99,533 research outputs found

    Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

    Full text link
    Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and users quickly install those patches as soon as they are available. However, most vulnerabilities are never actually exploited. Since writing, testing, and installing software patches can involve considerable resources, it would be desirable to prioritize the remediation of vulnerabilities that are likely to be exploited. Several published research studies have reported moderate success in applying machine learning techniques to the task of predicting whether a vulnerability will be exploited. These approaches typically use features derived from vulnerability databases (such as the summary text describing the vulnerability) or social media posts that mention the vulnerability by name. However, these prior studies share multiple methodological shortcomings that inflate predictive power of these approaches. We replicate key portions of the prior work, compare their approaches, and show how selection of training and test data critically affect the estimated performance of predictive models. The results of this study point to important methodological considerations that should be taken into account so that results reflect real-world utility

    A New Approach in Risk Stratification by Coronary CT Angiography.

    Get PDF
    For a decade, coronary computed tomographic angiography (CCTA) has been used as a promising noninvasive modality for the assessment of coronary artery disease (CAD) as well as cardiovascular risks. CCTA can provide more information incorporating the presence, extent, and severity of CAD; coronary plaque burden; and characteristics that highly correlate with those on invasive coronary angiography. Moreover, recent techniques of CCTA allow assessing hemodynamic significance of CAD. CCTA may be potentially used as a substitute for other invasive or noninvasive modalities. This review summarizes risk stratification by anatomical and hemodynamic information of CAD, coronary plaque characteristics, and burden observed on CCTA

    Comparison of Semantic and Episodic Memory BOLD fMRI Activation in Predicting Cognitive Decline in Older Adults

    Get PDF
    Previous studies suggest that task-activated functional magnetic resonance imaging (fMRI) can predict future cognitive decline among healthy older adults. The present fMRI study examined the relative sensitivity of semantic memory (SM) versus episodic memory (EM) activation tasks for predicting cognitive decline. Seventy-eight cognitively intact elders underwent neuropsychological testing at entry and after an 18-month interval, with participants classified as cognitively ā€œStableā€ or ā€œDecliningā€ based on ā‰„1.0 SD decline in performance. Baseline fMRI scanning involved SM (famous name discrimination) and EM (name recognition) tasks. SM and EM fMRI activation, along with Apolipoprotein E (APOE) Īµ4 status, served as predictors of cognitive outcome using a logistic regression analysis. Twenty-seven (34.6%) participants were classified as Declining and 51 (65.4%) as Stable. APOE Īµ4 status alone significantly predicted cognitive decline (R2 = .106; C index = .642). Addition of SM activation significantly improved prediction accuracy (R2 = .285; C index = .787), whereas the addition of EM did not (R2 = .212; C index = .711). In combination with APOE status, SM task activation predicts future cognitive decline better than EM activation. These results have implications for use of fMRI in prevention clinical trials involving the identification of persons at-risk for age-associated memory loss and Alzheimer\u27s disease. (JINS, 2012, 18, 1ā€“11

    Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance

    Full text link
    Research into active networking has provided the incentive to re-visit what has traditionally been classified as distinct properties and characteristics of information transfer such as protocol versus service; at a more fundamental level this paper considers the blending of computation and communication by means of complexity. The specific service examined in this paper is network self-prediction enabled by Active Virtual Network Management Prediction. Computation/communication is analyzed via Kolmogorov Complexity. The result is a mechanism to understand and improve the performance of active networking and Active Virtual Network Management Prediction in particular. The Active Virtual Network Management Prediction mechanism allows information, in various states of algorithmic and static form, to be transported in the service of prediction for network management. The results are generally applicable to algorithmic transmission of information. Kolmogorov Complexity is used and experimentally validated as a theory describing the relationship among algorithmic compression, complexity, and prediction accuracy within an active network. Finally, the paper concludes with a complexity-based framework for Information Assurance that attempts to take a holistic view of vulnerability analysis
    • ā€¦
    corecore