971 resultados para security protocols
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.
Resumo:
We report the experimental demonstration of two quantum networking protocols, namely quantum 1 -> 3 telecloning and open-destination teleportation, implemented using a four-qubit register whose state is encoded in a high-quality two-photon hyperentangled Dicke state. The state resource is characterized using criteria based on multipartite entanglement witnesses. We explore the characteristic entanglement-sharing structure of a Dicke state by implementing high-fidelity projections of the four-qubit resource onto lower-dimensional states. Our work demonstrates for the first time the usefulness of Dicke states for quantum information processing.
Resumo:
Epidemiological studies show that elevated plasma levels of advanced glycation end products (AGEs) are associated with diabetes, kidney disease, and heart disease. Thus AGEs have been used as disease progression markers. However, the effects of variations in biological sample processing procedures on the level of AGEs in plasma/serum samples have not been investigated. The objective of this investigation was to assess the effect of variations in blood sample collection on measured Ne_(carboxy-methyl)lysine (CML), the best characterised AGE, and its homolog, Ne_(carboxyethyl)lysine (CEL). The investigation examined the effect on CML and CEL of different blood collection tubes, inclusion of a stabilising cocktail, effect of freeze thaw cycles, different storage times and temperatures, and effects of delaying centrifugation on a pooled sample from healthy volunteers. CML and CEL were measured in extracted samples by ultra_performance liquid chromatography-tandem mass spectrometry. Median CML and CEL ranged from 0.132 to 0.140 mM/M lys and from 0.053 to 0.060 mM/M lys, respectively. No significant difference was shown CML or CEL in plasma/serum samples. Therefore samples collected as part of epidemiological studies that do not undergo specific sample treatment at collection are suitable for measuring CML and CEL.
Resumo:
In clinical trials, the selection of appropriate outcomes is crucial for the assessment of whether one intervention is better than another. Selection of inappropriate outcomes can compromise the utility of a trial. However, the process of selecting the most suitable outcomes to include can be complex. Ideally, glaucoma trials aim to evaluate important outcomes for clinicians and patients. A high variability in the selection of outcomes suggests that there is no consensus on how best to evaluate the effect of glaucoma interventions. Further, it makes evidence synthesis difficult. The purpose of this review is to determine the extent of clinical outcome measures used in published glaucoma Cochrane Reviews and Protocols.
Resumo:
The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.
Resumo:
Going beyond the association between youth exposure to political violence and psychopathology, the current article examines within-person change in youth strength of identity with their ethno-political group and youth reports of the insecurity in their communities. Conceptually related but growing out of different paradigms, both group identity and emotional insecurity have been examined as key variables impacting youth responses to threats from other group members. The goal of the current study is to review previous studies examining these two key variables and to contribute new analyses, modeling within-person change in both variables and examining covariation in their growth. The current article uses data from 823 Belfast adolescents over 4 years. The results suggest youth are changing linearly over age in both constructs and that there are ethno-political group differences in how youth are changing. The results also indicate that change in insecurity is related to strength of identity at age 18, and strength of identity and emotional insecurity are related at age 18. Implications and directions for future work in the area of youth and political violence are discussed. © 2014 American Psychological Association.
Resumo:
African coastal regions are expected to experience the highest rates of population growth in coming decades. Fresh groundwater resources in the coastal zone of East Africa (EA) are highly vulnerable to seawater intrusion. Increasing water demand is leading to unsustainable and ill-planned well drilling and abstraction. Wells supplying domestic, industrial and agricultural needs are or have become, in many areas, too saline for use. Climate change, including weather changes and sea level rise, is expected to exacerbate this problem. The multiplicity of physical, demographic and socio-economic driving factors makes this a very challenging issue for management. At present the state and probable evolution of coastal aquifers in EA are not well documented. The UPGro project 'Towards groundwater security in coastal East Africa' brings together teams from Kenya, Tanzania, Comoros Islands and Europe to address this knowledge gap. An integrative multidisciplinary approach, combining the expertise of hydrogeologists, hydrologists and social scientists, is investigating selected sites along the coastal zone in each country. Hydrogeologic observatories have been established in different geologic and climatic settings representative of the coastal EA region, where focussed research will identify the current status of groundwater and identify future threats based on projected demographic and climate change scenarios. Researchers are also engaging with end users as well as local community and stakeholder groups in each area in order to understanding the issues most affecting the communities and searching sustainable strategies for addressing these.
Resumo:
In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.
Resumo:
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.
Resumo:
The burial of objects (human remains, explosives, weapons) below or behind concrete, brick, plaster or tiling may be associated with serious crime and are difficult locations to search. These are quite common forensic search scenarios but little has been published on them to-date. Most documented discoveries are accidental or from suspect/witness testimony. The problem in locating such hidden objects means a random or chance-based approach is not advisable. A preliminary strategy is presented here, based on previous studies, augmented by primary research where new technology or applications are required. This blend allows a rudimentary search workflow, from remote desktop study, to non-destructive investigation through to recommendations as to how the above may inform excavation, demonstrated here with a case study from a homicide investigation. Published case studies on the search for human remains demonstrate the problems encountered when trying to find and recover sealed-in and sealed over locations. Established methods include desktop study, photography, geophysics and search dogs:these are integrated with new technology (LiDAR and laser scanning; photographic rectification; close quarter aerial imagery; ground-penetrating radar on walls and gamma-ray/neutron activation radiography) to propose this possible search strategy.
Resumo:
Epidemiological studies show that elevated plasma levels of advanced glycation end products (AGEs) are associated with diabetes, kidney disease, and heart disease. Thus AGEs have been used as disease progression markers. However, the effects of variations in biological sample processing procedures on the level of AGEs in plasma/serum samples have not been investigated. The objective of this investigation was to assess the effect of variations in blood sample collection on measured N (ε)-(carboxymethyl)lysine (CML), the best characterised AGE, and its homolog, N (ε)-(carboxyethyl)lysine (CEL). The investigation examined the effect on CML and CEL of different blood collection tubes, inclusion of a stabilising cocktail, effect of freeze thaw cycles, different storage times and temperatures, and effects of delaying centrifugation on a pooled sample from healthy volunteers. CML and CEL were measured in extracted samples by ultra-performance liquid chromatography-tandem mass spectrometry. Median CML and CEL ranged from 0.132 to 0.140 mM/M lys and from 0.053 to 0.060 mM/M lys, respectively. No significant difference was shown CML or CEL in plasma/serum samples. Therefore samples collected as part of epidemiological studies that do not undergo specific sample treatment at collection are suitable for measuring CML and CEL.