107 research outputs found

    Prevalence of antibodies against Neospora caninum in dogs from urban areas in Central Poland

    Get PDF
    Neospora caninum is a protozoan parasite which causes abortion in cattle as well as reproduction problems and neurological disorders in dogs. To assess the prevalence of the parasite in urban dogs in the Mazovian Voivodeship, Central Poland, serum samples from 257 dogs were analyzed for the presence of specific IgG antibodies. The examined dogs visited three private veterinary clinics located in Warsaw due to control tests, vaccinations, or other reasons not directly connected with neosporosis. Using ELISA and Western blot, antibodies against the parasite were detected in 56 out of 257 dogs, giving a prevalence of 21.7%. A greater prevalence was observed in female dogs than in males, 28% and 17.3%, respectively, and the differences were statistically significant (p < 0.05). There were no significant differences in seroprevalence of Neospora infection within the age groups (p > 0.05). This study indicates the presence of N. caninum in the Mazovian Voivodeship, in dogs which live in urban areas and exposure of these dogs to the parasite. The fact that seropositive dogs had no contact with cattle confirms the important role of dogs in the parasite’s epidemiology

    Phenoxazine Based Units- Synthesis, Photophysics and Electrochemistry

    Get PDF
    A few new phenoxazine-based conjugated monomers were synthesized, characterized, and successfully used as semiconducting materials. The phenoxazine-based oligomers have low ionization potentials or high-lying HOMO levels (~4.7 eV), which were estimated from cyclic voltammetry. Conjugated oligomers offer good film—forming, mechanical and optical properties connected with their wide application. These results demonstrate that phenoxazine-based conjugated mers are a promising type of semiconducting and luminescent structures able to be used as thin films in organic electronics

    On Deception-Based Protection Against Cryptographic Ransomware

    Get PDF
    In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them

    On improving 5G internet of radio light security based on led fingerprint identification method

    Get PDF
    Copyright: © 2021 by the authors. In this paper, a novel device identification method is proposed to improve the security of Visible Light Communication (VLC) in 5G networks. This method extracts the fingerprints of Light-Emitting Diodes (LEDs) to identify the devices accessing the 5G network. The extraction and identification mechanisms have been investigated from the theoretical perspective as well as verified experimentally. Moreover, a demonstration in a practical indoor VLC-based 5G network has been carried out to evaluate the feasibility and accuracy of this approach. The fingerprints of four identical white LEDs were extracted successfully from the received 5G NR (New Radio) signals. To perform identification, four types of machine-learning-based classifiers were employed and the resulting accuracy was up to 97.1%.EU Horizon 2020 program towards the Internet of Radio-Light project H2020-ICT 761992

    A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses

    Get PDF
    In this paper we present a 5G Internet Radio-Light (IoRL) architecture for homes that can be readily deployed because it utilizes unlicensed visible light and millimeter wave part of the spectrum, which does not require Mobile Network Operator (MNO) permission to deploy and which is used to provide inhabitants of houses with accurate location, interaction, access to Internet and Cloud based services such as high resolution video on a Tablet PC. The paper describes the home use cases and the IoRL architecture.EU Horizon 202

    Enzymes immobilized in Langmuir-Blodgett films: Why determining the surface properties in Langmuir monolayer is important?

    Get PDF
    ABSTRACT In this review we discuss about the immobilization of enzymes in Langmuir-Blodgett films in order to determine the catalytic properties of these biomacromolecules when adsorbed on solid supports. Usually, the conformation of enzymes depends on the environmental conditions imposed to them, including the chemical composition of the matrix, and the morphology and thickness of the film. In this review, we show an outline of manuscripts that report the immobilization of enzymes as LB films since the 1980’s, and also some examples of how the surface properties of the floating monolayer prepared previously to the transfer to the solid support are important to determine the efficiency of the resulting device

    Management system for dynamic analysis of malicious software

    No full text
    In the recent years, one can observe the increase in the number of malicious software (malware) samples analyzed by the antivirus companies. One explanation is associated with attacker's antivirus systems hider tactic, which modifies hostile programs form, without changing it functionality. In effect, the first step of analysis is associated with the check if a given sample is a new threat or modification of existing. Very often such simple test can be performed automatically by dedicated information system. Paper describes information system, which allows dynamic analysis of malicious sample. Presented system was developed and deployed in the Institute of Computer Science, Warsaw University of Technology. During performed security research concerning ransomware threats system proves its usefulness. Additionally, the system become a knowledge base of known malware recently analyzed by our security team

    Visualization as support for web honeypot data analysis

    No full text
    The paper presents methodologies associated with visualization, which supports data analysis. Analyzed data has been gathered by HoneyPot systems deployed in the network of Institute of Computer Science. Due to the vast amounts of data, the manual analysis was almost impossible and very impractical, also considering time constraints. Introduced visualization techniques and supporting filtering features are implemented in HPMS (HoneyPot Management System). The paper describes in details two introduced methodologies which support data analysis using both charts and graphs. The first one is used for the discovery of basic activities observed by HoneyPot. The second one is used for advanced analysis of machines used during attacks concerning PhpMyAdmin software
    corecore