49 research outputs found
Non-intrusive anomaly detection for encrypted networks
The use of encryption is steadily increasing. Packet payloads that are encrypted are becoming increasingly difficult to analyze using IDSs. This investigation uses a new non-intrusive IDS approach to detect network intrusions using a K-Means clustering methodology. It was found that this approach was able to detect many intrusions for these datasets while maintaining the encrypted confidentiality of packet information. This work utilized the KDD \u2799 and NSL-KDD evaluation datasets for testing
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Due to the constant increase and versatility of IoT devices that should keep
sensitive information private, Side-Channel Analysis (SCA) attacks on embedded
devices are gaining visibility in the industrial field. The integration and
validation of countermeasures against SCA can be an expensive and cumbersome
process, especially for the less experienced ones, and current certification
procedures require to attack the devices under test using multiple SCA
techniques and attack vectors, often implying a high degree of complexity. The
goal of this paper is to ease one of the most crucial and tedious steps of
profiling attacks i.e. the points of interest (POI) selection and hence assist
the SCA evaluation process. To this end, we introduce the usage of Estimation
of Distribution Algorithms (EDAs) in the SCA field in order to automatically
tune the point of interest selection. We showcase our approach on several
experimental use cases, including attacks on unprotected and protected AES
implementations over distinct copies of the same device, dismissing in this way
the portability issue
At the edge of the marshes: new approaches to the Sado Valley Mesolithic (Southern Portugal)
Among the major European concentrations of Mesolithic settlements, the lower Sado valley is one of the least known. Despite the development of large systematic excavations in the mid twentieth century and recent attempts to re-examine some sites, only very partial information is available. Yet there are valuable unpublished archaeological collections in the National Museum of Archaeology in Lisbon, and the preservation of most of the sites is quite satisfactory. Moreover, the Sado shell middens are located in a very particular geographical setting, which opens up very interesting questions on the role of coastal and inland resources and landscapes among late hunter-gatherers. Since 2010, a Luso-Spanish interdisciplinary team has been systematically re-appraising this area within the framework of a research project on the transition to the Neolithic in coastal areas of SW Atlantic Europe. The project design and the preliminary results of the first fieldwork seasons are presented in this paper.info:eu-repo/semantics/publishedVersio
Development, verification, and maintenance of computational software in geodynamics
Research on dynamical processes within the Earth and planets increasingly relies upon sophisticated, large-scale computational models. Improved understanding of fundamental physical processes such as mantle convection and the geodynamo, magma dynamics, crustal and lithospheric deformation, earthquake nucleation, and seismic wave propagation, are heavily dependent upon better numerical modeling. Surprisingly, the rate-limiting factor for progress in these areas is not just computing hardware, as was once the case. Rather, advances in software are not keeping pace with the recent improvements in hardware. Modeling tools in geophysics are usually developed and maintained by individual scientists, or by small groups. But it is difficult for any individual, or even a small group, to keep up with sweeping advances in computing hardware, parallel processing software, and numerical modeling methodology
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment
Evaluating the side-channel resistance of a device in practice is a problematic and arduous process. Current certification schemes require to attack the device under test with an ever-growing number of techniques to validate its security. In addition, the success or failure of these techniques strongly depends on the individual implementing them, due to the fallible and human intrinsic nature of several steps of this path.
To alleviate this problem, we propose a battery of automated attacks as a side-channel analysis robustness assessment of an embedded device. To prove our approach, we conduct realistic experiments on two different devices, creating a new dataset (AES_RA) as a part of our contribution. Furthermore, we propose a novel way of performing these attacks using Principal Component Analysis, which also serves as an alternative way of selecting optimal principal components automatically. In addition, we perform a detailed analysis of automated attacks against masked AES implementations, comparing our method with the state-of-the-art approaches and proposing two novel initialization techniques to overcome its limitations in this scenario. We support our claims with experiments on AES_RA and a public dataset (ASCAD), showing how our, although fully automated, approach can straightforwardly provide state-of-the-art results
Uso del ECG endocavitario en la canalización de vías centrales
The insertion of central venous catheters is, nowadays, a common practice in the field of Anesthesiology. Through this article we present the use of intracavitary ECG guidance as an alternative method to guide the proper placement of the catheter. It is a useful technique, innocuous and easy to carry out. We accompany the text of an explanatory video to facilitate the understanding of the technique.La canalización de vías centrales supone, hoy en día, una práctica habitual en el ámbito de la Anestesiología. Mediante este artículo queremos presentar el uso del ECG endocavitario como método alternativo para guiar la adecuada colocación del catéter. Se trata de una técnica útil, inocua y fácil de llevar a cabo. Acompañamos el texto de un vídeo explicativo para facilitar la comprensión de la técnica
Quintessence as k-essence
Quintessence and k-essence have been proposed as candidates for the dark
energy component of the universe that would be responsible of the currently
observed accelerated expansion. In this paper we investigate the degree of
resemblance between those two theoretical setups, and find that every
quintessence model can be viewed as a k-essence model generated by a kinetic
linear function. In addition, we show the true effects of k-essence begin at
second order in the expansion of the kinetic function in powers of the kinetic
energy.Comment: 14 pages, improved discussion, matches published versio
Outpatient Management of Malignant Pleural Effusion Using a Tunneled Pleural Catheter: Preliminary Experience
Inpatient management of malignant pleural effusion
includes the placement of a conventional thoracostomy tube
for drainage and talc slurry pleurodesis and/or a surgical
approach consisting of video-assisted thoracoscopic talc
insufflation. Both techniques require prolonged hospital
stays of up to 1 week. Unfortunately, life expectancy in
patients with this disease does not usually exceed 6 months,
and so the primary aim of any palliative intervention
intended to improve quality of life should be to avoid
hospital admissions and to relieve pain as far as possible.
Of the few outpatient alternatives to hospital management
the most frequently used is repeated thoracentesis. We
describe the outpatient management of malignant pleural
effusion by placement of a tunneled pleural catheter in a
patient with stage IIIB lung adenocarcinoma. In our
opinion, the use of this catheter offers a viable alternative to
conventional therapy and is better tolerated
Tachyonization of the \LaCDM cosmological model
In this work a tachyonization of the CDM model for a spatially flat
Friedmann-Robertson-Walker space-time is proposed. A tachyon field and a
cosmological constant are considered as the sources of the gravitational field.
Starting from a stability analysis and from the exact solutions for a standard
tachyon field driven by a given potential, the search for a large set of
cosmological models which contain the CDM model is investigated. By
the use of internal transformations two new kinds of tachyon fields are derived
from the standard tachyon field, namely, a complementary and a phantom tachyon
fields. Numerical solutions for the three kinds of tachyon fields are
determined and it is shown that the standard and complementary tachyon fields
reproduces the CDM model as a limiting case. The standard tachyon
field can also describe a transition from an accelerated to a decelerated
regime, behaving as an inflaton field at early times and as a matter field at
late times. The complementary tachyon field always behaves as a matter field.
The phantom tachyon field is characterized by a rapid expansion where its
energy density increases with time.Comment: Version accepted for publication in GR