is well-known that the attack by the Finnish forces was stopped at the end of the year 1941. It is less well-known that the Finns planned new attacks until the autumn of 1942. At that point the Finns were convinced that the Germans would lose the war. The Finns were thus prepared to keep advancing should the Germans progress in the direction of Leningrad. This study shows that the Finnish military leaders worked for Finland s own plans and their cooperation with the Germans was directed to achieving this goal. In other words, Finland tried expand eastward with the help of the Germans. This purpose was particularly evident in the planning of the operations in the Hanko district and the Karelian Isthmus in the summer and autumn of 1941, in the Sorokka district in the spring of 1942 and around Lake Ladoga in the summer and autumn of 1942. The Finns reduced their activities when Germans took over responsibility for the operations. However, at the same time the Finns tried to support Germans in passive ways. The Finns justified the decrease in their activities with lack of Finnish forces and numerous defeats. Earlier research has shown that Finland was an active operator in the Continuation War and tried to take back the areas lost in the Winter War. In this study that view becomes more precise and clear especially with regard to Field-Marshal Mannerheim and other high military leaders. There is clear indication that the Finns would have attacked much further east had a German success made such an attack possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In my master thesis I analyse Byzantine warfare in the late period of the empire. I use military operations between Byzantines and crusader Principality of Achaia (1259–83) as a case study. Byzantine strategy was based (in “oriental manner”) on using ambushes, diplomacy, surprise attacks, deception etc. Open field battles that were risky in comparison with their benefits were usually avoided, but the Byzantines were sometimes forced to seek open encounter because their limited ability to keep strong armies in field for long periods of time. Foreign mercenaries had important place in Byzantine armies and they could simply change sides if their paymasters ran out of resources. The use of mercenaries with short contracts made it possible that the composition of an army was flexible but on the other hand heterogeneous – in result Byzantine armies were sometimes ineffective and prone to confusion. In open field battles Byzantines used formation that was made out from several lines placed one after another. This formation was especially suitable for cavalry battles. Byzantines might have also used other kinds of formations. The Byzantines were not considered equal to Latins in close combat. West-Europeans saw mainly horse archers and Latin mercenaries on Byzantine service as threats to themselves in battle. The legitimacy of rulers surrounding the Aegean sea was weak and in many cases political intrigues and personal relationships can have resolved the battles. Especially in sieges the loyalty of population was decisive. In sieges the Byzantines used plenty of siege machines and archers. This made fast conquests possible, but it was expensive. The Byzantines protected their frontiers by building castles. Military operations against the Principality of Achaia were mostly small scale raids following an intensive beginning. Byzantine raids were mostly made by privateers and mountaineers. This does not fit to the traditional picture that warfare belonged to the imperial professional army. It’s unlikely that military operations in war against the Principality of Achaia caused great demographic or economic catastrophe and some regions in the warzone might even have flourished. On the other hand people started to concentrate into villages which (with growing risks for trade) probably caused disturbance in economic development and in result birth rates might have decreased. Both sides of war sought to exchange their prisoners of war. These were treated according to conventional manners that were accepted by both sides. It was possible to sell prisoners, especially women and children, to slavery, but the scale of this trade does not seem to be great in military operations treated in this theses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of the immune system is to protect an organism against pathogens while maintaining tolerance against self. T cells are an essential component of the immune system and they develop in the thymus. The AIRE (autoimmune regulator) gene product plays an important role in T cell development, as it promotes expression of peripheral tissue antigens in the thymus. Developing T cells, thymocytes, which recognize self-antigens with high affinity are deleted. However, this deletion process is not perfect and not all autoreactive T cells are destroyed. When the distinction between self and non-self fails, tolerance breaks and the immune system attacks the host s own tissues. This results in autoimmunity. Regulatory T cells contribute to the maintenance of self-tolerance. They can actively suppress the function of autoreactive cells. Several populations of cells with regulatory properties have been described, but the best characterized population is the natural regulatory T cells (Treg cells), which develop in the thymus and express the transcription factor FOXP3. The thymic development of Treg cells in humans is the subject of this thesis. Thymocytes at different developmental stages were analyzed using flow cytometry. The CD4-CD8- double-negative (DN) thymocytes are the earliest T cell precursors in the T cell lineage. My results show that the Treg cell marker FOXP3 is up-regulated already in a subset of these DN thymocytes. FOXP3+ cells were also found among the more mature CD4+CD8+ double-positive (DP) cells and among the CD4+ and CD8+ single-positive (SP) thymocytes. The different developmental stages of the FOXP3+ thymocytes were isolated and their gene expression examined by quantitative PCR. T cell receptor (TCR) repertoire analysis was used to compare these different thymocyte populations. My data show that in humans commitment to the Treg cell lineage is an early event and suggest that the development of Treg cells follows a linear developmental pathway, FOXP3+ DN precursors evolving through the DP stage to become mature CD4+ Treg cells. Most T cells have only one kind of TCR on their cell surface, but a small fraction of cells expresses two different TCRs. My results show that the expression of two different TCRs is enriched among Treg cells. Furthermore, both receptors were capable of transmitting signals when bound by a ligand. By extrapolating flow cytometric data, it was estimated that the majority of peripheral blood Treg cells are indeed dual-specific. The high frequency of dual-specific cells among human Treg cells suggests that dual-specificity has a role in directing these cells to the Treg cell lineage. It is known that both genetic predisposition and environmental factors influence the development of autoimmunity. It is also known that the dysfunction or absence of Treg cells leads to the development of autoimmune manifestations. APECED (autoimmune polyendocrinopathy-candidiasis-ectodermal dystrophy) is a rare monogenic autoimmune disease, caused by mutations in the AIRE gene. In the absence of AIRE gene product, deletion of self-specific T cells is presumably disturbed and autoreactive T cells escape to the periphery. I examined whether Treg cells are also affected in APECED. I found that the frequency of FOXP3+ Treg cells and the level of FOXP3 expression were significantly lower in APECED patients than in controls. Additionally, when studied in cell cultures, the suppressive capacity of the patients' Treg cells was impaired. Additionally, repertoire analysis showed that the TCR repertoire of Treg cells was altered. These results suggest that AIRE contributes to the development of Treg cells in humans and the selection of Treg cells is impaired in APECED patients. In conclusion, my thesis elucidates the developmental pathway of Treg cells in humans. The differentiation of Tregs begins early during thymic development and both the cells dual-specificity and AIRE probably affect the final commitment of Treg cells.