Search results for "attack"
showing 10 items of 221 documents
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
Una strategia nazionale a difesa del Cyberspazio
2023
L’articolo intende proporre un’analisi circa lo stato dell’arte della sicurezza ci- bernetica in Italia, prestando particolare attenzione alle principali novità conte- nute all’interno della Strategia Nazionale di Cybersicurezza 2022-2026. Nello specifico, dopo aver offerto un inquadramento giuridico del fenomeno degli at- tacchi informatici, il contributo intende approfondire con una visione critica le future sfide che vedranno l’Italia e l’Europa protagoniste nella difesa del pro- prio “dominio cibernetico”. The article intends to propose an analysis about the state of the art of cyber security in Italy, paying particular attention to the main innovations contained in the National Cyberse…
Long-term efficacy of danazol treatment in hereditary angioedema
2010
Background No systematic study has been published yet on the long-term efficacy of attenuated androgens in hereditary angioedema (HAE). Our aim was to conduct a follow-up study in two (German and Hungarian) cohorts of HAE patients (45 and 39 patients, respectively) undergoing uninterrupted treatment for 6 years with similar (starting dose 128 ± 78 mg per day and 136 ± 70 mg per day, respectively) and constant doses of danazol. Design The frequencies of subcutaneous, abdominal and laryngeal attacks were recorded each year. Results The annual frequency of all the three types of attacks was significantly lower during the first year of danazol treatment, compared to the last year before baselin…
FLOW PATTERN AROUND THE RIGID CEPHALIC SHIELD OF THE DEVONIAN AGNATHANERRIVASPIS WAYNENSIS(PTERASPIDIFORMES: HETEROSTRACI)
2008
Palaeozoic armoured agnathans (or ostraco- derms) are characterised by having an external, bone shield enclosing the anterior part of their bodies, which demon- strate great diversity of both forms and sizes. The functional significance of these cephalic shields remains unclear (they may have been a functional analogue of the vertebral col- umn, or merely afforded protection). Here we assess the importance of the cephalic shield in terms of locomotion. In order to do this, we have studied flow patterns of the Devo- nian heterostracan Errivaspis waynensis (White, 1935), using an anatomically correct model of E. waynensis positioned at different pitching angles. The fluid flow was visualised …
Factors associated with early recurrence at the first evaluation of patients with transient ischemic attack.
2014
Abstract We aimed to identify factors easily collected at admission in patients with transient ischemic attack (TIA) that were associated with early recurrence, so as to guide clinicians’ decision-making about hospitalization in routine practice. From September 2011 to January 2013, all TIA patients who were referred to the University Hospital of Dijon, France, were identified. Vascular risk factors and clinical information were collected. The etiology of the TIA was defined according to the results of complementary examinations performed at admission as follows: large artery atherosclerosis (LAA-TIA) TIA, TIA due to atrial fibrillation (AF-TIA), other causes, and undetermined TIA. Logistic…
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Detection of behavioural patterns in Olympic male taekwondo athletes
2017
The relationship between athletes’ behaviours is relevant for developing defensive and offensive strategies. Traditionally, sequential analysis has been conducted to assess relationships between two behaviours (one considered as focal and the other as conditioned). The aim of the study was to examine Olympic taekwondo athletes’ behavioural patterns by conducting sequential analyses of tactical actions in bouts. Seventy-five male matches of the London Olympic Games in 2012 were studied to analyse tactical actions: attack (direct and indirect), counterattack (anticipatory, simultaneous and posterior), defensive (cuts, blocks and dodges), and opening actions. A sequential analysis of 2 lags (i…
Different Wings Flowfields Interaction on the Wing-Propeller Coupling
1997
A high-portability numerical technique based on the method of free wake analysis (FWA) is described that analyzes the interference between an aircraft propeller and a wing having different planforms and computes the influence of the wing aerodynamic field on the propeller performance. For an isolated propeller and wing, the models employed are based on the FWA and Prandtl theory, respectively. The performance of the propeller in the presence of the wing is related to the wing angle of attack and to the variation of wing circulation and the corresponding induced velocity at the propeller disk. A numerical model, previously and successfully used, was implemented to account for the effects of …
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
2021
Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…