Search results for "Crypt"

showing 10 items of 1111 documents

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Comments on “Failure, Identity Loss and Living Information Systems” by P. Kanellis, M. Lycett, and R.J. Paul

2000

Information system (IS) failure is a pervasive phenomenon. Like the paper’s introduction, common sense and statistics show information system failure is common and also important, because huge amounts of human effort and economic resources are spent without much gain. The issue of failure is also related to FRISCO report and the theme of the conference in two ways. First our concepts and ideas about information system and the nature of information system development can affect either positively or negatively our intellectual and technical capabilities to influence the likelihood of IS failure. Second, because information system definition forms one key concept and focus of the FRISCO report…

Psychoanalysisbusiness.industrymedia_common.quotation_subjectInternet privacyIdentity (social science)Common senseAffect (psychology)Focus (linguistics)PhenomenonKey (cryptography)Information systemSociologybusinessTheme (narrative)media_common
researchProduct

A Dynamic Viewpoint to Design Performance Management Systems in Academic Institutions: Theory and Practice

2014

This article illustrates how to design and apply Performance Management systems in academic institutions by identifying and modeling those factors affecting academic performance through a dynamic performance management view. Particularly, combining performance management with System Dynamics modeling may allow academic decision-makers to better identify key performance drivers for pursuing a sustainable performance improvement in universities. In the second section of the article, a number of examples based on empirical findings from a field project aimed at designing a dynamic performance management model for the University of Palermo (Italy) are discussed.

Public AdministrationPerformance managementComputer scienceacademic institutionperformance management systemField (computer science)System dynamicsManagementEngineering managementSettore SECS-P/07 - Economia AziendalePerformance engineeringKey (cryptography)system dynamics modelingBusiness and International ManagementPerformance improvementdynamic performance management viewfield projectacademic institutions performance management systems dynamic performance management view System Dynamics modeling field project
researchProduct

Privacy Preserving Client/Vertical-Servers Classification

2019

We present a novel client/vertical-servers architecture for hybrid multi-party classification problem. The model consists of clients whose attributes are distributed on multiple servers and remain secret during training and testing. Our solution builds privacy-preserving random forests and completes them with a special private set intersection protocol that provides a central commodity server with anonymous conditional statistics. Subsequently, the private set intersection protocol can be used to privately classify the queries of new clients using the commodity server’s statistics. The proviso is that the commodity server must not collude with other parties. In cases where this restriction …

Public-key cryptographyComputer sciencebusiness.industryServerCommoditySecure multi-party computationEffective methodArchitecturebusinessProtocol (object-oriented programming)Random forestComputer network
researchProduct

Improved Magic Ink Signatures Using Hints

1999

We introduce two improvements to the recently proposed so called magic ink DSS signatures. A first improvement is that we reduce the overhead for tracing without noticeably increasing any other cost. The tracing cost is linear in the number of generated signatures in the original proposal; our improved version reduces this to a logarithmic cost in the common case. A second improvement is that we introduce a method for determining whether forged currency is in circulation, without affecting the privacy of honest users. Our improvements rely on our introducing a so called hint value. This is an encryption of the signature transcript received, submitted by the signature receiver. Part of the p…

Public-key cryptographyTheoretical computer sciencebusiness.industryComputer scienceMagic (programming)PlaintextCryptographyEncryptionbusinessAlgorithmSecret sharing
researchProduct

Rapidly progressive organising pneumonia associated with cytomegalovirus infection in a patient with psoriasis.

2016

A 63-year-old woman experienced progressive respiratory distress and psoriatic plaques. The radiographic images showed diffuse interstitial infiltrates. The surgical open lung biopsy revealed an obliteration of the alveolar spaces by plugs of connective tissue distributed within the terminal bronchioles, alveolar ducts and spaces. No relevant cause was determined, and she was diagnosed with idiopathic organising pneumonia. The patient was discharged with oral glucocorticosteroid and supplemental oxygen therapy. One month later, the patient’s pulmonary status had progressively worsened, and she was re-admitted. She required higher oxygen concentrations and mechanical ventilation. Pharmacol…

Pulmonary and Respiratory MedicineGanciclovirPathologymedicine.medical_specialtyCyclophosphamidemedicine.medical_treatmentCongenital cytomegalovirus infectionlcsh:MedicineConnective tissueInterstitial disease connective diseaseSettore MED/10 - Malattie Dell'Apparato RespiratorioPsoriasismedicineHumansPsoriasiscytomegalovirus infectionInterstitial pneumoniaMechanical ventilationRespiratory distressbusiness.industrylcsh:RMiddle Agedmedicine.diseaseRegimenmedicine.anatomical_structureCryptogenic Organizing PneumoniaCytomegalovirus InfectionsFemaleCardiology and Cardiovascular Medicinebusinessmedicine.drugMonaldi archives for chest disease = Archivio Monaldi per le malattie del torace
researchProduct

X-Ray and NMR Studies on Host-Guest Inclusion Complex Formation between Crown Ethers and Pyridinium Compounds

1998

Aromatic–aromatic, π–π, and cation–π interactions can be exploited in the preparation of molecular complexes between benzene-substituted crown ethers and pyridium cations. These complexes have been studied in the gas phase, in solution, and in the solid state; the structure of one of the complexes is depicted on the right.

Pyridinium CompoundsChemistryOrganic ChemistryCryptandComplex formationX-raySolid-stateGeneral ChemistryCatalysisCrown CompoundsCrystallographyOrganic chemistryPi interactionHost–guest chemistryChemistry - A European Journal
researchProduct

Crypthecodinium cohnii Growth and Omega Fatty Acid Production in Mediums Supplemented with Extract from Recycled Biomass

2022

Crypthecodinium cohnii is a marine heterotrophic dinoflagellate that can accumulate high amounts of omega-3 polyunsaturated fatty acids (PUFAs), and thus has the potential to replace conventional PUFAs production with eco-friendlier technology. So far, C. cohnii cultivation has been mainly carried out with the use of yeast extract (YE) as a nitrogen source. In the present study, alternative carbon and nitrogen sources were studied: the extraction ethanol (EE), remaining after lipid extraction, as a carbon source, and dinoflagellate extract (DE) from recycled algae biomass C. cohnii as a source of carbon, nitrogen, and vitamins. In mediums with glucose and DE, the highest specific biomass gr…

QH301-705.5omega-3 fatty acidPharmaceutical Sciencefood and beveragesCrypthecodinium cohnii<i>Crypthecodinium cohnii</i>Article<i>Crypthecodinium cohnii</i>; omega-3 fatty acid; biomass recycling; dinoflagellate extract; FTIR spectroscopybiomass recyclingFTIR spectroscopyDrug Discoverydinoflagellate extractBiology (General)Pharmacology Toxicology and Pharmaceutics (miscellaneous)Marine Drugs
researchProduct

Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks

2020

International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…

Quality managementComputer scienceComputer Networks and CommunicationsReal-time computingCorrectness proofs020206 networking & telecommunicationsEnergy consumption02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Distributed algorithmControl and Systems Engineering[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Data accuracy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkEfficient energy use
researchProduct

"Table 4" of "Lowest Q**2 measurement of the gamma* p --&gt; delta reaction: Probing the pionic contribution."

2006

Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.

Quantitative Biology::Neurons and CognitionElectron productionQuantitative Biology::Molecular NetworksNuclear TheoryIntegrated Cross SectionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCross SectionSIG7.950E-017.950E-01E- P --&gt; E- PI0 PExclusiveNuclear Experiment1.221ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct