472 research outputs found
ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful context information regarding the network services. The false positives raised by the NIDS analyzing the incoming traffic (which can be either signature- or anomaly-based) are reduced by correlating them with the output anomalies. We designed our architecture for TCP-based network services which have a client/server architecture (such as HTTP). Benchmarks show a substantial reduction of false positives between 50% and 100%
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud
not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud
rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud
Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
In this paper we present an approach for specifying and prioritizing\ud
information security requirements in organizations. It is important\ud
to prioritize security requirements since hundred per cent security is\ud
not achievable and the limited resources available should be directed to\ud
satisfy the most important ones. We propose to link explicitly security\ud
requirements with the organization’s business vision, i.e. to provide business\ud
rationale for security requirements. The rationale is then used as a\ud
basis for comparing the importance of different security requirements.\ud
A conceptual framework is presented, where the relationships between\ud
business vision, critical impact factors and valuable assets (together with\ud
their security requirements) are shown
Electron localization and possible phase separation in the absence of a charge density wave in single-phase 1T-VS
We report on a systematic study of the structural, magnetic and transport
properties of high-purity 1T-VS powder samples prepared under high
pressure. The results differ notably from those previously obtained by
de-intercalating Li from LiVS. First, no Charge Density Wave (CDW) is found
by transmission electron microscopy down to 94 K. Though, \textit{ab initio}
phonon calculations unveil a latent CDW instability driven by an acoustic
phonon softening at the wave vector (0.21,0.21,0)
previously reported in de-intercalated samples. A further indication of latent
lattice instability is given by an anomalous expansion of the V-S bond distance
at low temperature. Second, infrared optical absorption and electrical
resistivity measurements give evidence of non metallic properties, consistent
with the observation of no CDW phase. On the other hand, magnetic
susceptibility and NMR data suggest the coexistence of localized moments with
metallic carriers, in agreement with \textit{ab initio} band structure
calculations. This discrepancy is reconciled by a picture of electron
localization induced by disorder or electronic correlations leading to a phase
separation of metallic and non-metallic domains in the nm scale. We conclude
that 1T-VS is at the verge of a CDW transition and suggest that residual
electronic doping in Li de-intercalated samples stabilizes a uniform CDW phase
with metallic properties.Comment: 22 pages, 10 Figures. Full resolution pictures available at
http://journals.aps.org/prb/abstract/10.1103/PhysRevB.89.23512
A 3-dimensional transnasal endoscopic journey through the paranasal sinuses and adjacent skull base: a practical and surgery-oriented perspective
An endoscopic approach through the transnasal corridor is currently the treatment of choice in the management of benign sinonasal tumors, cerebrospinal fluid leaks, and pituitary lesions. Moreover, this approach can be considered a valid option in the management of selected sinonasal malignancies extending to the skull base, midline meningiomas, parasellar lesions such as craniopharyngioma and Rathke cleft cyst, and clival lesions such as chordoma and ecchordosis. Over the past decade, strict cooperation between otorhinolaryngologists and neurosurgeons and acquired surgical skills, together with high-definition cameras, dedicated instrumentation, and navigation systems, have made it possible to broaden the indications of endoscopic surgery. Despite these improvements, depth perception, as provided by the use of a microscope, was still lacking with this technology. The aim of the present project is to reveal new perspectives in the endoscopic perception of the sinonasal complex and skull base thanks to 3-dimensional endoscopes, which are well suited to access and explore the endonasal corridor. In the anatomic dissection herein, this innovative device came across with sophisticated and long-established fresh cadaver preparation provided by one of the most prestigious universities of Europe. The final product is a 3-dimensional journey starting from the nasal cavity, reaching the anterior, middle, and posterior cranial fossae, passing through the ethmoidal complex, paranasal sinuses, and skull base. Anatomic landmarks, critical areas, and tips and tricks to safely dissect delicate anatomic structures are addressed through audio comments, figures, and their captions
Higgs Physics: Theory
I review the theoretical aspects of the physics of Higgs bosons, focusing on
the elements that are relevant for the production and detection at present
hadron colliders. After briefly summarizing the basics of electroweak symmetry
breaking in the Standard Model, I discuss Higgs production at the LHC and at
the Tevatron, with some focus on the main production mechanism, the gluon-gluon
fusion process, and summarize the main Higgs decay modes and the experimental
detection channels. I then briefly survey the case of the minimal
supersymmetric extension of the Standard Model. In a last section, I review the
prospects for determining the fundamental properties of the Higgs particles
once they have been experimentally observed.Comment: 21 pages, 15 figures. Talk given at the XXV International Symposium
on Lepton Photon Interactions at High Energies (Lepton Photon 11), 22-27
August 2011, Mumbai, Indi
BFKL at Next-to-Next-to-Leading Order
We determine an approximate expression for the O(alpha_s^3) contribution
chi_2 to the kernel of the BFKL equation, which includes all collinear and
anticollinear singular contributions. This is derived using recent results on
the relation between the GLAP and BFKL kernels (including running-coupling
effects to all orders) and on small-x factorization schemes. We present the
result in various schemes, relevant both for applications to the BFKL equation
and to small-x evolution of parton distributions.Comment: 34 pages, 6 figures, TeX with harvmac. Various small typos corrects,
in particular first term in eq D.3. Final version to be published in Nucl.
Phys.
The fully differential hadronic production of a Higgs boson via bottom quark fusion at NNLO
The fully differential computation of the hadronic production cross section
of a Higgs boson via bottom quarks is presented at NNLO in QCD. Several
differential distributions with their corresponding scale uncertainties are
presented for the 8 TeV LHC. This is the first application of the method of
non-linear mappings for NNLO differential calculations at hadron colliders.Comment: 27 pages, 13 figures, 1 lego plo
Space-like (vs. time-like) collinear limits in QCD: is factorization violated?
We consider the singular behaviour of QCD scattering amplitudes in
kinematical configurations where two or more momenta of the external partons
become collinear. At the tree level, this behaviour is known to be controlled
by factorization formulae in which the singular collinear factor is universal
(process independent). We show that this strict (process-independent)
factorization is not valid at one-loop and higher-loop orders in the case of
the collinear limit in space-like regions (e.g., collinear radiation from
initial-state partons). We introduce a generalized version of all-order
collinear factorization, in which the space-like singular factors retain some
dependence on the momentum and colour charge of the non-collinear partons. We
present explicit results on one-loop and two-loop amplitudes for both the
two-parton and multiparton collinear limits. At the level of square amplitudes
and, more generally, cross sections in hadron--hadron collisions, the violation
of strict collinear factorization has implications on the non-abelian structure
of logarithmically-enhanced terms in perturbative calculations (starting from
the next-to-next-to-leading order) and on various factorization issues of mass
singularities (starting from the next-to-next-to-next-to-leading order).Comment: 81 pages, 5 figures, typos corrected in the text, few comments added
and inclusion of NOTE ADDED on recent development
- …
