Search results for "attacks"

showing 10 items of 40 documents

Caspase-3 contributes to ZO-1 and Cl-5 tight-junction disruption in rapid anoxic neurovascular unit damage.

2011

BACKGROUND: Tight-junction (TJ) protein degradation is a decisive step in hypoxic blood-brain barrier (BBB) breakdown in stroke. In this study we elucidated the impact of acute cerebral ischemia on TJ protein arrangement and the role of the apoptotic effector protease caspase-3 in this context. METHODOLOGY/PRINCIPAL FINDINGS: We used an in vitro model of the neurovascular unit and the guinea pig whole brain preparation to analyze with immunohistochemical methods the BBB properties and neurovascular integrity. In both methodological approaches we observed rapid TJ protein disruptions after 30 min of oxygen and glucose deprivation or middle cerebral artery occlusion, which were accompanied by…

Time FactorsAnatomy and Physiologylcsh:MedicineMiceMolecular Cell BiologyPathologySignaling in Cellular ProcessesHypoxia Brainlcsh:ScienceCells CulturedNeuropathologyApoptotic SignalingMultidisciplinaryTight junctionCaspase 3ChemistryAnimal ModelsCell biologyTransport proteinProtein Transportmedicine.anatomical_structureNeurologyBlood-Brain BarrierMedicineResearch ArticleSignal TransductionClinical Research DesignCerebrovascular DiseasesGuinea PigsIschemiaContext (language use)Caspase 3Protein degradationBlood–brain barrierNeurological SystemTight JunctionsCapillary PermeabilityModel OrganismsDiagnostic MedicinemedicineAnimalsTransient Ischemic AttacksAnimal Models of DiseaseClaudinBiologyIschemic Strokelcsh:REndothelial CellsMembrane ProteinsPhosphoproteinsmedicine.diseaseAnatomical PathologyClaudinsImmunologyZonula Occludens-1 ProteinNervous System Componentslcsh:QPLoS ONE
researchProduct

The emotional timeline of September 11, 2001.

2010

Time FactorsInjury controlAccident preventionmedia_common.quotation_subjectWritingApplied psychologyEmotionsPoison controlAngerAngerAnxietyAdaptation PsychologicalmedicineHumansGeneral Psychologymedia_commonPsycholinguisticsCommunicationTimelinemedicine.diseaseSemanticsGriefMedical emergencyGriefSeptember 11 Terrorist AttacksPsychologyCell PhonePrejudiceSoftwarePsychological science
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Nothing Left but the Core of Murmurs? : Attacks on Linking as Communication in Beckett’s The Unnamable

2022

Literary studies have usually interpreted Samuel Beckett’s The Unnamable (1959) to reflect an area void of meaning and inaccessible to representation. The present article, by contrast, argues that Beckett experientially communicates archaic psychic reality where certain contents develop in an interpersonal relationship. The article offers psychoanalytical close readings of a few key passages in the text, where the function that is integrated in the narrative voice and actively destroys connections manifests itself on different textual levels. Using the psychoanalyst Avner Bergstein’s interpretation of Wilfred Bion’s concept, “attacks on linking”, as a paradoxical form of communication, the …

attacks on linkingBion Wilfredpsykoanalyyttinen kirjallisuudentutkimusprojective identificationcommunicationpsykoanalyytikottulkintatransferencetransferenssiBeckett Samuelinterpretationviestintä
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…

2022

Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…

cybersecurityATClentokoneetUAT978availabilitylentoliikennecodesaerospace electronicsattackstransceiversaircraft navigationcomputer crashesATMsurveillanceDoSlennonjohtokyberturvallisuusaircraftverkkohyökkäyksetlennonvarmistusADS-B1090EStietojärjestelmät
researchProduct

Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems

2020

Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…

defence mechanismsComputerApplications_COMPUTERSINOTHERSYSTEMStekoälypilvipalvelutadversarial attacksmachine learningkoneoppiminenArtificial Intelligencecloud data platformälytekniikkaesineiden internettietoturvakyberturvallisuusverkkohyökkäykset
researchProduct

Drones in cyber security environment

2019

Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…

elektroninen sodankäyntikybersodankäyntiintelligence and reconnaissancecyber securitysurveillancedroonittiedusteluunmanned aerial vehiclesmiehittämättömät ilma-aluksettarkkailucyber attacks
researchProduct

Propagation of Bankruptcy Risk over Scale-Free Economic Networks.

2022

The propagation of bankruptcy-induced shocks across domestic and global economies is sometimes very dramatic; this phenomenon can be modelled as a dynamical process in economic networks. Economic networks are usually scale-free, and scale-free networks are known to be vulnerable with respect to targeted attacks, i.e., attacks directed towards the biggest nodes of the network. Here we address the following question: to what extent does the scale-free nature of economic networks and the vulnerability of the biggest nodes affect the propagation of economic shocks? We model the dynamics of bankruptcies as the propagation of financial contagion across the banking sector over a scale-free network…

financial contagion; bankruptcy risk; scale-free networks; targeted attacks; Shannon entropyscale-free networkShannon entropyGeneral Physics and Astronomytargeted attackfinancial contagionbankruptcy riskEntropy (Basel, Switzerland)
researchProduct