Search results for "attack"

showing 10 items of 221 documents

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

Una strategia nazionale a difesa del Cyberspazio

2023

L’articolo intende proporre un’analisi circa lo stato dell’arte della sicurezza ci- bernetica in Italia, prestando particolare attenzione alle principali novità conte- nute all’interno della Strategia Nazionale di Cybersicurezza 2022-2026. Nello specifico, dopo aver offerto un inquadramento giuridico del fenomeno degli at- tacchi informatici, il contributo intende approfondire con una visione critica le future sfide che vedranno l’Italia e l’Europa protagoniste nella difesa del pro- prio “dominio cibernetico”. The article intends to propose an analysis about the state of the art of cyber security in Italy, paying particular attention to the main innovations contained in the National Cyberse…

Cyber-security National StrategyNIS DirectiveSettore IUS/10 - Diritto Amministrativocyber-security laworganization of cyber-securitylaw of cyber-attacksicurezza cibernetica – Strategia Nazionale di Cybersicurezza – Direttiva NIS – attacchi cibernetici – organizzazione della sicurezza cibernetica
researchProduct

Long-term efficacy of danazol treatment in hereditary angioedema

2010

Background No systematic study has been published yet on the long-term efficacy of attenuated androgens in hereditary angioedema (HAE). Our aim was to conduct a follow-up study in two (German and Hungarian) cohorts of HAE patients (45 and 39 patients, respectively) undergoing uninterrupted treatment for 6 years with similar (starting dose 128 ± 78 mg per day and 136 ± 70 mg per day, respectively) and constant doses of danazol. Design The frequencies of subcutaneous, abdominal and laryngeal attacks were recorded each year. Results The annual frequency of all the three types of attacks was significantly lower during the first year of danazol treatment, compared to the last year before baselin…

Danazolmedicine.medical_specialtybusiness.industryClinical BiochemistryGender distributionGeneral Medicinemedicine.diseaseBiochemistrySurgeryInternal medicineHereditary angioedemaFemale patientCohortmedicineAnalysis of varianceYoung adultAttack frequencybusinessmedicine.drugEuropean Journal of Clinical Investigation
researchProduct

FLOW PATTERN AROUND THE RIGID CEPHALIC SHIELD OF THE DEVONIAN AGNATHANERRIVASPIS WAYNENSIS(PTERASPIDIFORMES: HETEROSTRACI)

2008

Palaeozoic armoured agnathans (or ostraco- derms) are characterised by having an external, bone shield enclosing the anterior part of their bodies, which demon- strate great diversity of both forms and sizes. The functional significance of these cephalic shields remains unclear (they may have been a functional analogue of the vertebral col- umn, or merely afforded protection). Here we assess the importance of the cephalic shield in terms of locomotion. In order to do this, we have studied flow patterns of the Devo- nian heterostracan Errivaspis waynensis (White, 1935), using an anatomically correct model of E. waynensis positioned at different pitching angles. The fluid flow was visualised …

Delta wingbiologyAngle of attackPaleontologyGeometryAnatomybiology.organism_classificationVortexLift (force)PaleontologyShieldVortex liftErrivaspisEcology Evolution Behavior and SystematicsGeologyWind tunnelPalaeontology
researchProduct

Factors associated with early recurrence at the first evaluation of patients with transient ischemic attack.

2014

Abstract We aimed to identify factors easily collected at admission in patients with transient ischemic attack (TIA) that were associated with early recurrence, so as to guide clinicians’ decision-making about hospitalization in routine practice. From September 2011 to January 2013, all TIA patients who were referred to the University Hospital of Dijon, France, were identified. Vascular risk factors and clinical information were collected. The etiology of the TIA was defined according to the results of complementary examinations performed at admission as follows: large artery atherosclerosis (LAA-TIA) TIA, TIA due to atrial fibrillation (AF-TIA), other causes, and undetermined TIA. Logistic…

Diagnostic ImagingMalemedicine.medical_specialtyEarly RecurrenceHypercholesterolemiaCoronary DiseaseLogistic regressionPatient AdmissionRecurrenceRisk FactorsPhysiology (medical)Internal medicineparasitic diseasesEpidemiologyAtrial FibrillationmedicineDiabetes MellitusHumanscardiovascular diseasesStrokeAgedAged 80 and overbusiness.industrySmokingAtrial fibrillationCardiovascular AgentsGeneral MedicineOdds ratioLength of StayMiddle Agedmedicine.diseaseAtherosclerosisConfidence intervalnervous system diseasesSurgeryNeurologyIschemic Attack TransientHypertensionEtiologySurgeryFemaleNeurology (clinical)FranceEmergenciesbusinessJournal of clinical neuroscience : official journal of the Neurosurgical Society of Australasia
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Detection of behavioural patterns in Olympic male taekwondo athletes

2017

The relationship between athletes’ behaviours is relevant for developing defensive and offensive strategies. Traditionally, sequential analysis has been conducted to assess relationships between two behaviours (one considered as focal and the other as conditioned). The aim of the study was to examine Olympic taekwondo athletes’ behavioural patterns by conducting sequential analyses of tactical actions in bouts. Seventy-five male matches of the London Olympic Games in 2012 were studied to analyse tactical actions: attack (direct and indirect), counterattack (anticipatory, simultaneous and posterior), defensive (cuts, blocks and dodges), and opening actions. A sequential analysis of 2 lags (i…

Empirical dataTaekwondoOlympic athletesPhysical Therapy Sports Therapy and RehabilitationSequences050105 experimental psychology03 medical and health sciences0302 clinical medicineEducación Física y Deportiva0501 psychology and cognitive scienceslcsh:Sports medicinebiologyAthletes05 social sciencesOffensiveStrategy trainingbiology.organism_classificationCounterattackEducació InvestigacióAction (philosophy)Educació físicalcsh:RC1200-1245PsychologySocial psychology030217 neurology & neurosurgeryTactics
researchProduct

Different Wings Flowfields Interaction on the Wing-Propeller Coupling

1997

A high-portability numerical technique based on the method of free wake analysis (FWA) is described that analyzes the interference between an aircraft propeller and a wing having different planforms and computes the influence of the wing aerodynamic field on the propeller performance. For an isolated propeller and wing, the models employed are based on the FWA and Prandtl theory, respectively. The performance of the propeller in the presence of the wing is related to the wing angle of attack and to the variation of wing circulation and the corresponding induced velocity at the propeller disk. A numerical model, previously and successfully used, was implemented to account for the effects of …

Engineeringanimal structuresbusiness.product_categoryAngle of attackbusiness.industrymusculoskeletal neural and ocular physiologyPropeller (aeronautics)Blade pitchtechnology industry and agricultureAerospace EngineeringWing configurationmacromolecular substancesMechanicsAirplanebody regionsWashout (aeronautics)Wing twistPropulsorbusinessMarine engineeringJournal of Aircraft
researchProduct

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context

2021

Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…

ExploitComputer sciencebusiness.industryCyber-physical systemevasion attacksEvasion (network security)Context (language use)Adversarial machine learningComputer securitycomputer.software_genreadversarial machine learningdefensive mechanismscyber-physical systemAdversarial systemSmart lockkoneoppiminenälytekniikkabusinesskyberturvallisuuscomputerverkkohyökkäyksetBuilding automation
researchProduct

Eliciting Information on the Vulnerability Black Market from Interviews

2010

Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…

ExploitComputer sciencebusiness.industryInternet privacycomputer.software_genreComputer securitySoftware qualityElectronic mailComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSMalwareBlack marketbusinesscomputerZero-day attackVulnerability (computing)2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct