8,878 research outputs found
Automated real-time collection of pathogen-specific diagnostic data: Syndromic infectious disease epidemiology
miR-16 and miR-103 impact 5-HT4 receptor signalling and correlate with symptom profile in irritable bowel syndrome
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Darknet technology such as Tor has been used by various threat actors for
organising illegal activities and data exfiltration. As such, there is a case
for organisations to block such traffic, or to try and identify when it is used
and for what purposes. However, anonymity in cyberspace has always been a
domain of conflicting interests. While it gives enough power to nefarious
actors to masquerade their illegal activities, it is also the cornerstone to
facilitate freedom of speech and privacy. We present a proof of concept for a
novel algorithm that could form the fundamental pillar of a darknet-capable
Cyber Threat Intelligence platform. The solution can reduce anonymity of users
of Tor, and considers the existing visibility of network traffic before
optionally initiating targeted or widespread BGP interception. In combination
with server HTTP response manipulation, the algorithm attempts to reduce the
candidate data set to eliminate client-side traffic that is most unlikely to be
responsible for server-side connections of interest. Our test results show that
MITM manipulated server responses lead to expected changes received by the Tor
client. Using simulation data generated by shadow, we show that the detection
scheme is effective with false positive rate of 0.001, while sensitivity
detecting non-targets was 0.016+-0.127. Our algorithm could assist
collaborating organisations willing to share their threat intelligence or
cooperate during investigations.Comment: 26 page
Proactive threat detection for connected cars using recursive Bayesian estimation
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of hijacked connected cars to improve cyber-resilience. First, we manifest the opportunity of behavioral profiling for connected cars from recent literature covering related underpinning technologies. Then, we design and utilize a new data set file for connected cars influenced by the automatic dependent surveillance-broadcast surveillance technology used in the aerospace industry to facilitate data collection and sharing. Finally, we simulate the analysis of travel routes in real time to predict anomalies using predictive modeling. Simulations show the applicability of a Bayesian estimation technique, namely, Kalman filter. With the analysis of future state predictions based on the previous behavior, cyber-threats can be addressed with a vastly increased time window for a reaction when encountering anomalies. We discuss that detecting real-time deviations for malicious intent with the predictive profiling and behavioral algorithms can be superior in effectiveness than the retrospective comparison of known-good/known-bad behavior. When quicker action can be taken while connected cars encounter cyberattacks, more effective engagement or interception of command and control will be achieved
Report from a multidisciplinary meeting on anxiety as a non-motor manifestation of Parkinson’s disease
A Chromosomal Deletion and New Frameshift Mutation Cause ARSACS in an African-American
Autosomal Recessive Spastic Ataxia of Charlevoix-Saguenay (ARSACS) is a rare, progressive, neurodegenerative disease characterized by ataxia, spasticity and polyneuropathy. First described in the French-Canadian population of Quebec in 1978, ARSACS has since been identified in multiple patients worldwide. In this clinical case report, we describe the evaluation of an 11-years-old African-American male who presented to neuromuscular clinic for assessment of a gait abnormality. He had a history of gross motor delay since early childhood, frequent falls and a below average IQ. Chromosomal microarray revealed a 1.422 megabase loss in the 13q12.12 region, which includes the SACS gene. Next Generation Sequencing then showed a novel, predicted to be pathogenic missense mutation (c.11824dup) of this gene. His clinical presentation and neurological imaging further confirmed the diagnosis of ARSACS. To our knowledge, this is the first reported case of this disease in the African-American population of the United States. This case report further highlights the growing trend of identifying genetic diseases previously restricted to single, ethnically isolated regions in many different ethnic groups worldwide
Rhetoric and reality: critical perspectives on education in a 3D virtual world
The emergence of any new educational technology is often accompanied by inflated expectations about its potential for transforming pedagogical practice and improving student learning outcomes. A critique of the rhetoric accompanying the evolution of 3D virtual world education reveals a similar pattern, with the initial hype based more on rhetoric than research demonstrating the extent to which rhetoric matches reality. Addressed are the perceived gaps in the literature through a critique of the rhetoric evident throughout the evolution of the application of virtual worlds in education and the reality based on the reported experiences of experts in the field of educational technology, who are all members of the Australian and New Zealand Virtual Worlds Working Group. The experiences reported highlight a range of effective virtual world collaborative and communicative teaching experiences conducted in members’ institutions. Perspectives vary from those whose reality is the actuation of the initial rhetoric in the early years of virtual world education, to those whose reality is fraught with challenges that belie the rhetoric. Although there are concerns over institutional resistance, restrictions, and outdated processes on the one-hand, and excitement over the rapid emergence of innovation on the other, the prevailing reality seems to be that virtual world education is both persistent and sustainable. Explored are critical perspectives on the rhetoric and reality on the educational uptake and use of virtual worlds in higher education, providing an overview of the current and future directions for learning in virtual worlds
- …
