Search results for "attacks"

showing 10 items of 40 documents

Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs

2009

The underlining assumption of this paper is that developing countries are in a fragile state nowadays. Economically, they have been seriously harmed by the 2008 crisis1 but this is not the end of the story: the future still has pitfalls in which these economies might get trapped, due to their enhanced vulnerability to exogenous shocks generated by financial globalization. Ideologically, the recent events have triggered a serious backlash against capitalism, particularly the Anglo-Saxon template. Getting an insight into the causes and implications of global economic crises is therefore critical for policy-makers in emerging economies. History might be a good adviser in this respect. Lessons …

financial globalizationcurrency criseslcsh:HB71-74international reservesspeculative attackslcsh:Economics as a scienceregulationcapital controlsjel:F41money mercantilismfinancial globalization money mercantilism currency crises international reserves speculative attacks capital controls regulationReview of Economic and Business Studies
researchProduct

Skelettveränderungen bei Frühgeborenen mit Kupfermangel

1991

We describe 5 preterm infants (25th to 30th week of gestation) suffering from alimentary copper deficiency. The diagnosis was confirmed by low serum copper and caeruloplasmin concentrations. Characteristic clinical findings were repeated apnoeic attacks, hypopigmentation of skin and hair, anaemia, neutropenia and leucopenia refractory to other therapy, as well as increasing serum alkaline phosphatase activity in the first month of life. Starting in the 3rd to 12th week of life the radiographic findings were general skeletal osteoporosis and retardation, metaphyseal radiodense lines, irregular metaphyses, cupping and spurring of the metaphyses, followed by multiple fractures and subperiostea…

medicine.medical_specialtybusiness.industryOsteoporosisNeutropeniamedicine.diseaseSurgeryRefractorymedicineGestationRadiology Nuclear Medicine and imagingApnoeic attacksmedicine.symptomMultiple fracturesbusinessCopper deficiencyHypopigmentationRöFo - Fortschritte auf dem Gebiet der Röntgenstrahlen und der bildgebenden Verfahren
researchProduct

Safety and efficacy of endovascular treatment for carotid artery stenoses using proximal protection systems : 30-day follow-up

2017

Introduction. Although surgical endarterectomy remains the treatment of choice for carotid artery stenosis, carotid artery stenting (CAS) with use of proximal protection systems (PPS) plays an important role as alternative treatment modality, especially in high risk patients. This study was aimed at the assessment of safety of CAS with use of the PPS and also at identification of risk factors associated with this procedure. Material and methods. This was a post hoc analysis, with 30-day follow-up. We analysed results of treatment of 94 patients who underwent 97 CAS with PPS, 47 such procedures in asymptomatic, and 50 in symptomatic individuals. Results. There were 0 strokes during 30-day fo…

medicine.medical_specialtybusiness.industrymedicine.medical_treatmentTransient ischaemic attacksmedicine.diseaseAsymptomaticSurgeryStenosismedicine.anatomical_structurestentsmedicine.arteryInternal medicinePost-hoc analysisCardiologyproximal protection systemsMedicineMyocardial infarctionInternal carotid arterymedicine.symptomCardiology and Cardiovascular Medicinebusinesscarotid angioplastyArteryEndarterectomy
researchProduct

Cortical hypoactivity or reduced efficiency of cortical inhibition in migraine?. vol. 27, pp. 187-188.

2007

migraine disorders migraine attacks
researchProduct

IoT -based adversarial attack's effect on cloud data platform services in a smart building context

2020

IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…

pilvipalvelutadversarial attacksartificial intelligence-based applicationsälytalotälytekniikkaesineiden internetattack vectorscloud servicetekoälytietoturvadata platformverkkohyökkäykset
researchProduct

AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks

2023

The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…

quantum encryptioncyber threatedge-intelligence systemscyber-attacksAI-based analysingtekoälykyberturvallisuusverkkohyökkäykset
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience

2022

To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…

resilienssishipcybersecurityGeneral Computer ScienceAISGeneral EngineeringresiliencyGeneralLiterature_MISCELLANEOUSattacksmaritimelaivatmerenkulkuidentifiointiGeneral Materials ScienceDoSkyberturvallisuusverkkohyökkäyksetIEEE Access
researchProduct

Arctic Connect Project and Cyber Security Control, ARCY

2019

The submarine communication cables form a vast network on the seabed and transmit massive amounts of data across oceans. They provide over 95% of international telecommunications — not via satellites as is commonly assumed. The global submarine network is the “backbone” of the Internet, and enables the ubiquitous use of mail, social media, phone and banking services. To these days no any other technology than submarine cables systems has not been such a strategic impact to our society without being known it as such by the people. This also means that it is at the same time a very interesting destination for hackers, cyber attackers, terrorist and state actors. They seek to gain access to in…

submarinescablescable communicationsea cablesoptical cablescyber attacks
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct