930 resultados para stealthy attack
Resumo:
Background: Transient ischemic attack (TIA) is a condition causing focal neurological deficits lasting less than 24hrs. TIA patients present similarly to other conditions with rapid onset of neurological symptoms such as migraine. The accurate diagnosis of TIA is critical because it serves as a warning for subsequent stroke. Furthermore, cognitive deficit associated with TIA may predict the development of dementia. Therefore, characterizing the cognitive symptoms of TIA patients and discriminating these patients from those with similar symptoms is important for proper diagnosis and treatment. Currently the diagnosis of TIA is made on clinical and radiographic evidence. Robotic assessment, with instruments such as the KINARM, may improve the identification of cognitive impairment in TIA patients. Methods: In this prospective cohort study, two KINARM tests, trail making task (TMT) and spatial span task (SST), were used to detect cognitive deficits. Two study groups were made. The TIA group was tested at 5 time points over the span of a year. The migraine active control group had one initial visit and another a year later. Both of these groups were compared to a normative database of approximately 400 healthy volunteers. From this database age and sex matched normative data was used to calculate Z-scores for the TMT. The Montreal Cognitive Assessment (MoCA) was also administered to both groups. Results: 31 participants were recruited, 20 TIA group and 11 active controls (mean ± SD age= 66 ± 11.3 and 62 ± 14.5). There was no significant difference in TIA and active control group MoCA scores. The TMT was able to detect cognitive impairment in TIA and migraine group. Also, both KINARM tasks could detect significant differences in performance between TIA and migraine patients while the MoCA could not. Changes in TIA and migraine performance on the MoCA, TMT, and SST were observed. Conclusions: The robotic KINARM exoskeleton can be used to assess cognitive deficits in TIA patients.
Effect of Freezing-Thawing Cycles on the Resistance of Self-Consolidating Concrete to Sulfate Attack
Resumo:
Lip separation is one of the primary sources of inlet distortion, which can result in a loss in fan stability. High angles of incidence are one of several critical causes of lip separation. There have been many studies into inlet performance at high incidence, including the resulting distortion levels when lip separation occurs. However, the vast majority of these investigations have been carried out experimentally, with little in the way of computational results for inlet performance at high incidence. The flow topology within an inlet when lip separation has occurred is also not well understood. This work aims to demonstrate a suitable model for the prediction of inlet flows at high incidence using ANSYS CFX, looking at both the performance of the inlet and the separated flow topology within the inlet. The attenuating effect of the fan is also investigated, with particular emphasis on the flow redistribution ahead of the fan. The results show that the model used is suitable for predicting inlet performance in adverse operating conditions, showing good agreement with experimental results. In addition, the attenuation of the distortion by the fan is also captured by the numerical model.
Resumo:
DeAuthentication Denial of Service attacks in Public Access WiFi operate by exploiting the lack of authentication of management frames in the 802.11 protocol. Detection of these attacks rely almost exclusively on the selection of appropriate thresholds. In this work the authors demonstrate that there are additional, previously unconsidered, metrics which also influence DoS detection performance. A method of systematically tuning these metrics to optimal values is proposed which ensures that parameter choices are repeatable and verifiable.
Resumo:
We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick “repairs,” which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions, without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been l in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most l log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degree would have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.