Search results for "ATTAC"

showing 10 items of 610 documents

Vesicle transport and photoreceptor death: fishing for molecular links.

2013

Intracellular vesicle transport defects can induce retinal degeneration and photoreceptor cell death, but the molecular connections between these processes remains poorly understood. Reporting in Developmental Cell, Nishiwaki et al. (2013) suggest that a vesicle fusion cis-SNARE complex component translates vesicular transport defects into photoreceptor cell apoptosis.

Retinal degenerationVesicle fusionLipid bilayer fusionIntracellular vesicleApoptosisCell BiologyBiologymedicine.diseaseMembrane FusionGeneral Biochemistry Genetics and Molecular BiologyPhotoreceptor cellCell biologyVesicular transport proteinSoluble N-Ethylmaleimide-Sensitive Factor Attachment Proteinsmedicine.anatomical_structureProto-Oncogene Proteins c-bcl-2ApoptosismedicineRetinal Cone Photoreceptor CellsAnimalsMolecular BiologyDevelopmental BiologyDevelopmental cell
researchProduct

Le modèle de l'attachement adulte dans la perturbation de la régulation émotionnelle et des liens affectifs des femmes hospitalisées souffrant de dép…

2011

The purpose of our research is to show that the model of adult attachment constitute a factor of psychological vulnerability that explain women depression and its evolution on two levels: the disturbance of the emotional regulation (attachment strategies) and the insecurity of the representation of the past links of attachment (parental experiences), and the current ones (love and interpersonal attachment). The aim is also to determine the existing links between the personality of the depressed women and adult attachment. We have a more interest more specific in the study of the evolution between the depression and the patterns of attachment (stability or alteration) during hospitalization.…

Romantic attachment stylesDepressionDépressionVulnerabilityAttachment strategies[SHS.PSY]Humanities and Social Sciences/Psychology[SHS.PSY] Humanities and Social Sciences/PsychologyInterpersonal attachment[ SHS.PSY ] Humanities and Social Sciences/PsychologyPersonnalitéVulnérabilitéStratégies d'attachementAttachement interpersonnelStyles d'attachement romantiquePersonality
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

SDN controllers security issues

2017

Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the packet-handling functions of the network switches, using a standard, open API (Application Programming Interface) such as OpenFlow. OpenFlow is a broadly used protocol for software-defined networks (SDNs) that presents a new model in which the control plane is inattentive from the forwarding plane for the network devices. In SDN approach centralized entities called "controllers" perform like network operating systems run dissimilar applications that accomplish and control the…

SDNSDN controllersohjelmistotOpenFlow-protokollasoftware defined networkingDoS attacksOpenFlow Controllerohjaimetcomputer networkssuojaustietoturvatietoverkot
researchProduct

Modulation of physical and biological properties of a composite PLLA and polyaspartamide derivative obtained via thermally induced phase separation (…

2016

Abstract In the present study, blend of poly l -lactic acid (PLLA) with a graft copolymer based on α,β-poly(N-hydroxyethyl)- dl -aspartamide and PLA named PHEA-PLA, has been used to design porous scaffold by using Thermally Induced Phase Separation (TIPS) technique. Starting from a homogeneous ternary solution of polymers, dioxane and deionised water, PLLA/PHEA-PLA porous foams have been produced by varying the polymers concentration and de-mixing temperature in metastable region. Results have shown that scaffolds prepared with a polymer concentration of 4% and de-mixing temperature of 22.5 °C are the best among those assessed, due to their optimal pore size and interconnection. SEM and DSC…

ScaffoldMaterials sciencePolyestersComposite numberBioengineering02 engineering and technologyCondensed Matter Physic010402 general chemistry01 natural sciencesChondrocytes attachmentlaw.inventionChondrocytes attachment; Composite biomaterials; TIPS; Materials Science (all); Condensed Matter Physics; Mechanical Engineering; Mechanics of MaterialsBiomaterialsHydrolysisChondrocytesstomatognathic systemlawMaterials TestingCopolymerAnimalsCrystallizationComposite materialCells Culturedchemistry.chemical_classificationTissue ScaffoldsMechanical EngineeringExtraction (chemistry)technology industry and agriculturePolymerAdhesionequipment and supplies021001 nanoscience & nanotechnology0104 chemical scienceschemistryChemical engineeringMechanics of MaterialsTIPSlipids (amino acids peptides and proteins)CattleMaterials Science (all)Composite biomaterial0210 nano-technologyPeptidesMaterials scienceengineering. C, Materials for biological applications
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Attachment anxiety and implicit self-concept of neuroticism: Associations in women but not men

2015

Abstract Previous research has shown that adult attachment-related anxiety is associated with the explicit self-concept of neuroticism. It remains to be clarified whether attachment anxiety is related to the implicit self-concept of neuroticism. There is evidence that gender can moderate the strength of correlation between implicit and explicit measures. The Experiences in Close Relationships scale and the NEO Five-Factor Inventory (NEO-FFI) were administered to 106 healthy adults along with an Implicit Association Test assessing neuroticism. Attachment anxiety correlated with NEO-FFI neuroticism, regardless of gender. Attachment anxiety was correlated with neuroticism as measured by the IA…

SelfSelf-conceptImplicit-association testModerationNeuroticismDevelopmental psychologyCorrelationmental disordersmedicineAttachment theoryAnxietymedicine.symptomPsychologyGeneral PsychologyPersonality and Individual Differences
researchProduct

Marte Meo as a port of entry to parental sensitivity - a three–case study

2019

Abstract Background Early parent- child relations play an important role in children’s development. Therapeutic intervention towards infants and toddlers at high-risk intends to prevent mental health problems. In this work, the parent-child-dyad is crucial. The video interaction guidance method, Marte Meo, is one among different methods used in attachment-based treatment in an outpatient infant mental health clinic. Parental sensitivity towards infants and toddlers needs is considered significant in developing secure attachment. Secure attachment is further considered decisive for mental health and the extent to which children are at risk of developing mental health problems. Different trea…

Semi-structured interviewMaleParentsCoping (psychology)lcsh:RC435-571Parental sensitivityEmotionsVideo RecordingAttachmentAnxietyVideo interaction guidancePort of entryDevelopmental psychology03 medical and health sciences0302 clinical medicineChild Developmentlcsh:PsychiatryAdaptation PsychologicalAttachment theoryHumans030212 general & internal medicineParent-Child RelationsInfant mental healthInfants and toddlersVDP::Samfunnsvitenskap: 200::Psykologi: 260::Utviklingspsykologi: 265DepressionInfant NewbornInfantMental health030227 psychiatryMarte MeoPsychiatry and Mental healthCross-Sectional StudiesMental HealthReflective functionFemaleParents experiencesPsychologyResearch ArticleBMC Psychiatry
researchProduct