933 resultados para terrorist attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a message when the source’s presentation appears to be credible. However, many factors can impact the perceived credibility of a source, depending on its type and the characteristics of the environment. Our previous research showed that there are four dimensions of source credibility in terms of social engineering on Facebook: perceived sincerity, perceived competence, perceived attraction, and perceived worthiness. Because the dimensionalities of source credibility as well as their measurement scales can fluctuate from one type of source to another and from one type of context to another, our aim in this study includes validating the existence of those four dimensions toward the credibility of social engineering attackers on Facebook and developing a valid measurement scale for every dimension of them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Atheromatous plaque rupture h the cause of the majority of strokes and heart attacks in the developed world. The role of calcium deposits and their contribution to plaque vulnerability are controversial. Some studies have suggested that calcified plaque tends to be more stable whereas others have suggested the opposite. This study uses a finite element model to evaluate the effect of calcium deposits on the stress within the fibrous cap by varying their location and size. Plaque fibrous cap, lipid pool and calcification were modeled as hyperelastic, Isotropic, (nearly) incompressible materials with different properties for large deformation analysis by assigning time-dependent pressure loading on the lumen wall. The stress and strain contours were illustrated for each condition for comparison. Von Mises stress only increases up to 1.5% when varying the location of calcification in the lipid pool distant to the fibrous cap. Calcification in the fibrous cap leads to a 43% increase of Von Mises stress when compared with that in the lipid pool. An increase of 100% of calcification area leads to a 15% stress increase in the fibrous cap. Calcification in the lipid pool does not increase fibrous cap stress when it is distant to the fibrous cap, whilst large areas of calcification close to or in the fibrous cap may lead to a high stress concentration within the fibrous cap, which may cause plaque rupture. This study highlights the application of a computational model on a simulation of clinical problems, and it may provide insights into the mechanism of plaque rupture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reactions of terminal borylene complexes of the type [CpFe(CO)(2)(BNR2)](+) (R = `Pr, Cy) with heteroallenes have been investigated by quantum-chemical methods, in an attempt to explain the experimentally observed product distributions. Reaction with dicyclohexylcarbodiimide (CyNCNCy) gives a bis-insertion product, in which 1 equiv of carbodiimide is assimilated into each of the Fe=B and B=N double bonds to form a spirocyclic boronium system. In contrast, isocyanates (R'NCO, R' = Ph, 2,6-wXy1, CY; XYl = C6H3Me2) react to give isonitrile complexes of the type [CpFe(CO)(2)(CNR')]+, via a net oxygen abstraction (or formal metathesis) process. Both carbodiimide and socyanate substrates are shown to prefer initial attack at the Fe=B bond rather than the B=N bond of the borylene complex. Further mechanistic studies reveal that the carbodiimide reaction ultimately leads to the bis-insertion compounds [CpFe(CO)(2)C(NCy)(2)B(NCY)(2)CNR2](+), rather than to the isonitrile system [CpFe(CO)(2)(CNCy)](+), on the basis of both thermodynamic (product stability) and kinetic considerations (barrier heights). The mechanism of the initial carbodiimide insertion process is unusual in that it involves coordination of the substrate at the (borylene) ligand followed by migration of the metal fragment, rather than a more conventional process: i.e., coordination of the unsaturated substrate at the metal followed by ligand migration. In the case of isocyanate substrates, metathesis products are competitive with those from the insertion pathway. Direct, single-step metathesis reactivity to give products containing a coordinated isonitrile ligand (i.e. [CpFe(CO)(2)(CNR')](+)) is facile if initial coordination of the isocyanate at boron occurs via the oxygen donor (which is kinetically favored); insertion chemistry is feasible when the isocyanate attacks initially via the nitrogen atom. However, even in the latter case, further reaction of the monoinsertion product so formed with excess isocyanate offers a number of facile (low energetic barrier) routes which also generate ['CpFe(CO)(2)(CNR')](+), rather than the bis-insertion product [CpFe(CO)(2)C(NR')(O)B(NR')(O)CNR2](+) (i.e., the direct analogue of the observed products in the carbodiimide reaction).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the research on the Continuation War, interest in the events themselves had exceeded the interest in military planning. Careful consideration has not been given to the planning process and the options that were available. This study shows how the planning of these operations was carried out and identifies the persons responsible. Contrary to earlier research this study shows that persons other than Field-Marshal Carl Gustaf Mannerheim and Quartermaster-General Aksel Airo took part in the planning. Furthermore, the plan was to carry out the operations further east than was ultimately done. The operation plans were coordinated by the Operations Department of Headquarters, which had the opportunity to influence on both Mannerheim and Airo. Part of the actual planning was made outside Headquarters, but final decisions