Search results for " Attacks"

showing 10 items of 33 documents

Local reactions to tick bites

2008

A retrospective histological and immunohistochemical study has been carried out in 25 cases of tick bites recorded in our Departments. The samples that included an attached tick showed a cement cone anchoring the mouthparts to the skin and a blood-soaked, spongiform appearance of the superficial dermis, with a mild neutrophilic and eosinophilic infiltration. The vessels displayed a loose multilayered endothelial proliferation, with plump endothelia, permeated with erythrocytes. A few of them were severed, allowing copious blood extravasation. The established lesions included the following: erythema chronicum migrans-like cases, foreign body granulomas-sometimes containing remnants of the mo…

AdultMalePathologymedicine.medical_specialtyHistologyErythemaAdolescentAlopecia AreataT-LymphocytesDermatologyBiologySettore MED/08 - Anatomia PatologicaSkin DiseasesLymphoid hyperplasiaPathology and Forensic MedicineHost-Parasite InteractionsLymphocytic InfiltrateDermisPseudolymphomamedicineSettore MED/35 - Malattie Cutanee E VenereeAnimalsHumansChildAgedRetrospective StudiesAged 80 and overB-LymphocytesIxodeslocal reactionInsect Bites and StingsHistologyGeneral MedicineAnatomyHyperplasiaMiddle Agedmedicine.diseaseHistology; local reactions; tick attacksArthropod mouthpartsExtravasationmedicine.anatomical_structuretick attacksErythema Chronicum MigransFemalemedicine.symptom
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

CNS manifestations of Fabry's disease

2006

Summary Background Fabry's disease is a rare hereditary lysosomal storage disease with multiorgan involvement. Deficiency of α-galactosidase A activity leads to accumulation of neutral glycosphingolipids, especially in vascular endothelial and smooth-muscle cells. Along with progressive renal and cardiac dysfunction, stroke is a major and often life-threatening burden of the disease. Cerebral vasculopathy, confirmed by neuropathological, neuroradiological, and functional studies, occurs commonly and leads to ischaemic cerebrovascular events at an early age. Recent developments Fabry's disease is an X-linked disease and women have been regarded as only mildly affected carriers. However, rese…

Central Nervous SystemPediatricsmedicine.medical_specialtyPathologybusiness.industryBrainEnzyme replacement therapyDiseaseTransient ischaemic attacksmedicine.diseaseFabry's diseaseFabry diseaseStrokeCerebrovascular DisordersmedicineLysosomal storage diseaseFabry DiseaseHumansNeurology (clinical)Young adultbusinessStrokeThe Lancet Neurology
researchProduct

Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.

Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…

Complex Network Data clustering Hegselmann-Krause model Consensus Security Attacks Line Network k-means Opinion Dynamics.Settore ING-INF/04 - Automatica
researchProduct

Dog-bite-related attacks: A new forensic approach

2020

Dog attacks today represent a health hazard considering that prevention strategies have not always been successful. The identification of the dog that attacked the victim is necessary, considering the civil or criminal consequences for the animal's owner. An accurate scene analysis must be performed collecting a series of important information.Forensic investigations in dog attacks involve different methods, such as the evaluating of the canine Short Tandem Repeat (STR) typing in saliva traces on wounds or bite mark analysis, however, these techniques cannot always be applied. The effort to find new methods to identify the dog that attacked the victim represents a very interesting field for…

Computer scienceSample (material)Sensitivity and Specificity01 natural sciencesdog attacksCattle genotypingForensic pathologyPathology and Forensic MedicineGenetic profile03 medical and health sciencesDogs0302 clinical medicinemedicineAnimalsHumansShort tandem repeatBites and Stings030216 legal & forensic medicineSalivacattle genotyping; dog attacks; dog identification; forensic pathology; forensic science; short tandem repeat; tgla122; tgla53Dog attackScene analysisdog identification010401 analytical chemistrytgla53DNAForensic Medicinemedicine.diseaseTGLA53.DNA FingerprintingDog bitePedigree0104 chemical sciencesForensic scienceIdentification (information)TGLA122Reference sampleForensic scienceMedical emergencyDog attackLawForensic Science International
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context

2021

Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…

ExploitComputer sciencebusiness.industryCyber-physical systemevasion attacksEvasion (network security)Context (language use)Adversarial machine learningComputer securitycomputer.software_genreadversarial machine learningdefensive mechanismscyber-physical systemAdversarial systemSmart lockkoneoppiminenälytekniikkabusinesskyberturvallisuuscomputerverkkohyökkäyksetBuilding automation
researchProduct

Interests Or Expectations?: A Political Economy Model Of The Credibility Of Exchange Rate Agreements

2008

Interest Groups Expectations Speculative Attacks
researchProduct

Rufinamide in children and adults with Lennox-Gastaut syndrome: first Italian multicenter experience

2010

This is the first multicenter Italian experience with rufinamide as an adjunctive drug in children, adolescents and adults with Lennox-Gastaut syndrome. The patients were enrolled in a prospective, add-on, open-label treatment study from 11 Italian centers for children and adolescent epilepsy care. Forty-three patients (26 males, 17 females), aged between 4 and 34 years (mean 15.9 ± 7.3, median 15.0), were treated with rufinamide for a mean period of 12.3 months (range 3-21 months). Twenty patients were diagnosed as cryptogenic and 23 as symptomatic. Rufinamide was added to the baseline therapy at the starting dose of 10mg/kg body weight, evenly divided in two daily doses and then increased…

MalePediatricsLennox-Gastaut syndromeAtypical absence seizuresRufinamideLennox–Gastaut syndrome; Rufinamide; Orphan drug; Pediatrics; Epilepsy; Drop attacksInfantilePediatricsSpasmsEpilepsyRufinamideDrop attacks; Epilepsy; Lennox-Gastaut syndrome; Orphan drug; Pediatrics; Rufinamide; Adolescent; Adult; Anticonvulsants; Child; Child Preschool; Drug Therapy Combination; Female; Humans; Intellectual Disability; Italy; Lennox Gastaut Syndrome; Male; Spasms Infantile; Treatment Outcome; Triazoles; Valproic Acid; Young Adult; Neurology (clinical); NeurologyChildPediatricValproic AcidDrop attacksGeneral MedicineSettore MED/39 - Neuropsichiatria InfantileTreatment OutcomeItalyNeurologyAnesthesiaChild PreschoolCombinationVomitingAnticonvulsantsDrug Therapy CombinationFemalemedicine.symptomSpasms Infantilemedicine.drugAdultmedicine.medical_specialtyAdolescentClinical NeurologyIrritabilityYoung AdultDrug TherapyIntellectual DisabilitymedicineHumanspediatrics epilepsyPreschoolAdverse effectLennox–Gastaut syndrome; rufinamide; orphan drug; pediatrics epilepsy; drop attacks; refractory epilepsy.EpilepsyOrphan drugbusiness.industryLennox Gastaut SyndromeValproic Acidrefractory epilepsyTriazolesmedicine.diseaseNeurology (clinical)businessLennox–Gastaut syndromeLennox–Gastaut syndrome
researchProduct

Stroke care organization overcomes the deleterious ‘weekend effect’ on 1-month stroke mortality: a population-based study

2013

Background and purpose Suffering a stroke during the weekend is associated with a poorer prognosis. The impact of implementing a dedicated stroke care network in Dijon, France, in 2003 on 30-day mortality in strokes/transient ischaemic attacks (TIA) occurring during weekends/bank holidays was evaluated. Methods All cases of stroke and TIA from 1985 to 2010 were identified from a population-based registry, using multiple overlapping sources of information. Demographics and clinical data were recorded. Cox regression models were used to evaluate associations between day of onset (weekdays versus weekends/bank holidays) and 30-day all-cause mortality. Data were stratified according to time per…

MalePediatricsmedicine.medical_specialtyWeekend effectPopulationPopulationTransient ischaemic attacksStroke careCommunity NetworksBrain Ischemiaparasitic diseasesHumansMedicinecardiovascular diseaseseducationStrokeAgedHolidaysAged 80 and overIntracerebral hemorrhageAnalysis of Varianceeducation.field_of_studybusiness.industryProportional hazards modelHazard ratioMiddle Agedmedicine.diseaseStrokeTreatment OutcomeNeurologyIschemic Attack TransientData Interpretation StatisticalEmergency medicineRegression AnalysisFemaleFranceNeurology (clinical)businessIntracranial Hemorrhageshuman activitiesEuropean Journal of Neurology
researchProduct