Search results for "attacks"
showing 10 items of 40 documents
Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs
2009
The underlining assumption of this paper is that developing countries are in a fragile state nowadays. Economically, they have been seriously harmed by the 2008 crisis1 but this is not the end of the story: the future still has pitfalls in which these economies might get trapped, due to their enhanced vulnerability to exogenous shocks generated by financial globalization. Ideologically, the recent events have triggered a serious backlash against capitalism, particularly the Anglo-Saxon template. Getting an insight into the causes and implications of global economic crises is therefore critical for policy-makers in emerging economies. History might be a good adviser in this respect. Lessons …
Skelettveränderungen bei Frühgeborenen mit Kupfermangel
1991
We describe 5 preterm infants (25th to 30th week of gestation) suffering from alimentary copper deficiency. The diagnosis was confirmed by low serum copper and caeruloplasmin concentrations. Characteristic clinical findings were repeated apnoeic attacks, hypopigmentation of skin and hair, anaemia, neutropenia and leucopenia refractory to other therapy, as well as increasing serum alkaline phosphatase activity in the first month of life. Starting in the 3rd to 12th week of life the radiographic findings were general skeletal osteoporosis and retardation, metaphyseal radiodense lines, irregular metaphyses, cupping and spurring of the metaphyses, followed by multiple fractures and subperiostea…
Safety and efficacy of endovascular treatment for carotid artery stenoses using proximal protection systems : 30-day follow-up
2017
Introduction. Although surgical endarterectomy remains the treatment of choice for carotid artery stenosis, carotid artery stenting (CAS) with use of proximal protection systems (PPS) plays an important role as alternative treatment modality, especially in high risk patients. This study was aimed at the assessment of safety of CAS with use of the PPS and also at identification of risk factors associated with this procedure. Material and methods. This was a post hoc analysis, with 30-day follow-up. We analysed results of treatment of 94 patients who underwent 97 CAS with PPS, 47 such procedures in asymptomatic, and 50 in symptomatic individuals. Results. There were 0 strokes during 30-day fo…
Cortical hypoactivity or reduced efficiency of cortical inhibition in migraine?. vol. 27, pp. 187-188.
2007
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
2020
IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…
AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks
2023
The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
2022
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…
Arctic Connect Project and Cyber Security Control, ARCY
2019
The submarine communication cables form a vast network on the seabed and transmit massive amounts of data across oceans. They provide over 95% of international telecommunications — not via satellites as is commonly assumed. The global submarine network is the “backbone” of the Internet, and enables the ubiquitous use of mail, social media, phone and banking services. To these days no any other technology than submarine cables systems has not been such a strategic impact to our society without being known it as such by the people. This also means that it is at the same time a very interesting destination for hackers, cyber attackers, terrorist and state actors. They seek to gain access to in…
E-health systems in digital environments
2019
As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…