were taken at Headquarters. It is worth observing that many times Mannerheim asked President Risto Ryti for his opinion concerning these operations. The Germans tried to influence the Finnish plans, but the Finns took their decisions independently, although they took German requests into account. It is well-known that the attack by the Finnish forces was stopped at the end of the year 1941. It is less well-known that the Finns planned new attacks until the autumn of 1942. At that point the Finns were convinced that the Germans would lose the war. The Finns were thus prepared to keep advancing should the Germans progress in the direction of Leningrad. This study shows that the Finnish military leaders worked for Finland s own plans and their cooperation with the Germans was directed to achieving this goal. In other words, Finland tried expand eastward with the help of the Germans. This purpose was particularly evident in the planning of the operations in the Hanko district and the Karelian Isthmus in the summer and autumn of 1941, in the Sorokka district in the spring of 1942 and around Lake Ladoga in the summer and autumn of 1942. The Finns reduced their activities when Germans took over responsibility for the operations. However, at the same time the Finns tried to support Germans in passive ways. The Finns justified the decrease in their activities with lack of Finnish forces and numerous defeats. Earlier research has shown that Finland was an active operator in the Continuation War and tried to take back the areas lost in the Winter War. In this study that view becomes more precise and clear especially with regard to Field-Marshal Mannerheim and other high military leaders. There is clear indication that the Finns would have attacked much further east had a German success made such an attack possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In my master thesis I analyse Byzantine warfare in the late period of the empire. I use military operations between Byzantines and crusader Principality of Achaia (1259–83) as a case study. Byzantine strategy was based (in “oriental manner”) on using ambushes, diplomacy, surprise attacks, deception etc. Open field battles that were risky in comparison with their benefits were usually avoided, but the Byzantines were sometimes forced to seek open encounter because their limited ability to keep strong armies in field for long periods of time. Foreign mercenaries had important place in Byzantine armies and they could simply change sides if their paymasters ran out of resources. The use of mercenaries with short contracts made it possible that the composition of an army was flexible but on the other hand heterogeneous – in result Byzantine armies were sometimes ineffective and prone to confusion. In open field battles Byzantines used formation that was made out from several lines placed one after another. This formation was especially suitable for cavalry battles. Byzantines might have also used other kinds of formations. The Byzantines were not considered equal to Latins in close combat. West-Europeans saw mainly horse archers and Latin mercenaries on Byzantine service as threats to themselves in battle. The legitimacy of rulers surrounding the Aegean sea was weak and in many cases political intrigues and personal relationships can have resolved the battles. Especially in sieges the loyalty of population was decisive. In sieges the Byzantines used plenty of siege machines and archers. This made fast conquests possible, but it was expensive. The Byzantines protected their frontiers by building castles. Military operations against the Principality of Achaia were mostly small scale raids following an intensive beginning. Byzantine raids were mostly made by privateers and mountaineers. This does not fit to the traditional picture that warfare belonged to the imperial professional army. It’s unlikely that military operations in war against the Principality of Achaia caused great demographic or economic catastrophe and some regions in the warzone might even have flourished. On the other hand people started to concentrate into villages which (with growing risks for trade) probably caused disturbance in economic development and in result birth rates might have decreased. Both sides of war sought to exchange their prisoners of war. These were treated according to conventional manners that were accepted by both sides. It was possible to sell prisoners, especially women and children, to slavery, but the scale of this trade does not seem to be great in military operations treated in this theses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of the immune system is to protect an organism against pathogens while maintaining tolerance against self. T cells are an essential component of the immune system and they develop in the thymus. The AIRE (autoimmune regulator) gene product plays an important role in T cell development, as it promotes expression of peripheral tissue antigens in the thymus. Developing T cells, thymocytes, which recognize self-antigens with high affinity are deleted. However, this deletion process is not perfect and not all autoreactive T cells are destroyed. When the distinction between self and non-self fails, tolerance breaks and the immune system attacks the host s own tissues. This results in autoimmunity. Regulatory T cells contribute to the maintenance of self-tolerance. They can actively suppress the function of autoreactive cells. Several populations of cells with regulatory properties have been described, but the best characterized population is the natural regulatory T cells (Treg cells), which develop in the thymus and express the transcription factor FOXP3. The