Search results for "attacks"
showing 10 items of 40 documents
Caspase-3 contributes to ZO-1 and Cl-5 tight-junction disruption in rapid anoxic neurovascular unit damage.
2011
BACKGROUND: Tight-junction (TJ) protein degradation is a decisive step in hypoxic blood-brain barrier (BBB) breakdown in stroke. In this study we elucidated the impact of acute cerebral ischemia on TJ protein arrangement and the role of the apoptotic effector protease caspase-3 in this context. METHODOLOGY/PRINCIPAL FINDINGS: We used an in vitro model of the neurovascular unit and the guinea pig whole brain preparation to analyze with immunohistochemical methods the BBB properties and neurovascular integrity. In both methodological approaches we observed rapid TJ protein disruptions after 30 min of oxygen and glucose deprivation or middle cerebral artery occlusion, which were accompanied by…
The emotional timeline of September 11, 2001.
2010
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks
2023
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…
Nothing Left but the Core of Murmurs? : Attacks on Linking as Communication in Beckett’s The Unnamable
2022
Literary studies have usually interpreted Samuel Beckett’s The Unnamable (1959) to reflect an area void of meaning and inaccessible to representation. The present article, by contrast, argues that Beckett experientially communicates archaic psychic reality where certain contents develop in an interpersonal relationship. The article offers psychoanalytical close readings of a few key passages in the text, where the function that is integrated in the narrative voice and actively destroys connections manifests itself on different textual levels. Using the psychoanalyst Avner Bergstein’s interpretation of Wilfred Bion’s concept, “attacks on linking”, as a paradoxical form of communication, the …
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…
2022
Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Drones in cyber security environment
2019
Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…
Propagation of Bankruptcy Risk over Scale-Free Economic Networks.
2022
The propagation of bankruptcy-induced shocks across domestic and global economies is sometimes very dramatic; this phenomenon can be modelled as a dynamical process in economic networks. Economic networks are usually scale-free, and scale-free networks are known to be vulnerable with respect to targeted attacks, i.e., attacks directed towards the biggest nodes of the network. Here we address the following question: to what extent does the scale-free nature of economic networks and the vulnerability of the biggest nodes affect the propagation of economic shocks? We model the dynamics of bankruptcies as the propagation of financial contagion across the banking sector over a scale-free network…