48 research outputs found

    Non-intrusive anomaly detection for encrypted networks

    Get PDF
    The use of encryption is steadily increasing. Packet payloads that are encrypted are becoming increasingly difficult to analyze using IDSs. This investigation uses a new non-intrusive IDS approach to detect network intrusions using a K-Means clustering methodology. It was found that this approach was able to detect many intrusions for these datasets while maintaining the encrypted confidentiality of packet information. This work utilized the KDD \u2799 and NSL-KDD evaluation datasets for testing

    Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

    Get PDF
    Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-Channel Analysis (SCA) attacks on embedded devices are gaining visibility in the industrial field. The integration and validation of countermeasures against SCA can be an expensive and cumbersome process, especially for the less experienced ones, and current certification procedures require to attack the devices under test using multiple SCA techniques and attack vectors, often implying a high degree of complexity. The goal of this paper is to ease one of the most crucial and tedious steps of profiling attacks i.e. the points of interest (POI) selection and hence assist the SCA evaluation process. To this end, we introduce the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field in order to automatically tune the point of interest selection. We showcase our approach on several experimental use cases, including attacks on unprotected and protected AES implementations over distinct copies of the same device, dismissing in this way the portability issue

    At the edge of the marshes: new approaches to the Sado Valley Mesolithic (Southern Portugal)

    Get PDF
    Among the major European concentrations of Mesolithic settlements, the lower Sado valley is one of the least known. Despite the development of large systematic excavations in the mid twentieth century and recent attempts to re-examine some sites, only very partial information is available. Yet there are valuable unpublished archaeological collections in the National Museum of Archaeology in Lisbon, and the preservation of most of the sites is quite satisfactory. Moreover, the Sado shell middens are located in a very particular geographical setting, which opens up very interesting questions on the role of coastal and inland resources and landscapes among late hunter-gatherers. Since 2010, a Luso-Spanish interdisciplinary team has been systematically re-appraising this area within the framework of a research project on the transition to the Neolithic in coastal areas of SW Atlantic Europe. The project design and the preliminary results of the first fieldwork seasons are presented in this paper.info:eu-repo/semantics/publishedVersio

    Development, verification, and maintenance of computational software in geodynamics

    Get PDF
    Research on dynamical processes within the Earth and planets increasingly relies upon sophisticated, large-scale computational models. Improved understanding of fundamental physical processes such as mantle convection and the geodynamo, magma dynamics, crustal and lithospheric deformation, earthquake nucleation, and seismic wave propagation, are heavily dependent upon better numerical modeling. Surprisingly, the rate-limiting factor for progress in these areas is not just computing hardware, as was once the case. Rather, advances in software are not keeping pace with the recent improvements in hardware. Modeling tools in geophysics are usually developed and maintained by individual scientists, or by small groups. But it is difficult for any individual, or even a small group, to keep up with sweeping advances in computing hardware, parallel processing software, and numerical modeling methodology

    Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment

    Get PDF
    Evaluating the side-channel resistance of a device in practice is a problematic and arduous process. Current certification schemes require to attack the device under test with an ever-growing number of techniques to validate its security. In addition, the success or failure of these techniques strongly depends on the individual implementing them, due to the fallible and human intrinsic nature of several steps of this path. To alleviate this problem, we propose a battery of automated attacks as a side-channel analysis robustness assessment of an embedded device. To prove our approach, we conduct realistic experiments on two different devices, creating a new dataset (AES_RA) as a part of our contribution. Furthermore, we propose a novel way of performing these attacks using Principal Component Analysis, which also serves as an alternative way of selecting optimal principal components automatically. In addition, we perform a detailed analysis of automated attacks against masked AES implementations, comparing our method with the state-of-the-art approaches and proposing two novel initialization techniques to overcome its limitations in this scenario. We support our claims with experiments on AES_RA and a public dataset (ASCAD), showing how our, although fully automated, approach can straightforwardly provide state-of-the-art results

    Uso del ECG endocavitario en la canalización de vías centrales

    Get PDF
    The insertion of central venous catheters is, nowadays, a common practice in the field of Anesthesiology. Through this article we present the use of intracavitary ECG guidance as an alternative method to guide the proper placement of the catheter. It is a useful technique, innocuous and easy to carry out. We accompany the text of an explanatory video to facilitate the understanding of the technique.La canalización de vías centrales supone, hoy en día, una práctica habitual en el ámbito de la Anestesiología. Mediante este artículo queremos presentar el uso del ECG endocavitario como método alternativo para guiar la adecuada colocación del catéter. Se trata de una técnica útil, inocua y fácil de llevar a cabo. Acompañamos el texto de un vídeo explicativo para facilitar la comprensión de la técnica

    Quintessence as k-essence

    Get PDF
    Quintessence and k-essence have been proposed as candidates for the dark energy component of the universe that would be responsible of the currently observed accelerated expansion. In this paper we investigate the degree of resemblance between those two theoretical setups, and find that every quintessence model can be viewed as a k-essence model generated by a kinetic linear function. In addition, we show the true effects of k-essence begin at second order in the expansion of the kinetic function in powers of the kinetic energy.Comment: 14 pages, improved discussion, matches published versio

    Outpatient Management of Malignant Pleural Effusion Using a Tunneled Pleural Catheter: Preliminary Experience

    Get PDF
    Inpatient management of malignant pleural effusion includes the placement of a conventional thoracostomy tube for drainage and talc slurry pleurodesis and/or a surgical approach consisting of video-assisted thoracoscopic talc insufflation. Both techniques require prolonged hospital stays of up to 1 week. Unfortunately, life expectancy in patients with this disease does not usually exceed 6 months, and so the primary aim of any palliative intervention intended to improve quality of life should be to avoid hospital admissions and to relieve pain as far as possible. Of the few outpatient alternatives to hospital management the most frequently used is repeated thoracentesis. We describe the outpatient management of malignant pleural effusion by placement of a tunneled pleural catheter in a patient with stage IIIB lung adenocarcinoma. In our opinion, the use of this catheter offers a viable alternative to conventional therapy and is better tolerated

    Tachyonization of the \LaCDM cosmological model

    Get PDF
    In this work a tachyonization of the Λ\LambdaCDM model for a spatially flat Friedmann-Robertson-Walker space-time is proposed. A tachyon field and a cosmological constant are considered as the sources of the gravitational field. Starting from a stability analysis and from the exact solutions for a standard tachyon field driven by a given potential, the search for a large set of cosmological models which contain the Λ\LambdaCDM model is investigated. By the use of internal transformations two new kinds of tachyon fields are derived from the standard tachyon field, namely, a complementary and a phantom tachyon fields. Numerical solutions for the three kinds of tachyon fields are determined and it is shown that the standard and complementary tachyon fields reproduces the Λ\LambdaCDM model as a limiting case. The standard tachyon field can also describe a transition from an accelerated to a decelerated regime, behaving as an inflaton field at early times and as a matter field at late times. The complementary tachyon field always behaves as a matter field. The phantom tachyon field is characterized by a rapid expansion where its energy density increases with time.Comment: Version accepted for publication in GR
    corecore