Search results for "ATTAC"

showing 10 items of 610 documents

Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic

2021

Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…

threat detectionorganisaatiotTK5101-6720threat analysiscyber defensetietotekniikkacybersecurity frameworktestauscyber attack simulationTelecommunicationsimulointisoctietoturvakyberturvallisuusverkkohyökkäyksetexploitationpalomuurit (tietoturva)
researchProduct

APT Cyber-attack Modelling: Building a General Model

2022

The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early…

tietoverkkorikoksetmallintaminenAPT attackkyberrikollisuuscyber securitycyber-attack modeltietoturvavarautuminenkyberturvallisuusverkkohyökkäyksetInternational Conference on Cyber Warfare and Security
researchProduct

Palvelunestohyökkäysten havainnointi ja torjuminen tilastollisilla menetelmillä

2015

Palvelunestohyökkäykset ovat ajankohtaisena ongelmana tärkeä tutkimuksen kohde. Palvelunestohyökkäysten torjumiseen tarvitaan menetelmiä, joilla palvelua kuormittava hyökkäysliikenne voidaan erottaa tavallisesta verkkoliikenteestä. Tämän tutkimuksen tavoitteena on perehtyä palvelunestohyökkäysten toimintaan ja selvittää, mitä tilastollisia torjumismenetelmiä hyökkäysten torjumiseen käytetään. Tutkimuksessa selvitettiin palvelunestohyökkäysten yleiset pääpiirteet ja luokiteltiin hyökkäykset kahteen pääluokkaan. Lisäksi tutkimuksessa tunnistettiin neljä eri tilastollista torjumismenetelmää. Palvelunestohyökkäysten torjuminen on haasteellista, eikä yleiskäyttöistä torjumismenetelmää ole kehite…

tilastollinenpalvelunestohyökkäysdenial-of-service attackstatistical
researchProduct

Sounding Together: Family-Centered Music Therapy as Facilitator for Parental Singing During Skin-to-Skin Contact

2017

Introduction: When it comes to the delicate relationship between a baby and its parents, the voices of the parents have a significant role in communicating love, tenderness, and closeness as well as in supporting self-regulation as necessary for secure attachment. Under suboptimal experiences, such as premature birth, infant-directed singing takes on an even more important and therapeutic role since preterm infants miss the finely attuned auditory stimulation of the womb and the mother-infant dyad is disrupted too early.

toMusic therapySkin to skinCloseness2800 General Neuroscience610 Medicine & health3200 General Psychology2700 General Medicine10027 Clinic for NeonatologyMusic therapist Preterm infants FamilyhumanitiesDevelopmental psychology03 medical and health sciences0302 clinical medicinecentered intervention Parental voice SkinAuditory stimulation030225 pediatricsFacilitatorAttachment theory030212 general & internal medicineSingingPsychologyskin contactDyad
researchProduct

Infantile trauma: representations of self, others and relationships and problematic behaviours in maltreated children.

2016

Literature suggests that different types of early traumatic experiences (such as child maltreatment) have an impact on children’s psychological well-being, especially, in terms of understanding and expectations of relationships, representations of self and others and on their emotion regulation. This can influence their attachment pattern and their emotional and behavioural development. Narrative tasks, such as the Story Stem Assessment Profile, offer the children an opportunity to express their expectations about themselves, others and relationships, especially attachment relationships (Hodges & Steele, 2000; Hodges, Steele, Kaniuk, Hillman & Asquith, 2009). An area of research tha…

traumaSettore M-PSI/07 - Psicologia Dinamicatrauma; abuse; attachmentabuseattachment
researchProduct

Le transport narratif au coeur de l'expérience d'un dispositif transmédia

2017

The aim of this paper is to describe how consumers experience transmedia devices. Thanks to transmedia major components (narrative universe; platforms and rabbit holes; interactivity; and temporality), once it adheres to it, the user of a transmedia devices lives an experience characterized by participation, immersion and commitment, and, at the end, it leads him to be attached to the object of narration. These results guide to propose a model which emphasizes the central place of narrative transportation in the context of fictional universes presented via transmedia strategy.

user experiencetransmédiaparticipation[SHS.GESTION]Humanities and Social Sciences/Business administrationattachementNarrative transportation[SHS.GESTION] Humanities and Social Sciences/Business administrationtransmedia storytellingexpérience utilisateurTransport narratifengagement
researchProduct

Occlusion-derived baculovirus: interaction with human cells and evaluation of the envelope protein P74 as a surface display platform.

2008

To develop complementary baculovirus-based tools for gene delivery and display technologies, the interaction of occlusion-derived baculovirus (ODV) with human cells, and the functionality of the P74 ODV envelope protein for display of the IgG-binding Z domains (ZZP74) were evaluated. The cellular binding of ODV was concentration-dependent and saturable. Only minority of the bound virions were internalized at both 37 and 4 degrees C, suggesting usage of direct membrane fusion as the entry mode. The intracellular transport of ODV was confined in vesicular structures peripheral to the plasma membrane, impeding subsequent nuclear entry and transgene expression. Transduction of ODV was not rescu…

virusesBlotting WesternVirus AttachmentBioengineeringBiologyGene deliverySpodopteraApplied Microbiology and BiotechnologyCell Linechemistry.chemical_compoundTransduction (genetics)Viral envelopeMicroscopy Electron TransmissionViral Envelope ProteinsCell Line TumorAnimalsHumansMicroscopy ConfocalfungiLipid bilayer fusionSodium butyrateGeneral MedicineMolecular biologyFusion proteinCell biologyNocodazolechemistryCell cultureElectrophoresis Polyacrylamide GelBaculoviridaeBiotechnologyJournal of biotechnology
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Otwarty katalog sposobów zabezpieczenia majątku dłużnika w postępowaniu w przedmiocie ogłoszenia upadłości na zasadach ogólnych

2020

Przedmiotem niniejszego opracowania jest udzielenie odpowiedzi na pytanie czy uregulowany w ustawie Prawo upadłościowe katalog sposobów zabezpieczenia majątku dłużnika na etapie postępowania w przedmiocie ogłoszenia upadłości ma charakter otwarty czy zamknięty? Prezentowana jest teza, że katalog sposobów zabezpieczenia ma charakter otwarty. W konsekwencji dopuszczalnym sposobem zabezpieczenia majątku dłużnika jest uchylenie zajęcia egzekucyjnego wierzytelności przysługujących dłużnikowi. Uchylenie zajęcia egzekucyjnego wierzytelności przysługujących dłużnikowi nie zostało wprost przewidziane przez ustawę jako sposób zabezpieczenia majątku dłużnika.

zabezpieczenie majątku dłużnikasecurity for the debtor’s assetsmethod of securityset aside attachment of the claimuchylenie zajęcia wierzytelnościsposób zabezpieczeniapostępowanie w przedmiocie ogłoszenia upadłościbankruptcy proceedingsStudia Prawnicze. Rozprawy i materiały
researchProduct