7,896 research outputs found

    From cyber-security deception to manipulation and gratification through gamification

    Get PDF
    Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3]. Changes in mindsets have also been witnessed, a couple of years ago the cyber-security industry only blamed users for their mistakes often depicted as the number one reason behind security breaches. Nowadays, companies are empowering users, modifying their perception of being the weak link, into being the center-piece of the network design [4]. Users are by definition "in control" and therefore a cyber-security asset. Researchers have focused on the gamification of cyber- security elements, helping users to learn and understand the concepts of attacks and threats, allowing them to become the first line of defense to report anoma- lies [5]. However, over the past years numerous infrastructures have suffered from malicious intent, data breaches, and crypto-ransomeware, clearly showing the technical "know-how" of hackers and their ability to bypass any security in place, demonstrating that no infrastructure, software or device can be consid- ered secure. Researchers concentrated on the gamification, learning and teaching theory of cyber-security to end-users in numerous fields through various techniques and scenarios to raise cyber-situational awareness [2][1]. However, they overlooked the users’ ability to gather information on these attacks. In this paper, we argue that there is an endemic issue in the the understanding of hacking practices leading to vulnerable devices, software and architectures. We therefore propose a transparent gamification platform for hackers. The platform is designed with hacker user-interaction and deception in mind enabling researchers to gather data on the techniques and practices of hackers. To this end, we developed a fully extendable gamification architecture allowing researchers to deploy virtualised hosts on the internet. Each virtualised hosts contains a specific vulnerability (i.e. web application, software, etc). Each vulnerability is connected to a game engine, an interaction engine and a scoring engine

    Computational Models Development and Demand Response Application for Smart Grids

    Get PDF
    This paper focuses on computational models development and its applications on demand response, within smart grid scope. A prosumer model is presented and the corresponding economic dispatch problem solution is analyzed. The prosumer solar radiation production and energy consumption are forecasted by artificial neural networks. The existing demand response models are studied and a computational tool based on fuzzy clustering algorithm is developed and the results discussed. Consumer energy management applications within the InovGrid pilot project are presented. Computation systems are developed for the acquisition, monitoring, control and supervision of consumption data provided by smart meters, allowing the incorporation of consumer actions on their electrical energy management. An energy management system with integration of smart meters for energy consumers in a smart grid is developed

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    Interactions between Transmembrane Helices within Monomers of the Aquaporin AtPIP2;1 Play a Crucial Role in Tetramer Formation

    Get PDF
    Aquaporin (AQP) is a water channel protein found in various subcellular membranes of both prokaryotic and eukaryotic cells. The physiological functions of AQPs have been elucidated in many organisms. However, understanding their biogenesis remains elusive, particularly regarding how they assemble into tetramers. Here, we investigated the amino acid residues involved in the tetramer formation of the Arabidopsis plasma membrane AQP AtPIP2; 1 using extensive amino acid substitution mutagenesis. The mutant proteins V41A/E44A, F51A/L52A, F87A/I91A, F92A/I93A, V95A/Y96A, and H216A/L217A, harboring alanine substitutions in the transmembrane (TM) helices of AtPIP2; 1 polymerized into multiple oligomeric complexes with a variable number of subunits greater than four. Moreover, these mutant proteins failed to traffic to the plasma membrane, instead of accumulating in the endoplasmic reticulum(ER). Structure-based modeling revealed that these residues are largely involved in interactions between TM helices within monomers. These results suggest that inter-TM interactions occurring both within and between monomers play crucial roles in tetramer formation in the AtPIP2; 1 complex. Moreover, the assembly of AtPIP2; 1 tetramers is critical for their trafficking from the ER to the plasma membrane, as well as water permeability.1133Ysciescopu

    Varicella-Zoster viruses associated with post-herpetic neuralgia induce sodium current density increases in the ND7-23 Nav-1.8 neuroblastoma cell line

    Get PDF
    Post-herpetic neuralgia (PHN) is the most significant complication of herpes zoster caused by reactivation of latent Varicella-Zoster virus (VZV). We undertook a heterologous infection in vitro study to determine whether PHN-associated VZV isolates induce changes in sodium ion channel currents known to be associated with neuropathic pain. Twenty VZV isolates were studied blind from 11 PHN and 9 non-PHN subjects. Viruses were propagated in the MeWo cell line from which cell-free virus was harvested and applied to the ND7/23-Nav1.8 rat DRG x mouse neuroblastoma hybrid cell line which showed constitutive expression of the exogenous Nav 1.8, and endogenous expression of Nav 1.6 and Nav 1.7 genes all encoding sodium ion channels the dysregulation of which is associated with a range of neuropathic pain syndromes. After 72 hrs all three classes of VZV gene transcripts were detected in the absence of infectious virus. Single cell sodium ion channel recording was performed after 72 hr by voltage-clamping. PHN-associated VZV significantly increased sodium current amplitude in the cell line when compared with non-PHN VZV, wild-type (Dumas) or vaccine VZV strains ((POka, Merck and GSK). These sodium current increases were unaffected by acyclovir pre-treatment but were abolished by exposure to Tetrodotoxin (TTX) which blocks the TTX-sensitive fast Nav 1.6 and Nav 1.7 channels but not the TTX-resistant slow Nav 1.8 channel. PHN-associated VZV sodium current increases were therefore mediated in part by the Nav 1.6 and Nav 1.7 sodium ion channels. An additional observation was a modest increase in message levels of both Nav1.6 and Nav1.7 mRNA but not Nav 1.8 in PHN virally infected cells

    Review: ‘Gimme five’: future challenges in multiple sclerosis. ECTRIMS Lecture 2009

