32,220 research outputs found

    Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

    Full text link
    Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.Comment: 5 Page

    Knowledge Nodes: the Building Blocks of a Distributed Approach to Knowledge Management

    Get PDF
    Abstract: In this paper we criticise the objectivistic approach that underlies most current systems for Knowledge Management. We show that such an approach is incompatible with the very nature of what is to be managed (i.e., knowledge), and we argue that this may partially explain why most knowledge management systems are deserted by users. We propose a different approach - called distributed knowledge management - in which subjective and social (in a word, contextual) aspects of knowledge are seriously taken into account. Finally, we present a general technological architecture in which these ideas are implemented by introducing the concept of knowledge node

    Are They for Real? Activism and Ironic Identities

    Get PDF
    A new breed of political activist has begun to appear on the streets and in the news. They are no longer trying to out-shout their opponents, but are agreeing with them instead, enthusiastically taking their adversary’s position to exaggerated extremes. It is a practice here termed “identity-nabbing,” in which participants pretend to be someone they are not, appearing in public as exaggerated caricatures of their opponents or ambiguously co-opting some of their power. This paper focuses on three groups in particular: The Billionaires for Bush, Reverend Billy, and the Yes Men. Each group stages elaborate, ironically humorous stunts as a means of attracting public attention to particular political/social issues. The ironic frame not only provides entertainment value, but also contains its own community-building function, as it requires the participation of the audience to actively read it ironically. Banking on the pre-existence of communities that share their assumptions and get the joke, these groups attempt to turn what Linda Hutcheon refers to as “discursive communities” into political communities (or counterpublics), urging people to actively identify with the importance of the issue at hand, and to continue circulating the critique. They rely on the co-participatory workings of irony to spur people into viewing themselves as a collective with collective power. None of these groups are aiming for revolutionary change, but by turning laughter over a shared joke into anger and engagement they work to attract attention, get others involved, and slowly shift debate

    Global Cyber Intermediary Liability: A Legal & Cultural Strategy

    Get PDF
    This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some level of injunctive relief, intermediaries operate in a largely unregulated environment. Part III looks at what we can learn from other countries. The cleanest intermediary country, Finland, and the worst country, Lithuania, were selected in order to explore the causes for the differences between country performances. The section examines the remarkable distinctions between national cultures to explain differences in national cybercrime rates. Part III.A of this Article argues that the criminal code laws do not account for the difference in host and ISP performances between Finland and Lithuania. There are few differences in the codified laws pertaining to cybercrime between these countries. Instead, it is Finland’s cultural and business environments that appear to drive its cybercrime ranking. Part IV suggests reforms to shift a country’s culture to make it less prone to corruption. However, changing a culture takes time so Part IV also proposes a private law scheme in which intermediaries are unable to wave the “flag of immunity,” as they do now. The guiding philosophy for this proposal is that harmed parties should be permitted to recover damages directly from “bad” intermediaries

    Intellectual Property Management Strategies to Accelerate the Development and Access of Vaccines and Diagnostics: Case Studies on Pandemic Influenza, Malaria and SARS

    Get PDF
    Achieving global access to vaccines, diagnostics, and pharmaceuticals remains a challenge. Throughout the developing world, intellectual property (IP) constraints complicate access to critically essential medical technologies and products. Vaccines for malaria and pandemic strains of influenza, as well as diagnostic and vaccine technologies for SARS, are not only relevant to global public health but are particularly critical to the needs of developing countries. A global access solution is urgently needed. This article offers a timely case‐by‐case analysis of preliminary patent landscape surveys and formulates options via patent pools and other forms of creative IP management to accelerate development and access. The analysis of the feasibility of patent pools reveals several impediments to patent pools: these include antitrust considerations, bargaining difficulties caused by asymmetric interests and asymmetric rights among IP holders (e.g. improvement vs. foundational patents), and the difficulties of securing financial support given the significant transaction costs associated with pools. Because of the above conceptual and operational hurdles, patent pools do not appear to be a feasible way to accelerate development. Other mechanisms, however, can ameliorate IP constraints. For example, a key IP constraint related to pandemic influenza vaccines R&D appears to have been resolved when Medimmune secured the assembly of all relevant reverse genetics IP and pledged broad access. Clearly, the landscape is complex and multidimensional. Licensing systems are not the only issue. Measures must also be taken to limit regulatory hurdles and enable the swift, legal production of pandemic influenza vaccines to meet the needs of developing countries. This is why a comprehensive analysis is so necessary. From a strictly legal perspective, IP systems work through the power to exclude. However, as this study’s exploration and formulation of creative licensing strategies reveals, it is also true that IP can be structured and managed to work through the “power to include.

    The TreaT-Assay: A Novel Urine-Derived Donor Kidney Cell-Based Assay for Prediction of Kidney Transplantation Outcome

    Get PDF
    Donor-reactive immunity plays a major role in rejection after kidney transplantation, but analysis of donor-reactive T-cells is not applied routinely. However, it has been shown that this could help to identify patients at risk of acute rejection. A major obstacle is the limited quantity or quality of the required allogenic stimulator cells, including a limited availability of donor-splenocytes or an insufficient HLA-matching with HLA-bank cells. To overcome these limitations, we developed a novel assay, termed the TreaT (Transplant reactive T-cells)-assay. We cultivated renal tubular epithelial cells from the urine of kidney transplant patients and used them as stimulators for donor-reactive T-cells, which we analyzed by flow cytometry. We could demonstrate that using the TreaT-assay the quantification and characterization of alloreactive T-cells is superior to other stimulators. In a pilot study, the number of pre-transplant alloreactive T-cells negatively correlated with the post-transplant eGFR. Frequencies of pre-transplant CD161+ alloreactive CD4+ T-cells and granzyme B producing alloreactive CD8+ T-cells were substantially higher in patients with early acute rejection compared to patients without complications. In conclusion, we established a novel assay for the assessment of donor-reactive memory T-cells based on kidney cells with the potential to predict early acute rejection and post-transplant eGFR

    AIDS at Work: The SEIU AIDS Project

    Get PDF
    [Excerpt] In the early stages of the AIDS epidemic, AIDS was primarily an urban phenomenon, appearing first among gay men, intravenous (I.V.) drug users and their sexual partners. Service workers in San Francisco, Los Angeles, New York, Newark and Miami were among the first to confront this mysterious and frightening disease. As the number of AIDS patients grew, attention and anxiety followed. Reports surfaced that some healthcare and other workers were discriminating against persons with AIDS or those perceived to be at high risk for AIDS: gay men and minorities in inner-city areas. Sensational press coverage focused on public workers wearing protective equipment. These workers reacted to what they understood as possible exposure to AIDS by putting a barrier between themselves and the public: police and transit workers wore gloves, sanitation and public works employees donned suits and masks

    Cyberterrorism: hype and reality

    Get PDF
    corecore