930 resultados para stealthy attack
Resumo:
Several insectivorous bats have included fish in their diet, yet little is known about the processes underlying this trophic shift. We performed three field experiments with wild fishing bats to address how they manage to discern fish from insects and adapt their hunting technique to capture fish. We show that bats react only to targets protruding above the water and discern fish from insects based on prey disappearance patterns. Stationary fish trigger short and shallow dips and a terminal echolocation pattern with an important component of the narrowband and low frequency calls. When the fish disappears during the attack process, bats regulate their attack increasing the number of broadband and high frequency calls in the last phase of the echolocation as well as by lengthening and deepening their dips. These adjustments may allow bats to obtain more valuable sensorial information and to perform dips adjusted to the level of uncertainty on the location of the submerged prey. The observed ultrafast regulation may be essential for enabling fishing to become cost-effective in bats, and demonstrates the ability of bats to rapidly modify and synchronise their sensorial and motor features as a response to last minute stimulus variations.
Resumo:
A detailed study on arsenical creosote with reference to leaching, corrosion and anti-borer properties was carried out. Results showed that aging had very little effect on the preservative which suggested better fixation of the preservative into the wood. Corrosion of mild steel, galvanised iron, aluminium-magnesium alloy (M57S) and copper panels in the preservative was found to be negligible. Normal creosote and low temperature creosote of Regional Research Laboratory, Hyderabad, both fortified with arsenic trioxide resisted borer damage on wooden panels for a period of over five months in the port of Cochin. The performance of low temperature creosote fortified with arsenic was found to be equally satisfactory when compared to normal creosote fortified in the same manner. A loading of 208.6 Kgs/ml³ for Haldu (Adina cordifolia) and 138 Kgs/m³ for Mango (Mangifera indica) in the case of normal creosote and 177 Kgs/m³ for Mango the case of RRL creosote were found to be sufficient for treating the wood.
Resumo:
Due to their potential for significant fuel consumption savings, Counter-Rotating Open Rotors (CRORs) are currently being considered as an alternative to high-bypass turbofans. When CRORs are mounted on an aircraft, several 'installation effects' arise which are not present when the engine is operated in isolation. This paper investigates how flow features arising from one such effect - The angle-of-attack of the engine centre-line relative to the oncoming flow - can influence the design of CROR engines. Three-dimensional full-annulus unsteady CFD simulations are used to predict the time-varying flow field experienced by each rotor and emphasis is put on the interaction of the frontrotor wake and tip vortex with the rear-rotor. A parametric study is presented that quantifies the rotorrotor interaction as a function of the angle-of-attack. It is shown that angle-of-attack operation significantly changes the flow field and the unsteady lift on both rotors. In particular, a frequency analysis shows that the unsteady lift exhibits sidebands around the rotor-rotor interaction frequencies. Further, a non-linear increase in the total rear-rotor tip unsteadiness is observed for moderate and high angles-of-attack. The results presented in this paper demonstrate that common techniques used to mitigate CROR noise, such as modifying the rotor-rotor axial spacing and rear-rotor crop, can not be applied correctly unless angle-of-attack effects are taken into account. Copyright © 2012 by ASME.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
IEEE Computer Society
Resumo:
Background Good blood pressure (BP) control reduces the risk of recurrence of stroke/transient ischaemic attack (TIA). Although there is strong evidence that BP telemonitoring helps achieve good control, none of the major trials have considered the effectiveness in stroke/TIA survivors. We therefore conducted a feasibility study for a trial of BP telemonitoring for stroke/ TIA survivors with uncontrolled BP in primary care. Method Phase 1 was a pilot trial involving 55 patients stratified by stroke/TIA randomised 3:1 to BP telemonitoring for 6 months or usual care. Phase 2 was a qualitative evaluation and comprised semi-structured interviews with 16 trial participants who received telemonitoring and 3 focus groups with 23 members of stroke support groups and 7 carers. Results Overall, 125 patients (60 stroke patients, 65 TIA patients) were approached and 55 (44%) patients were randomised including 27 stroke patients and 28 TIA patients. Fifty-two participants (95%) attended the 6-month follow-up appointment, but one declined the second daytime ambulatory blood pressure monitoring (ABPM) measurement resulting in a 93% completion rate for ABPM − the proposed primary outcome measure for a full trial. Adherence to telemonitoring was good; of the 40 participants who were telemonitoring, 38 continued to provide readings throughout the 6 months. There was a mean reduction of 10.1 mmHg in systolic ABPM in the telemonitoring group compared with 3.8 mmHg in the control group, which suggested the potential for a substantial effect from telemonitoring. Our qualitative analysis found that many stroke patients were concerned about their BP and telemonitoring increased their engagement, was easy, convenient and reassuring Conclusions A full-scale trial is feasible, likely to recruit well and have good rates of compliance and follow-up.
Resumo:
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Dis-tributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traf-fic flows. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. One of the techniques to which attackers are returning to is DDoS amplification attacks. Amplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Proto-col (TFTP). This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. Mitigation methods to this threat have also been consid-ered and a variety of countermeasures are proposed. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. While it has been reported that the breaching of TFTP would be possible (Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification.
Resumo:
Our research was conducted to improve the timeliness, coordination, and communication during the detection, investigation and decision-making phases of the response to an aerosolized anthrax attack in the metropolitan Washington, DC, area with the goal of reducing casualties. Our research gathered information of the current response protocols through an extensive literature review and interviews with relevant officials and experts in order to identify potential problems that may exist in various steps of the detection, investigation, and response. Interviewing officials from private and government sector agencies allowed the development of a set of models of interactions and a communication network to identify discrepancies and redundancies that would elongate the delay time in initiating a public health response. In addition, we created a computer simulation designed to model an aerosol spread using weather patterns and population density to identify an estimated population of infected individuals within a target region depending on the virulence and dimensions of the weaponized spores. We developed conceptual models in order to design recommendations that would be presented to our collaborating contacts and agencies that would use such policy and analysis interventions to improve upon the overall response to an aerosolized anthrax attack, primarily through changes to emergency protocol functions and suggestions of technological detection and monitoring response to an aerosolized anthrax attack.