Search results for "attack"

showing 10 items of 221 documents

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Scenekunstens (for)handlingsrom etter 22. juli

2019

In this article I discuss theatre’s scope of action after the 2011 terror attacks in Norway (“22. July”), with an emphasis on independent theatre, aesthetic heteronomy and the public sphere. A theatre manager’s (Jon Refsdal Moe) retrospect account of and reflections upon a case of self-censoring is the starting point for my (re-)examination of the arguments and dynamics concerning some of the most prominent contentious 22. July performances. I discuss how the controversies can be understood and dealt with, and how they are connected to theatre’s scope of action and place in society today. In my argument, I differentiate between the public sphere as an arena for discussion and debate (which …

Teater og 22 juliMedia studiesTheatre and the terror attacks 07/22Offentlighet22 JulyVDP::Theatre studies: 172Peer review22. juliPolitical scienceFri scenekunstPublic spherePublic sphereVDP::Teatervitenskap: 172Independent theatre
researchProduct

Riflessioni comparatistiche sulla revoca della cittadinanza per reati di terrorismo

2023

l fenomeno dei cosiddetti “foreign fighters” e il verificarsi di attacchi terroristici in alcuni paesi dell’Unione europea hanno sollevato la questione relativa alla privazione della cittadinanza come misura di contrasto e tutela della sicurezza pubblica. Questo articolo intende contribuire al dibattito sulla legittimità giuridica di tale misura, esaminando i recenti sviluppi della legislazione in materia e le sue applicazioni in Belgio, Francia, Regno Unito e Italia.

The so-called "foreign fighters" phenomenon and the occurrence of terrorist attacks in some EU countries have raised the question of the deprivation of citizenship as a measure of contrast and protection of public security. This article aims to contribute to the debate on the legal legitimacy of that measure by examining recent developments of the legislation on the subject and its applications in Belgium France Uk and Italy.
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

Caspase-3 contributes to ZO-1 and Cl-5 tight-junction disruption in rapid anoxic neurovascular unit damage.

2011

BACKGROUND: Tight-junction (TJ) protein degradation is a decisive step in hypoxic blood-brain barrier (BBB) breakdown in stroke. In this study we elucidated the impact of acute cerebral ischemia on TJ protein arrangement and the role of the apoptotic effector protease caspase-3 in this context. METHODOLOGY/PRINCIPAL FINDINGS: We used an in vitro model of the neurovascular unit and the guinea pig whole brain preparation to analyze with immunohistochemical methods the BBB properties and neurovascular integrity. In both methodological approaches we observed rapid TJ protein disruptions after 30 min of oxygen and glucose deprivation or middle cerebral artery occlusion, which were accompanied by…

Time FactorsAnatomy and Physiologylcsh:MedicineMiceMolecular Cell BiologyPathologySignaling in Cellular ProcessesHypoxia Brainlcsh:ScienceCells CulturedNeuropathologyApoptotic SignalingMultidisciplinaryTight junctionCaspase 3ChemistryAnimal ModelsCell biologyTransport proteinProtein Transportmedicine.anatomical_structureNeurologyBlood-Brain BarrierMedicineResearch ArticleSignal TransductionClinical Research DesignCerebrovascular DiseasesGuinea PigsIschemiaContext (language use)Caspase 3Protein degradationBlood–brain barrierNeurological SystemTight JunctionsCapillary PermeabilityModel OrganismsDiagnostic MedicinemedicineAnimalsTransient Ischemic AttacksAnimal Models of DiseaseClaudinBiologyIschemic Strokelcsh:REndothelial CellsMembrane ProteinsPhosphoproteinsmedicine.diseaseAnatomical PathologyClaudinsImmunologyZonula Occludens-1 ProteinNervous System Componentslcsh:QPLoS ONE
researchProduct

The emotional timeline of September 11, 2001.

2010

Time FactorsInjury controlAccident preventionmedia_common.quotation_subjectWritingApplied psychologyEmotionsPoison controlAngerAngerAnxietyAdaptation PsychologicalmedicineHumansGeneral Psychologymedia_commonPsycholinguisticsCommunicationTimelinemedicine.diseaseSemanticsGriefMedical emergencyGriefSeptember 11 Terrorist AttacksPsychologyCell PhonePrejudiceSoftwarePsychological science
researchProduct

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

2015

Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…

Transport Layer SecurityNetwork securitybusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackIntrusion detection systemcomputer.software_genreApplication layerAnomaly detectionThe InternetData miningbusinesscomputerComputer network
researchProduct

On the pathogenesis of atherosclerosis: enzymatic transformation of human low density lipoprotein to an atherogenic moiety.

1995

Combined treatment with trypsin, cholesterol esterase, and neuraminidase transforms LDL, but not HDL or VLDL, to particles with properties akin to those of lipid extracted from atherosclerotic lesions. Single or double enzyme modifications, or treatment with phospholipase C, or simple vortexing are ineffective. Triple enzyme treatment disrupts the ordered and uniform structure of LDL particles, and gives rise to the formation of inhomogeneous lipid droplets 10-200 nm in diameter with a pronounced net negative charge, but lacking significant amounts of oxidized lipid. Enzymatically modified LDL (E-LDL), but not oxidatively modified LDL (ox-LDL), is endowed with potent complement-activating c…

Very low-density lipoproteinArteriosclerosisImmunologyNeuraminidaseComplement Membrane Attack Complexchemistry.chemical_compoundLipid dropletmedicineExtracellularImmunology and AllergyHumansTrypsinReceptors ImmunologicComplement ActivationGlycoproteinsReceptors Lipoproteinchemistry.chemical_classificationReceptors ScavengerPhospholipase CCholesterolMacrophagesMembrane ProteinsComplement C3Complement System ProteinsArticlesScavenger Receptors Class BSterol EsteraseTrypsinLipid MetabolismLipoproteins LDLEnzymechemistryBiochemistryLow-density lipoproteinlipids (amino acids peptides and proteins)medicine.drugFoam CellsThe Journal of experimental medicine
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct