165,284 research outputs found
Cluster spacecraft observations of a ULF wave enhanced by Space Plasma Exploration by Active Radar (SPEAR)
Space Plasma Exploration by Active Radar (SPEAR) is a high-latitude ionospheric heating facility capable of exciting ULF waves on local magnetic field lines. We examine an interval from 1 February 2006 when SPEAR was transmitting a 1 Hz modulation signal with a 10 min on-off cycle. Ground magnetometer data indicated that SPEAR modulated currents in the local ionosphere at 1 Hz, and enhanced a natural field line resonance with a 10 min period. During this interval the Cluster spacecraft passed over the heater site. Signatures of the SPEAR-enhanced field line resonance were present in the magnetic field data measured by the magnetometer on-board Cluster-2. These are the first joint ground- and space-based detections of field line tagging by SPEAR
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Spear phishing is a complex targeted attack in which, an attacker harvests
information about the victim prior to the attack. This information is then used
to create sophisticated, genuine-looking attack vectors, drawing the victim to
compromise confidential information. What makes spear phishing different, and
more powerful than normal phishing, is this contextual information about the
victim. Online social media services can be one such source for gathering vital
information about an individual. In this paper, we characterize and examine a
true positive dataset of spear phishing, spam, and normal phishing emails from
Symantec's enterprise email scanning service. We then present a model to detect
spear phishing emails sent to employees of 14 international organizations, by
using social features extracted from LinkedIn. Our dataset consists of 4,742
targeted attack emails sent to 2,434 victims, and 9,353 non targeted attack
emails sent to 5,912 non victims; and publicly available information from their
LinkedIn profiles. We applied various machine learning algorithms to this
labeled data, and achieved an overall maximum accuracy of 97.76% in identifying
spear phishing emails. We used a combination of social features from LinkedIn
profiles, and stylometric features extracted from email subjects, bodies, and
attachments. However, we achieved a slightly better accuracy of 98.28% without
the social features. Our analysis revealed that social features extracted from
LinkedIn do not help in identifying spear phishing emails. To the best of our
knowledge, this is one of the first attempts to make use of a combination of
stylometric features extracted from emails, and social features extracted from
an online social network to detect targeted spear phishing emails.Comment: Detection of spear phishing using social media feature
Spear operators between Banach spaces
The aim of this manuscript is to study \emph{spear operators}: bounded linear
operators between Banach spaces and satisfying that for every other
bounded linear operator there exists a modulus-one
scalar such that To this end, we
introduce two related properties, one weaker called the alternative Daugavet
property (if rank-one operators satisfy the requirements), and one stronger
called lushness, and we develop a complete theory about the relations between
these three properties. To do this, the concepts of spear vector and spear set
play an important role. Further, we provide with many examples among classical
spaces, being one of them the lushness of the Fourier transform on . We
also study the relation of these properties with the Radon-Nikod\'ym property,
with Asplund spaces, with the duality, and we provide some stability results.
Further, we present some isometric and isomorphic consequences of these
properties as, for instance, that is contained in the dual of the
domain of every real operator with infinite rank and the alternative Daugavet
property, and that these three concepts behave badly with smoothness and
rotundity. Finally, we study Lipschitz spear operators (that is, those
Lipschitz operators satisfying the Lipschitz version of the equation above) and
prove that (linear) lush operators are Lipschitz spear operators.Comment: 114 pages, 9 chapter
An Aggregate of Spear Points from Atoka County, Oklahoma
Nine spear points were reported from a farm in northwestern Atoka County, Oklahoma. This aggregate of points appeared to bean isolate as no other prehistoric material was found in the vicinity. The following study discusses the setting and nature of the specimens, stylistic attributes of the spear points and their age, technological and functional characteristics of the pieces, and whether these items represent caching behavior
When to Fire a CEO: Optimal Termination in Dynamic Contracts
The repeated agency model has been widely applied to a number of interesting and important problems in economics, though in many instances, the fact that the standard model generates transient dynamics limits the usefulness of the results obtained from the model for the simple reason that purely transient dynamc phenomena are empirically irrelevant since they cannot be systematically observed and studied. \ In this paper, we show to embed the standard long-term contracting model in an economic environment in which the inherently transient dynamics of the model are transformed into dyanmics which are stationary and ergodic. \ We then use the model to study CEO termination and issues of corporate takeover.
Dynamic Aperture Studies for SPEAR 3
The Stanford Synchrotron Radiation Laboratory is investigating an accelerator
upgrade project that would replace the present 130 nm rad FODO lattice with an
18 nm rad double bend achromat (DBA) lattice: SPEAR 3. The low emittance design
yields a high brightness beam, but the stronger focusing in the DBA lattice
increases chromaticity and beam sensitivity to machine errors. To ensure
efficient injection and long Touschek lifetime, an optimization of the design
lattice and dynamic aperture has been performed. In this paper, we review the
methods used to maximize the SPEAR 3 dynamic aperture including necessary
optics modifications, choice of tune and phase advance, optimization of
sextupole and coupling correction, and modeling effects of machine errors,
wigglers and lattice periodicity.Comment: 23 page
Recommended from our members
Spearfishing-induced behavioral changes of an unharvested species inside and outside a marine protected area.
By prohibiting fishing, marine protected areas (MPAs) provide a refuge for harvested species. Humans are often perceived as predators by prey and therefore respond fearfully to humans. Thus, fish responses to humans inside and outside of an MPA can provide insights into their perception of humans as a predatory threat. Previous studies have found differences in the distance that harvested species of fish initiate flight (flight initiation distance-FID) from humans inside and outside an MPA, but less is known about unharvested species. We focused on whether the lined bristletooth Ctenochaetus striatus, an unharvested surgeonfish, can discriminate between a snorkeler and a snorkeler with a spear gun inside and outside of a no-take MPA in Mo'orea, French Polynesia. Additionally, we incorporated starting distance (the distance between the person and prey at the start of an experimental approach), a variable that has been found to be important in assessing prey escape decisions in terrestrial species, but that has not been extensively studied in aquatic systems. Lined bristletooth FID was significantly greater in the presence of a spear gun and varied depending on if the spear gun encounter was inside or outside of the MPA. These results imply a degree of sophistication of fish antipredator behavior, generate questions as to how a nontargeted species of fish could acquire fear of humans, and demonstrate that behavioral surveys can provide insights about antipredator behavior
Characterizing Phishing Threats with Natural Language Processing
Spear phishing is a widespread concern in the modern network security
landscape, but there are few metrics that measure the extent to which
reconnaissance is performed on phishing targets. Spear phishing emails closely
match the expectations of the recipient, based on details of their experiences
and interests, making them a popular propagation vector for harmful malware. In
this work we use Natural Language Processing techniques to investigate a
specific real-world phishing campaign and quantify attributes that indicate a
targeted spear phishing attack. Our phishing campaign data sample comprises 596
emails - all containing a web bug and a Curriculum Vitae (CV) PDF attachment -
sent to our institution by a foreign IP space. The campaign was found to
exclusively target specific demographics within our institution. Performing a
semantic similarity analysis between the senders' CV attachments and the
recipients' LinkedIn profiles, we conclude with high statistical certainty (p
) that the attachments contain targeted rather than randomly
selected material. Latent Semantic Analysis further demonstrates that
individuals who were a primary focus of the campaign received CVs that are
highly topically clustered. These findings differentiate this campaign from one
that leverages random spam.Comment: This paper has been accepted for publication by the IEEE Conference
on Communications and Network Security in September 2015 at Florence, Italy.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
Stock assessment of commercially important fishes in Naujan Lake
The study aimed to assess the capture fisheries of Naujan Lake with emphasis on commercially important fish species and to determine the extent of their exploitation.
Four major fish landing centers in the municipalities of Socorro, Pola, Victoria and Naujan were surveyed from May 1995 to December 1996. Eight types of fishing gear had been recorded. The most commonly used was gill net or 'pante', followed by fish pot 'bubo', fish corral 'baklad', spear 'salapang', spear gun 'pana', fish trap 'patanga', encircling net 'takilis' and long line 'kitay'.
Tilapia comprised 61% of the total fish production of the lake, followed by therapon (16%), goby (4%) and mudfish (2%). The other species caught were 'pla salid', catfish, mullet, carp, milkfish and shrimp, which contributed 17% to the total production. Migratory fishes like the mullet and milkfish, on the other hand, showed a declining trend in production
- …