Search results for "Crypt"
showing 10 items of 1111 documents
Domain Generation Algorithm Detection Using Machine Learning Methods
2018
A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…
Comments on “Failure, Identity Loss and Living Information Systems” by P. Kanellis, M. Lycett, and R.J. Paul
2000
Information system (IS) failure is a pervasive phenomenon. Like the paper’s introduction, common sense and statistics show information system failure is common and also important, because huge amounts of human effort and economic resources are spent without much gain. The issue of failure is also related to FRISCO report and the theme of the conference in two ways. First our concepts and ideas about information system and the nature of information system development can affect either positively or negatively our intellectual and technical capabilities to influence the likelihood of IS failure. Second, because information system definition forms one key concept and focus of the FRISCO report…
A Dynamic Viewpoint to Design Performance Management Systems in Academic Institutions: Theory and Practice
2014
This article illustrates how to design and apply Performance Management systems in academic institutions by identifying and modeling those factors affecting academic performance through a dynamic performance management view. Particularly, combining performance management with System Dynamics modeling may allow academic decision-makers to better identify key performance drivers for pursuing a sustainable performance improvement in universities. In the second section of the article, a number of examples based on empirical findings from a field project aimed at designing a dynamic performance management model for the University of Palermo (Italy) are discussed.
Privacy Preserving Client/Vertical-Servers Classification
2019
We present a novel client/vertical-servers architecture for hybrid multi-party classification problem. The model consists of clients whose attributes are distributed on multiple servers and remain secret during training and testing. Our solution builds privacy-preserving random forests and completes them with a special private set intersection protocol that provides a central commodity server with anonymous conditional statistics. Subsequently, the private set intersection protocol can be used to privately classify the queries of new clients using the commodity server’s statistics. The proviso is that the commodity server must not collude with other parties. In cases where this restriction …
Improved Magic Ink Signatures Using Hints
1999
We introduce two improvements to the recently proposed so called magic ink DSS signatures. A first improvement is that we reduce the overhead for tracing without noticeably increasing any other cost. The tracing cost is linear in the number of generated signatures in the original proposal; our improved version reduces this to a logarithmic cost in the common case. A second improvement is that we introduce a method for determining whether forged currency is in circulation, without affecting the privacy of honest users. Our improvements rely on our introducing a so called hint value. This is an encryption of the signature transcript received, submitted by the signature receiver. Part of the p…
Rapidly progressive organising pneumonia associated with cytomegalovirus infection in a patient with psoriasis.
2016
A 63-year-old woman experienced progressive respiratory distress and psoriatic plaques. The radiographic images showed diffuse interstitial infiltrates. The surgical open lung biopsy revealed an obliteration of the alveolar spaces by plugs of connective tissue distributed within the terminal bronchioles, alveolar ducts and spaces. No relevant cause was determined, and she was diagnosed with idiopathic organising pneumonia. The patient was discharged with oral glucocorticosteroid and supplemental oxygen therapy. One month later, the patient’s pulmonary status had progressively worsened, and she was re-admitted. She required higher oxygen concentrations and mechanical ventilation. Pharmacol…
X-Ray and NMR Studies on Host-Guest Inclusion Complex Formation between Crown Ethers and Pyridinium Compounds
1998
Aromatic–aromatic, π–π, and cation–π interactions can be exploited in the preparation of molecular complexes between benzene-substituted crown ethers and pyridium cations. These complexes have been studied in the gas phase, in solution, and in the solid state; the structure of one of the complexes is depicted on the right.
Crypthecodinium cohnii Growth and Omega Fatty Acid Production in Mediums Supplemented with Extract from Recycled Biomass
2022
Crypthecodinium cohnii is a marine heterotrophic dinoflagellate that can accumulate high amounts of omega-3 polyunsaturated fatty acids (PUFAs), and thus has the potential to replace conventional PUFAs production with eco-friendlier technology. So far, C. cohnii cultivation has been mainly carried out with the use of yeast extract (YE) as a nitrogen source. In the present study, alternative carbon and nitrogen sources were studied: the extraction ethanol (EE), remaining after lipid extraction, as a carbon source, and dinoflagellate extract (DE) from recycled algae biomass C. cohnii as a source of carbon, nitrogen, and vitamins. In mediums with glucose and DE, the highest specific biomass gr…
Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks
2020
International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…
"Table 4" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."
2006
Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.