    Get PDF
    This article is based on the ECTRIMS lecture given at the 25th ECTRIMS meeting which was held in Düsseldorf, Germany, from 9 to 12 September 2009. Five challenges have been identified: (1) safeguarding the principles of medical ethics; (2) optimizing the risk/benefit ratio; (3) bridging the gap between multiple sclerosis and experimental autoimmune encephalitis; (4) promoting neuroprotection and repair; and (5) tailoring multiple sclerosis therapy to the individual patient. Each of these challenges will be discussed and placed in the context of current research into the pathogenesis and treatment of multiple sclerosis

    Searches for Long Lived Neutral Particles

    Full text link
    An intriguing possibility for TeV scale physics is the existence of neutral long lived particles (LOLIPs) that subsequently decay into SM states. Such particles are many cases indistinguishable from missing transverse energy (MET) at colliders. We propose new methods to search for these particles using neutrino telescopes. We study their detection prospects, assuming production either at the LHC or through dark matter (DM) annihilations in the Sun and the Earth. We find that the sensitivity for LOLIPs produced at the LHC is limited by luminosity and detection energy thresholds. On the other hand, in the case of DM annihilation into LOLIPs, the sensitivity of neutrino telescopes is promising and may extend beyond the reach of upcoming direct detection experiments. In the context of low scale hidden sectors weakly coupled to the SM, such indirect searches allow to probe couplings as small as 10^-15.Comment: 22 pages, 6 figure

    Testing and comparing two self-care-related instruments among older Chinese adults

    Get PDF
    Objectives The study aimed to test and compare the reliability and validity, including sensitivity and specificity of the two self-care-related instruments, the Self-care Ability Scale for the Elderly (SASE), and the Appraisal of Self-care Agency Scale-Revised (ASAS-R), among older adults in the Chinese context. Methods A cross-sectional design was used to conduct this study. The sample consisted of 1152 older adults. Data were collected by a questionnaire including the Chinese version of SASE (SASE-CHI), the Chinese version of ASAS-R (ASAS-R-CHI) and the Exercise of Self-Care Agency scale (ESCA). Homogeneity and stability, content, construct and concurrent validity, and sensitivity and specificity were assessed. Results The Cronbach's alpha (α) of SASE-CHI was 0.89, the item-to-total correlations ranged from r = 0.15 to r = 0.81, and the test-retest correlation coefficient (intra-class correlation coefficient, ICC) was 0.99 (95% CI, 0.99±1.00; P<0.001). The Cronbach's α of ASAS-R-CHI was 0.78, the item-to-total correlations ranged from r = 0.20 to r = 0.65, and the test-retest ICC was 0.95 (95% CI, 0.92±0.96; P<0.001). The content validity index (CVI) of SASE-CHI and ASAS-R-CHI was 0.96 and 0.97, respectively. The findings of exploratory and confirmatory factor analyses (EFA and CFA) confirmed a good construct validity of SASE-CHI and ASAS-R-CHI. The Pearson's rank correlation coefficients, as a measure of concurrent validity, between total score of SASE-CHI and ESCA and ASAS-R-CHI and ESCA were assessed to 0.65 (P<0.001) and 0.62 (P<0.001), respectively. Regarding ESCA as the criterion, the area under the receiver operator characteristic (ROC) curve for the cut-point of SASE-CHI and ASAS-R-CHI were 0.93 (95% CI, 0.91±0.94) and 0.83 (95% CI, 0.80±0.86), respectively. Conclusion There is no significant difference between the two instruments. Each has its own characteristics, but SASE-CHI is more suitable for older adults. The key point is that the users can choose the most appropriate scale according to the specific situation.publishedVersionNivå

    Diboson-Jets and the Search for Resonant Zh Production

    Full text link
    New particles at the TeV-scale may have sizeable decay rates into boosted Higgs bosons or other heavy scalars. Here, we investigate the possibility of identifying such processes when the Higgs/scalar subsequently decays into a pair of W bosons, constituting a highly distinctive "diboson-jet." These can appear as a simple dilepton (plus MET) configuration, as a two-prong jet with an embedded lepton, or as a four-prong jet. We study jet substructure methods to discriminate these objects from their dominant backgrounds. We then demonstrate the use of these techniques in the search for a heavy spin-one Z' boson, such as may arise from strong dynamics or an extended gauge sector, utilizing the decay chain Z' -> Zh -> Z(WW^(*)). We find that modes with multiple boosted hadronic Zs and Ws tend to offer the best prospects for the highest accessible masses. For 100/fb luminosity at the 14 TeV LHC, Z' decays into a standard 125 GeV Higgs can be observed with 5-sigma significance for masses of 1.5-2.5 TeV for a range of models. For a 200 GeV Higgs (requiring nonstandard couplings, such as fermiophobic), the reach may improve to up to 2.5-3.0 TeV.Comment: 23 pages plus appendices, 9 figure

    Optimal Receiver Antenna Location in Indoor Environment Using Dynamic Differential Evolution and Genetic Algorithm

    Get PDF
    [[abstract]]Using the impulse responses of these multipath channels, the bit error rate (BER) performance for binary pulse amplitude modulation impulse radio ultra-wideband communication system is calculated. The optimization location of receiving antenna is investigated by dynamic differential evolution (DDE) and genetic algorithm (GA) to minimize the outage probability. Numerical results show that the performance for reducing BER and outage probability by DDE algorithm is better than that by GA.[[notice]]補正完畢[[incitationindex]]SCI[[booktype]]紙本[[booktype]]電子
    corecore