thymic development of Treg cells in humans is the subject of this thesis. Thymocytes at different developmental stages were analyzed using flow cytometry. The CD4-CD8- double-negative (DN) thymocytes are the earliest T cell precursors in the T cell lineage. My results show that the Treg cell marker FOXP3 is up-regulated already in a subset of these DN thymocytes. FOXP3+ cells were also found among the more mature CD4+CD8+ double-positive (DP) cells and among the CD4+ and CD8+ single-positive (SP) thymocytes. The different developmental stages of the FOXP3+ thymocytes were isolated and their gene expression examined by quantitative PCR. T cell receptor (TCR) repertoire analysis was used to compare these different thymocyte populations. My data show that in humans commitment to the Treg cell lineage is an early event and suggest that the development of Treg cells follows a linear developmental pathway, FOXP3+ DN precursors evolving through the DP stage to become mature CD4+ Treg cells. Most T cells have only one kind of TCR on their cell surface, but a small fraction of cells expresses two different TCRs. My results show that the expression of two different TCRs is enriched among Treg cells. Furthermore, both receptors were capable of transmitting signals when bound by a ligand. By extrapolating flow cytometric data, it was estimated that the majority of peripheral blood Treg cells are indeed dual-specific. The high frequency of dual-specific cells among human Treg cells suggests that dual-specificity has a role in directing these cells to the Treg cell lineage. It is known that both genetic predisposition and environmental factors influence the development of autoimmunity. It is also known that the dysfunction or absence of Treg cells leads to the development of autoimmune manifestations. APECED (autoimmune polyendocrinopathy-candidiasis-ectodermal dystrophy) is a rare monogenic autoimmune disease, caused by mutations in the AIRE gene. In the absence of AIRE gene product, deletion of self-specific T cells is presumably disturbed and autoreactive T cells escape to the periphery. I examined whether Treg cells are also affected in APECED. I found that the frequency of FOXP3+ Treg cells and the level of FOXP3 expression were significantly lower in APECED patients than in controls. Additionally, when studied in cell cultures, the suppressive capacity of the patients' Treg cells was impaired. Additionally, repertoire analysis showed that the TCR repertoire of Treg cells was altered. These results suggest that AIRE contributes to the development of Treg cells in humans and the selection of Treg cells is impaired in APECED patients. In conclusion, my thesis elucidates the developmental pathway of Treg cells in humans. The differentiation of Tregs begins early during thymic development and both the cells dual-specificity and AIRE probably affect the final commitment of Treg cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine is a common episodic neurological disorder, typically presenting with recurrent attacks of severe headache and autonomic dysfunction. Apart from rare monogenic subtypes, no genetic or molecular markers for migraine have been convincingly established. We identified the minor allele of rs1835740 on chromosome 8q22.1 to be associated with migraine (P = 5.38 x 10(-)(9), odds ratio = 1.23, 95% CI 1.150-1.324) in a genome-wide association study of 2,731 migraine cases ascertained from three European headache clinics and 10,747 population-matched controls. The association was replicated in 3,202 cases and 40,062 controls for an overall meta-analysis P value of 1.69 x 10(-)(1)(1) (odds ratio = 1.18, 95% CI 1.127-1.244). rs1835740 is located between MTDH (astrocyte elevated gene 1, also known as AEG-1) and PGCP (encoding plasma glutamate carboxypeptidase). In an expression quantitative trait study in lymphoblastoid cell lines, transcript levels of the MTDH were found to have a significant correlation to rs1835740 (P = 3.96 x 10(-)(5), permuted threshold for genome-wide significance 7.7 x 10(-)(5). To our knowledge, our data establish rs1835740 as the first genetic risk factor for migraine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding the ontogenetic habitat linkages of sharks is important for conservation and managing human interactions. We used acoustic telemetry, catch data, elemental and stable isotope signatures and dietary analyses to investigate ontogenetic habitat use in south-east Queensland, Australia, by the bull shark Carcharhinus leucas, a IUCN 'near-threatened' species that is implicated in many shark attacks on humans in urban estuaries. Sequential analyses for delta(15)N and delta(13)C of vertebrae from five adult C. leucas and laser ablation inductively coupled plasma mass spectrometry (LA-ICPMS) for elemental composition from 23 C. leucas, including a pregnant female, were also used to trace ontogenetic habitat dependence. Acoustic telemetry indicated large juvenile and subadult C. leucas remained in estuarine habitats. delta(15)N values across shark vertebrae showed an ontogenetic shift in diet with total length (TL), confirmed by stomach contents. LA-ICPMS data reflected the ontogenetic movements of C. leucas from natal habitats. Differences among adults were gender related. Shifts in habitat use by subadults were correlated with a sigmoidal delta(13)C relationship with TL. C. leucas have a multipartite, stage-specific dependency in their transition between habitats along the freshwater-estuarine-marine continuum, making them particularly susceptible to the habitat alteration that is occurring globally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new indole oxygenase from the