Search results for "Crypt"
showing 10 items of 1111 documents
Analyzing Cascading Effects in Interdependent Critical Infrastructures
2018
International audience; Critical Infrastructures (CIs) are resources that are essential for the performance of society, including its economy and its security. Large-scale disasters, whether natural or man-made, can have devastating primary (direct) effects on some CI and significant indirect effects (cascading effects) on other CIs, because CIs are interconnected and depend on each other’s services. Recent work by Laugé et al. expressed the dependency values among CIs as dependency matrices for various durations of the primary CI failure. For better preparedness and mitigation of CI failures knowledge of the weak points in CI interdependencies is crucial. To this effect, we have developed …
Ensuring the Reliability of an Autonomous Vehicle
2017
International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Ziziphora tenuior L. essential oil from Dana Biosphere Reserve (Southern Jordan); chemical characterization and assessment of biological activities
2016
Abstract Ethnopharmacologic relevance Ziziphora tenuior L. (Lamiaceae) is a medicinal plant in Jordan, which is included in various antimicrobial, antiseptic, expectorant and wound healing preparations. It is used for the treatment of cough, stomach ache, dysentery, fever, uterus infection, gut inflammation and painful menstruation. Aim of the study The aim of this study was to assess, for the first time, the chemical composition of the essential oil of Z. tenuior originated from southern Jordan and its antifungal effects against several yeasts. Concomitantly, the mechanisms behind the anti-fungal activity against Candida albicans were also disclosed. Since the Z. tenuior traditional uses a…
Assessment of the Antimicrobial Activity and the Entomocidal Potential of Bacillus thuringiensis Isolates from Algeria.
2017
This work represents the first initiative to analyze the distribution of B. thuringiensis in Algeria and to evaluate the biological potential of the isolates. A total of 157 isolates were recovered, with at least one isolate in 94.4% of the samples. The highest Bt index was found in samples from rhizospheric soil (0.48) and from the Mediterranean area (0.44). Most isolates showed antifungal activity (98.5%), in contrast to the few that had antibacterial activity (29.9%). A high genetic diversity was made evident by the finding of many different crystal shapes and various combinations of shapes within a single isolate (in 58.4% of the isolates). Also, over 50% of the isolates harbored cry1, …
Fungal Infections of the Central Nervous System in Children.
2017
Although uncommon in children, fungal infections of the central nervous system can be devastating and difficult to treat. A better understanding of basic mycologic, immunologic, and pharmacologic processes has led to important advances in the diagnosis and management of these diseases, but their mortality rates remain unacceptably high. In this focused review, we examine the epidemiology and clinical features of the most common fungal pathogens of the central nervous system in children and explore recent advances in diagnosis and antifungal therapy.
Anhydrobiosis and Dehydration of Yeasts
2017
Anhydrobiosis is a unique phenomenon of nature which gives possibility to various live organisms to survive during very hot and dry seasons of the year. It is the state in which all processes of metabolism are temporarily reversibly suspended as the result of strong dehydration of the cells. The state of anhydrobiosis is used for industrial production of active dry yeasts. Results of detailed studies of mechanisms of anhydrobiosis and of changes in the cells which take place during their drying by different methods help to improve the dehydration resistance of yeast strains necessary in traditional and nonconventional biotechnologies. The progress which has been made in these researches wit…
Impact of high-pressure processing on the stability and bioaccessibility of bioactive compounds in Clementine mandarin juice and its cytoprotective e…
2020
Mandarin juice is a rich source of antioxidant bioactive compounds. While the content and profile of bioactives are known, the impact of high-pressure processing (HPP) on their stability and bioaccessibility (BA) is unknown, but may allow obtaining safe, nutritious, and fresh-tasting juices with highly extractable bioactive compounds. The stability and BA of bioactive antioxidant compounds in untreated and HPP-treated (400 MPa/40 °C/1 min) Clementine mandarin juices, and the cytoprotective effect of its bioaccessible fractions (BF) obtained after simulated gastrointestinal digestion against H2O2-induced oxidative stress in differentiated Caco-2 cells were investigated. The BF of HPP-treated…
Disease–Genes Must Guide Data Source Integration in the Gene Prioritization Process
2019
One of the main issues in detecting the genes involved in the etiology of genetic human diseases is the integration of different types of available functional relationships between genes. Numerous approaches exploited the complementary evidence coded in heterogeneous sources of data to prioritize disease-genes, such as functional profiles or expression quantitative trait loci, but none of them to our knowledge posed the scarcity of known disease-genes as a feature of their integration methodology. Nevertheless, in contexts where data are unbalanced, that is, where one class is largely under-represented, imbalance-unaware approaches may suffer a strong decrease in performance. We claim that …