165,284 research outputs found

    Cluster spacecraft observations of a ULF wave enhanced by Space Plasma Exploration by Active Radar (SPEAR)

    Get PDF
    Space Plasma Exploration by Active Radar (SPEAR) is a high-latitude ionospheric heating facility capable of exciting ULF waves on local magnetic field lines. We examine an interval from 1 February 2006 when SPEAR was transmitting a 1 Hz modulation signal with a 10 min on-off cycle. Ground magnetometer data indicated that SPEAR modulated currents in the local ionosphere at 1 Hz, and enhanced a natural field line resonance with a 10 min period. During this interval the Cluster spacecraft passed over the heater site. Signatures of the SPEAR-enhanced field line resonance were present in the magnetic field data measured by the magnetometer on-board Cluster-2. These are the first joint ground- and space-based detections of field line tagging by SPEAR

    Analyzing Social and Stylometric Features to Identify Spear phishing Emails

    Full text link
    Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise confidential information. What makes spear phishing different, and more powerful than normal phishing, is this contextual information about the victim. Online social media services can be one such source for gathering vital information about an individual. In this paper, we characterize and examine a true positive dataset of spear phishing, spam, and normal phishing emails from Symantec's enterprise email scanning service. We then present a model to detect spear phishing emails sent to employees of 14 international organizations, by using social features extracted from LinkedIn. Our dataset consists of 4,742 targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack emails sent to 5,912 non victims; and publicly available information from their LinkedIn profiles. We applied various machine learning algorithms to this labeled data, and achieved an overall maximum accuracy of 97.76% in identifying spear phishing emails. We used a combination of social features from LinkedIn profiles, and stylometric features extracted from email subjects, bodies, and attachments. However, we achieved a slightly better accuracy of 98.28% without the social features. Our analysis revealed that social features extracted from LinkedIn do not help in identifying spear phishing emails. To the best of our knowledge, this is one of the first attempts to make use of a combination of stylometric features extracted from emails, and social features extracted from an online social network to detect targeted spear phishing emails.Comment: Detection of spear phishing using social media feature

    Spear operators between Banach spaces

    Full text link
    The aim of this manuscript is to study \emph{spear operators}: bounded linear operators GG between Banach spaces XX and YY satisfying that for every other bounded linear operator T:XYT:X\longrightarrow Y there exists a modulus-one scalar ω\omega such that G+ωT=1+T. \|G + \omega\,T\|=1+ \|T\|. To this end, we introduce two related properties, one weaker called the alternative Daugavet property (if rank-one operators TT satisfy the requirements), and one stronger called lushness, and we develop a complete theory about the relations between these three properties. To do this, the concepts of spear vector and spear set play an important role. Further, we provide with many examples among classical spaces, being one of them the lushness of the Fourier transform on L1L_1. We also study the relation of these properties with the Radon-Nikod\'ym property, with Asplund spaces, with the duality, and we provide some stability results. Further, we present some isometric and isomorphic consequences of these properties as, for instance, that 1\ell_1 is contained in the dual of the domain of every real operator with infinite rank and the alternative Daugavet property, and that these three concepts behave badly with smoothness and rotundity. Finally, we study Lipschitz spear operators (that is, those Lipschitz operators satisfying the Lipschitz version of the equation above) and prove that (linear) lush operators are Lipschitz spear operators.Comment: 114 pages, 9 chapter

    An Aggregate of Spear Points from Atoka County, Oklahoma

    Get PDF
    Nine spear points were reported from a farm in northwestern Atoka County, Oklahoma. This aggregate of points appeared to bean isolate as no other prehistoric material was found in the vicinity. The following study discusses the setting and nature of the specimens, stylistic attributes of the spear points and their age, technological and functional characteristics of the pieces, and whether these items represent caching behavior

    When to Fire a CEO: Optimal Termination in Dynamic Contracts

    Get PDF
    The repeated agency model has been widely applied to a number of interesting and important problems in economics, though in many instances, the fact that the standard model generates transient dynamics limits the usefulness of the results obtained from the model for the simple reason that purely transient dynamc phenomena are empirically irrelevant since they cannot be systematically observed and studied. \ In this paper, we show to embed the standard long-term contracting model in an economic environment in which the inherently transient dynamics of the model are transformed into dyanmics which are stationary and ergodic. \ We then use the model to study CEO termination and issues of corporate takeover.

    Dynamic Aperture Studies for SPEAR 3

    Get PDF
    The Stanford Synchrotron Radiation Laboratory is investigating an accelerator upgrade project that would replace the present 130 nm rad FODO lattice with an 18 nm rad double bend achromat (DBA) lattice: SPEAR 3. The low emittance design yields a high brightness beam, but the stronger focusing in the DBA lattice increases chromaticity and beam sensitivity to machine errors. To ensure efficient injection and long Touschek lifetime, an optimization of the design lattice and dynamic aperture has been performed. In this paper, we review the methods used to maximize the SPEAR 3 dynamic aperture including necessary optics modifications, choice of tune and phase advance, optimization of sextupole and coupling correction, and modeling effects of machine errors, wigglers and lattice periodicity.Comment: 23 page

    Characterizing Phishing Threats with Natural Language Processing

    Full text link
    Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets. Spear phishing emails closely match the expectations of the recipient, based on details of their experiences and interests, making them a popular propagation vector for harmful malware. In this work we use Natural Language Processing techniques to investigate a specific real-world phishing campaign and quantify attributes that indicate a targeted spear phishing attack. Our phishing campaign data sample comprises 596 emails - all containing a web bug and a Curriculum Vitae (CV) PDF attachment - sent to our institution by a foreign IP space. The campaign was found to exclusively target specific demographics within our institution. Performing a semantic similarity analysis between the senders' CV attachments and the recipients' LinkedIn profiles, we conclude with high statistical certainty (p <104< 10^{-4}) that the attachments contain targeted rather than randomly selected material. Latent Semantic Analysis further demonstrates that individuals who were a primary focus of the campaign received CVs that are highly topically clustered. These findings differentiate this campaign from one that leverages random spam.Comment: This paper has been accepted for publication by the IEEE Conference on Communications and Network Security in September 2015 at Florence, Italy. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Stock assessment of commercially important fishes in Naujan Lake

    Get PDF
    The study aimed to assess the capture fisheries of Naujan Lake with emphasis on commercially important fish species and to determine the extent of their exploitation. Four major fish landing centers in the municipalities of Socorro, Pola, Victoria and Naujan were surveyed from May 1995 to December 1996. Eight types of fishing gear had been recorded. The most commonly used was gill net or 'pante', followed by fish pot 'bubo', fish corral 'baklad', spear 'salapang', spear gun 'pana', fish trap 'patanga', encircling net 'takilis' and long line 'kitay'. Tilapia comprised 61% of the total fish production of the lake, followed by therapon (16%), goby (4%) and mudfish (2%). The other species caught were 'pla salid', catfish, mullet, carp, milkfish and shrimp, which contributed 17% to the total production. Migratory fishes like the mullet and milkfish, on the other hand, showed a declining trend in production
    corecore