leaves of Tecoma stans was isolated and purified to near homogeneity. The purified enzyme system catalyses the conversion of indole to anthranilic acid. It is optimally active at pH 5.2 and at 30°C. Oxygen (2 mol) is consumed and anthranilic acid (1 mol) is formed for every mole of indole oxidized. Neither sulfhydryl reagents nor sulfhydryl compounds inhibited the enzyme activity. The oxygenase also attacks, apart from indole, 5-hydroxyindole, 5-bromoindole and 5-methylindole. It is not inhibited by copper specific chelators or non-heme iron specific chelators. Atebrin did not inhibit the enzyme activity suggesting that it is not a flavoprotein, unlike other indole oxygenases and indole oxidases. Dialysis resulted in complete loss of enzyme activity. The inactive enzyme could not be reactivated by addition of various cofactors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraines are particularly common in young adults, with the prevalence reducing after the late 40s and early 50s years of age.1,2 Migraines are headaches that can have a throbbing or pulsating feeling, and often occur with nausea, vomiting, and sensitivity to light and sound. These headaches can last between a few hours to three days.1,3 They place a significant burden of disease on quality of life, and have a socio-economic impact through loss of productiveness and sick days.4 Most people report experiencing at least one migraine attack each month, with many reporting that migraine attacks interfered with their daily activities.2 Migraines have been ranked as the third most prevalent and seventh highest specific cause of disability around the world...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aphid parasitoid Lysiphlebus testaceipes is a potentially valuable biological control agent of Aphis gossypii a major worldwide pest of cotton. One means of increasing the abundance of a biological control agent is to provide an alternative host habitat adjacent to cropping, from which they can provide pest control services in the crop. Host selection and parasitism rate of an alternative host aphid, Aphis craccivora by L. testaceipes were studied in a series of experiments that tested its host suitability relative to A. gossypii on cotton, hibiscus and mungbean. Host acceptance, as measured by number of ovipositions was much greater in A. craccivora compared to A. gossypii, while more host aphids were accepted on mungbean than cotton. When given a choice L. testaceipes attacks more 4th instar and adult stages (63% and 70%, respectively) of both hosts than 2nd instar nymphs (47%). In a switching (host choice) experiment, L. testaceipes preferentially attacked A. craccivora on mungbean over A. gossypii on cotton. Observations of parasitoid contact with A. gossypii cornicle secretion suggest it provides a useful deterrent against parasitoid attack. From these experiments it appears L. testaceipes has a preference for A. craccivora and mungbean compared to A. gossypii and cotton, in this respect using A. craccivora and mungbean as alternative habitat may not work as the parasitoid is unlikely to switch away from its preferred host. © 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rhizoctonia solani is a soil inhabiting basidiomycetous fungus able to induce a wide range of symptoms in many plant species. This genetically complex species is divided to 13 anastomosis groups (AG), of which AG-3 is specialized to infect potato. However, also a few other AGs are able to infect or live in close contact with potato. On potato, R. solani infection causes two main types of diseases including stem canker observed as a dark brown lesions on developing stems and stolons, and black scurf that develops on new tubers close to the time of harvest. These disease symptoms are collectively called a ‘Rhizoctonia disease complex’. Between the growing seasons R. solani survives in soil and plant debri as sclerotia or as the sclerotia called black scurf on potato tubers which when used as seed offer the main route for dispersal of the fungus to new areas. The reasons for the dominance of AG-3 on potato seem to be attributable to its highly specialization to potato and its ability to infect and form sclerotia efficiently at low temperatures. In this study, a large nationwide survey of R. solani isolates was made in potato crops in Finland. Almost all characterized isolates belonged to AG-3. Additionally, three other AGs (AG-2-1, AG-4 and AG-5) were found associated with symptoms on potato plants but they were weaker pathogens on potato than AG-3 as less prone to form black scurf. According to phylogenetic analysis of the internal transcribed sequences (ITS) of the ribosomal RNA genes the Finnish AG-3 isolates are closely related to each other even though a wide variation of physiological features was observed between them. Detailed analysis of the ITS regions revealed single nucleotide polymorphism in 14 nucleotide positions of ITS-1 and ITS-2. Additionally, compensatory base changes on ITS-2 were detected which suggests that potato-infecting R. solani AG-3 could be considered as a separate species instead of an AG of R. solani. For the first time, molecular defence responses were studied and detected during the early phases of interaction between R. solani AG-3 and potato. Extensive systemic signalling for defence exploiting several known defence pathways was activated as soon as R. solani came into close contact with the base of a sprout. The defence response was strong enough to protect vulnerable sprout tips from new attacks by the pathogen. These results at least partly explain why potato emergence is eventually successful even under heavy infection pressure by R. solani.