54 research outputs found

    A Novel Application of the MIRC Repository in Medical Education

    Full text link
    Medical students on the radiology elective in our institution create electronic presentations to present to each other as part of the requirements for the rotation. Access was given to previous students’ presentations via the web-based system, Medical Imaging Resource Center (MIRC) project, created and supported by the Radiological Society of North America (RSNA). RadPix Power 2 MIRC (Weadock Software, LLC, Ann Arbor, MI) software converted the Microsoft PowerPoint (Redmond, WA) presentations to a MIRC-compatible format. The textual information on each slide is searchable across the entire MIRC database. Future students will be able to benefit from the work of their predecessors.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/41390/1/10278_2004_Article_1907.pd

    Open Source in Imaging Informatics

    Get PDF
    The open source community within radiology is a vibrant collection of developers and users working on scores of collaborative projects with the goal of promoting the use of information technology within radiology for education, clinical, and research purposes. This community, which includes many commercial partners, has a rich history in supporting the success of the digital imaging and communication in medicine (DICOM) standard and today is pioneering interoperability limits by embracing the Integrating the Healthcare Enterprise. This article describes only a small portion of the more successful open source applications and is written to help end users see these projects as practical aids for the imaging informaticist and picture archiving and communication system (PACS) administrator

    Web attack risk awareness with lessons learned from high interaction honeypots

    Get PDF
    Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2009Com a evolução da web 2.0, a maioria das empresas elabora negócios através da Internet usando aplicações web. Estas aplicações detêm dados importantes com requisitos cruciais como confidencialidade, integridade e disponibilidade. A perda destas propriedades influencia directamente o negócio colocando-o em risco. A percepção de risco providencia o necessário conhecimento de modo a agir para a sua mitigação. Nesta tese foi concretizada uma colecção de honeypots web de alta interacção utilizando diversas aplicações e sistemas operativos para analisar o comportamento do atacante. A utilização de ambientes de virtualização assim como ferramentas de monitorização de honeypots amplamente utilizadas providencia a informação forense necessária para ajudar a comunidade de investigação no estudo do modus operandi do atacante, armazenando os últimos exploits e ferramentas maliciosas, e a desenvolver as necessárias medidas de protecção que lidam com a maioria das técnicas de ataque. Utilizando a informação detalhada de ataque obtida com os honeypots web, o comportamento do atacante é classificado entre diferentes perfis de ataque para poderem ser analisadas as medidas de mitigação de risco que lidam com as perdas de negócio. Diferentes frameworks de segurança são analisadas para avaliar os benefícios que os conceitos básicos de segurança dos honeypots podem trazer na resposta aos requisitos de cada uma e a consequente mitigação de risco.With the evolution of web 2.0, the majority of enterprises deploy their business over the Internet using web applications. These applications carry important data with crucial requirements such as confidentiality, integrity and availability. The loss of those properties influences directly the business putting it at risk. Risk awareness provides the necessary know-how on how to act to achieve its mitigation. In this thesis a collection of high interaction web honeypots is deployed using multiple applications and diverse operating systems in order to analyse the attacker behaviour. The use of virtualization environments along with widely used honeypot monitoring tools provide the necessary forensic information that helps the research community to study the modus operandi of the attacker gathering the latest exploits and malicious tools and to develop adequate safeguards that deal with the majority of attacking techniques. Using the detailed attacking information gathered with the web honeypots, the attacking behaviour will be classified across different attacking profiles to analyse the necessary risk mitigation safeguards to deal with business losses. Different security frameworks commonly used by enterprises are analysed to evaluate the benefits of the honeypots security concepts in responding to each framework’s requirements and consequently mitigating the risk

    Audiovisual and Chill: An Evaluation of Video Digital Libraries and Catalogues

    No full text
    Research Problem: This research investigates how well video digital libraries and catalogues used in academic libraries meet user expectations. This is in the context of increasing use and demand for online audiovisual content by the wider community, as well as growing use of audiovisual materials for teaching, learning, and research at academic institutions. It also aims to give an understanding of how well libraries are meeting the challenges of delivering audiovisual materials to users in an on-demand world. Methodology: Twelve platforms—developed between 1996 and 2015—are evaluated against 23 user-centred criteria, divided into four core areas: retrieval functionality, user interface, collection qualities, and user support. Results: The study found that not one of the platforms evaluated met all the evaluation criteria, and identified three key areas in the usability of the video digital libraries and catalogues: search and retrieval, technology, and structure, scope, and strategy. Implications: From this we gain an understanding of performance and usability of video digital libraries and catalogues currently in use by academic libraries. We also learn about the difficulties those working with audiovisual materials are facing, and also of the solutions that are being proposed. Findings of this study could help influence decision making, development of future platforms, and influence policies for delivering audiovisual materials to users

    Analysis avoidance techniques of malicious software

    Get PDF
    Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of heuristics is dependent upon an AV analyst having successfully determined the nature of the malware, not only for recognition purposes, but also for the determination of infected files and startup mechanisms that need to be removed as part of the disinfection process. If a specimen of malware has not been previously extensively analyzed, it is unlikely to be detected by AV software. In addition, malware is becoming increasingly profit driven and more likely to incorporate stealth and deception techniques to avoid detection and analysis to remain on infected systems for a myriad of nefarious purposes. Malware extends beyond the commonly thought of virus or worm, to customized malware that has been developed for specific and targeted miscreant purposes. Such customized malware is highly unlikely to be detected by AV software because it will not have been previously analyzed and a signature will not exist. Analysis in such a case will have to be conducted by a digital forensics analyst to determine the functionality of the malware. Malware can employ a plethora of techniques to hinder the analysis process conducted by AV and digital forensics analysts. The purpose of this research has been to answer three research questions directly related to the employment of these techniques as: 1. What techniques can malware use to avoid being analyzed? 2. How can the use of these techniques be detected? 3. How can the use of these techniques be mitigated

    North Pacific Marine Science Organization (PICES): Annual Report, Seventeenth Meeting, Dalian, China, October 24 - November 2, 2008

    Get PDF
    Report of Opening Session. Report of Governing Council. Report of the Finance and Administration Committee. Reports of Science Board and Committees. Report of the Climate Change and Carrying Capacity Scientific Program. Reports of Expert Groups. Session Summaries. Participants. PICES Members. PICES Acronyms

    Full Issue

    Get PDF
    corecore