874 resultados para Intrusion Detection Systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A proof-of-concept study was reported on analysis of antigen-antibody recognition based on resonant Rayleigh scattering response of single Au nanoparticles on a microimaging chamber. As benefited by a traditional dark-field microscope and a spectrograph, tiny 30 nm Au nanoparticles were effectively used as nanosensors to monitor changes in refractive index induced by every single binding of the adsorbates. The individual Au nanoparticles were observed with very high signal-to-noise ratio, and a LSPR ?max shift of about 2.5 nm accounting for the detection of PSA antigen with concentration as low as 0.1 pg ml-1 was recorded. This resulted in the successful demonstration of a non-labelling detection system for proteins as well as thousands of different chemical or biological species with possibility of miniaturization and multiplexing scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose the inverse Gaussian distribution, as a less complex alternative to the classical log-normal model, to describe turbulence-induced fading in free-space optical (FSO) systems operating in weak turbulence conditions and/or in the presence of aperture averaging effects. By conducting goodness of fit tests, we define the range of values of the scintillation index for various multiple-input multiple-output (MIMO) FSO configurations, where the two distributions approximate each other with a certain significance level. Furthermore, the bit error rate performance of two typical MIMO FSO systems is investigated over the new turbulence model; an intensity-modulation/direct detection MIMO FSO system with Q-ary pulse position modulation that employs repetition coding at the transmitter and equal gain combining at the receiver, and a heterodyne MIMO FSO system with differential phase-shift keying and maximal ratio combining at the receiver. Finally, numerical results are presented that validate the theoretical analysis and provide useful insights into the implications of the model parameters on the overall system performance. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We show that the use of probabilistic noiseless amplification in entangled coherent state-based schemes for the test of quantum nonlocality provides substantial advantages. The threshold amplitude to falsify a Bell-CHSH nonlocality test, in fact, is significantly reduced when amplification is embedded into the test itself. Such a beneficial effect holds also in the presence of detection inefficiency. Our study helps in affirming noiseless amplification as a valuable tool for coherent information processing and the generation of strongly nonclassical states of bosonic systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The management of non-functional features (performance, security, power management, etc.) is traditionally a difficult, error prone task for programmers of parallel applications. To take care of these non-functional features, autonomic managers running policies represented as rules using sensors and actuators to monitor and transform a running parallel application may be used. We discuss an approach aimed at providing formal tool support to the integration of independently developed autonomic managers taking care of different non-functional concerns within the same parallel application. Our approach builds on the Behavioural Skeleton experience (autonomic management of non-functional features in structured parallel applications) and on previous results on conflict detection and resolution in rule-based systems. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a preliminary study of developing a novel distributed adaptive real-time learning framework for wide area monitoring of power systems integrated with distributed generations using synchrophasor technology. The framework comprises distributed agents (synchrophasors) for autonomous local condition monitoring and fault detection, and a central unit for generating global view for situation awareness and decision making. Key technologies that can be integrated into this hierarchical distributed learning scheme are discussed to enable real-time information extraction and knowledge discovery for decision making, without explicitly accumulating and storing all raw data by the central unit. Based on this, the configuration of a wide area monitoring system of power systems using synchrophasor technology, and the functionalities for locally installed open-phasor-measurement-units (OpenPMUs) and a central unit are presented. Initial results on anti-islanding protection using the proposed approach are given to illustrate the effectiveness.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Passive person detection and localization is an emerging area in UWB localization systems, whereby people are not required to carry any UWB ranging device. Based on experimental data, we propose a novel method to detect static persons in the absence of template waveforms, and to compute distances to these persons. Our method makes very little assumptions on the environment and can achieve ranging performances on the order of 50 cm, using off-the-shelf UWB devices. © 2013 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Currently there is extensive theoretical work on inconsistencies in logic-based systems. Recently, algorithms for identifying inconsistent clauses in a single conjunctive formula have demonstrated that practical application of this work is possible. However, these algorithms have not been extended for full knowledge base systems and have not been applied to real-world knowledge. To address these issues, we propose a new algorithm for finding the inconsistencies in a knowledge base using existing algorithms for finding inconsistent clauses in a formula. An implementation of this algorithm is then presented as an automated tool for finding inconsistencies in a knowledge base and measuring the inconsistency of formulae. Finally, we look at a case study of a network security rule set for exploit detection (QRadar) and suggest how these automated tools can be applied.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a new technique for the detectionof islanding conditions in electrical power systems. This problem isespecially prevalent in systems with significant penetrations of distributedrenewable generation. The proposed technique is based onthe application of principal component analysis (PCA) to data setsof wide-area frequency measurements, recorded by phasor measurementunits. The PCA approach was able to detect islandingaccurately and quickly when compared with conventional RoCoFtechniques, as well as with the frequency difference and change-ofangledifference methods recently proposed in the literature. Thereliability and accuracy of the proposed PCA approach is demonstratedby using a number of test cases, which consider islandingand nonislanding events. The test cases are based on real data,recorded from several phasor measurement units located in theU.K. power system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper argues that biometric verification evaluations can obscure vulnerabilities that increase the chances that an attacker could be falsely accepted. This can occur because existing evaluations implicitly assume that an imposter claiming a false identity would claim a random identity rather than consciously selecting a target to impersonate. This paper shows how an attacker can select a target with a similar biometric signature in order to increase their chances of false acceptance. It demonstrates this effect using a publicly available iris recognition algorithm. The evaluation shows that the system can be vulnerable to attackers targeting subjects who are enrolled with a smaller section of iris due to occlusion. The evaluation shows how the traditional DET curve analysis conceals this vulnerability. As a result, traditional analysis underestimates the importance of an existing score normalisation method for addressing occlusion. The paper concludes by evaluating how the targeted false acceptance rate increases with the number of available targets. Consistent with a previous investigation of targeted face verification performance, the experiment shows that the false acceptance rate can be modelled using the traditional FAR measure with an additional term that is proportional to the logarithm of the number of available targets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We report on a pilot study of a novel observing technique, defocussed transmission spectroscopy, and its application to the study of exoplanet atmospheres using ground-based platforms. Similar to defocussed photometry, defocussed transmission spectroscopy has an added advantage over normal spectroscopy in that it reduces systematic errors due to flat-fielding, PSF variations, slit-jaw imperfections and other effects associated with ground-based observations. For one of the planetary systems studied, WASP-12b, we report a tentative detection of additional Na absorption of 0.12+/-0.03[+0.03]% during transit using a 2A wavelength mask. After consideration of a systematic that occurs mid-transit, it is likely that the true depth is actually closer to 0.15%. This is a similar level of absorption reported in the atmosphere of HD209458b (0.135+/-0.017%, Snellen et al. 2008). Finally, we outline methods that will improve the technique during future observations, based on our findings from this pilot study.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Freshwater and brackish microalgal toxins, such as microcystins, cylindrospermopsins, paralytic toxins, anatoxins or other neurotoxins are produced during the overgrowth of certain phytoplankton and benthic cyanobacteria, which includes either prokaryotic or eukaryotic microalgae. Although, further studies are necessary to define the biological role of these toxins, at least some of them are known to be poisonous to humans and wildlife due to their occurrence in these aquatic systems. The World Health Organization (WHO) has established as provisional recommended limit 1 μg of microcystin-LR per liter of drinking water. In this work we present a microsphere-based multi-detection method for five classes of freshwater and brackish toxins: microcystin-LR (MC-LR), cylindrospermopsin (CYN), anatoxin-a (ANA-a), saxitoxin (STX) and domoic acid (DA). Five inhibition assays were developed using different binding proteins and microsphere classes coupled to a flow-cytometry Luminex system. Then, assays were combined in one method for the simultaneous detection of the toxins. The IC50's using this method were 1.9 ± 0.1 μg L−1 MC-LR, 1.3 ± 0.1 μg L−1 CYN, 61 ± 4 μg L−1 ANA-a, 5.4 ± 0.4 μg L−1 STX and 4.9 ± 0.9 μg L−1 DA. Lyophilized cyanobacterial culture samples were extracted using a simple procedure and analyzed by the Luminex method and by UPLC–IT-TOF-MS. Similar quantification was obtained by both methods for all toxins except for ANA-a, whereby the estimated content was lower when using UPLC–IT-TOF-MS. Therefore, this newly developed multiplexed detection method provides a rapid, simple, semi-quantitative screening tool for the simultaneous detection of five environmentally important freshwater and brackish toxins, in buffer and cyanobacterial extracts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While virtualisation can provide many benefits to a networks infrastructure, securing the virtualised environment is a big challenge. The security of a fully virtualised solution is dependent on the security of each of its underlying components, such as the hypervisor, guest operating systems and storage.

This paper presents a single security service running on the hypervisor that could potentially work to provide security service to all virtual machines running on the system. This paper presents a hypervisor hosted framework which performs specialised security tasks for all underlying virtual machines to protect against any malicious attacks by passively analysing the network traffic of VMs. This framework has been implemented using Xen Server and has been evaluated by detecting a Zeus Server setup and infected clients, distributed over a number of virtual machines. This framework is capable of detecting and identifying all infected VMs with no false positive or false negative detection.