2,123 research outputs found

    Defending OC-SVM based IDS from poisoning attacks

    Get PDF
    Machine learning techniques are widely used to detect intrusions in the cyber security field. However, most machine learning models are vulnerable to poisoning attacks, in which malicious samples are injected into the training dataset to manipulate the classifier's performance. In this paper, we first evaluate the accuracy degradation of OC-SVM classifiers with 3 different poisoning strategies with the ADLA-FD public dataset and a real world dataset. Secondly, we propose a saniti-zation mechanism based on the DBSCAN clustering algorithm. In addition, we investigate the influences of different distance metrics and different dimensionality reduction techniques and evaluate the sensitivity of the DBSCAN parameters. The ex-perimental results show that the poisoning attacks can degrade the performance of the OC-SVM classifier to a large degree, with an accuracy equal to 0.5 in most settings. The proposed sanitization method can filter out poisoned samples effectively for both datasets. The accuracy after sanitization is very close or even higher to the original value.</p

    FeH Absorption in the Near-Infrared Spectra of Late M and L Dwarfs

    Get PDF
    We present medium-resolution z-, J-, and H-band spectra of four late-type dwarfs with spectral types ranging from M8 to L7.5. In an attempt to determine the origin of numerous weak absorption features throughout their near-infrared spectra, and motivated by the recent tentative identification of the E 4\Pi- A ^4\Pi system of FeH near 1.6 microns in umbral and cool star spectra, we have compared the dwarf spectra to a laboratory FeH emission spectrum. We have identified nearly 100 FeH absorption features in the z-, J-, and H-band spectra of the dwarfs. In particular, we have identified 34 features which dominate the appearance of the H-band spectra of the dwarfs and which appear in the laboratory FeH spectrum. Finally, all of the features are either weaker or absent in the spectrum of the L7.5 dwarf which is consistent with the weakening of the known FeH bandheads in the spectra of the latest L dwarfs.Comment: accepted by Ap

    Auditable secure network overlays for multi-domain distributed applications

    Get PDF
    The push for data sharing and data processing across organisational boundaries creates challenges at many levels of the software stack. Data sharing and processing rely on the participating parties agreeing on the permissible operations and expressing them into actionable contracts and policies. Converting these contracts and policies into a operational infrastructure is still a matter of research and therefore begs the question how should a digital data market place infrastructure look like? In this paper we investigate how communication fabric and applications can be tightly coupled into a multi-domain overlay network which enforces accountability. We prove our concepts with a prototype which shows how a simple workflow can run across organisational boundaries

    Modeling of Collaboration Archetypes in Digital Market Places

    Get PDF

    THEMIS observes possible cave skylights on Mars

    Get PDF
    Seven possible skylight entrances into Martian caves were observed on and around the flanks of Arsia Mons by the Mars Odyssey Thermal Emission Imaging System (THEMIS). Distinct from impact craters, collapse pits or any other surface feature on Mars, these candidates appear to be deep dark holes at visible wavelengths while infrared observations show their thermal behaviors to be consistent with subsurface materials. Diameters range from 100 m to 225 m, and derived minimum depths range between 68 m and 130 m. Most candidates seem directly related to pitcraters, and may have formed in a similar manner with overhanging ceilings that remain intact

    A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces

    Get PDF
    Security is a top concern in digital infrastructure and there is a basic need to assess the level of security ensured for any given application. To accommodate this requirement, we propose a new risk assessment system. Our system identifies threats of an application workflow, computes the severity weights with the modified Microsoft STRIDE/DREAD model and estimates the final risk exposure after applying security countermeasures in the available digital infrastructures. This allows potential customers to rank these infrastructures in terms of security for their own specific use cases. We additionally present a method to validate the stability and resolution of our ranking system with respect to subjective choices of the DREAD model threat rating parameters. Our results show that our system is stable against unavoidable subjective choices of the DREAD model parameters for a specific use case, with a rank correlation higher than 0.93 and normalised mean square error lower than 0.05

    Bohmian trajectories and Klein's paradox

    Get PDF
    We compute the Bohmian trajectories of the incoming scattering plane waves for Klein's potential step in explicit form. For finite norm incoming scattering solutions we derive their asymptotic space-time localization and we compute some Bohmian trajectories numerically. The paradox, which appears in the traditional treatments of the problem based on the outgoing scattering asymptotics, is absent.Comment: 14 pages, 3 figures; minor format change

    Open Data Market Architecture and Functional Components

    Get PDF

    Registered Dietitians\u27 Service to Group Homes for Adults with Developmental Disabilities

    Get PDF
    An online survey of registered dietitians was conducted to characterize their professional activities for providers of residential services for adults with intellectual or developmental disabilities (IDD) in the United States. The goal of the survey was to characterize the nutrition services delivered in community based group homes and the registered dietitians performing them. Forty-nine RDs responded fully to the survey, indicating significant hours spent providing consultation on food service, clinical dietetics, staff training, dietary monitoring and administrative nutrition services. The most common services are conducting nutritional assessments of residents and providing direct service in the form of menus for the homes and/or clinical evaluation and compliance monitoring of therapeutic diets. Through this survey we discovered that there is a wide variety of arrangements, services, and hours spent in nutrition services delivery in group homes. This survey also indicates a strong need for additional training for the nation\u27s dietitians to serve this nutritionally vulnerable population

    Spin-dependent Bohm trajectories associated with an electronic transition in hydrogen

    Full text link
    The Bohm causal theory of quantum mechanics with spin-dependence is used to determine electron trajectories when a hydrogen atom is subjected to (semi-classical) radiation. The transition between the 1s ground state and the 2p0 state is examined. It is found that transitions can be identified along Bohm trajectories. The trajectories lie on invariant hyperboloid surfaces of revolution in R^3. The energy along the trajectories is also discussed in relation to the hydrogen energy eigenvalues.Comment: 18 pages, 8 figure
    • …
    corecore