8,571 research outputs found

    From cyber-security deception to manipulation and gratification through gamification

    Get PDF
    Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3]. Changes in mindsets have also been witnessed, a couple of years ago the cyber-security industry only blamed users for their mistakes often depicted as the number one reason behind security breaches. Nowadays, companies are empowering users, modifying their perception of being the weak link, into being the center-piece of the network design [4]. Users are by definition "in control" and therefore a cyber-security asset. Researchers have focused on the gamification of cyber- security elements, helping users to learn and understand the concepts of attacks and threats, allowing them to become the first line of defense to report anoma- lies [5]. However, over the past years numerous infrastructures have suffered from malicious intent, data breaches, and crypto-ransomeware, clearly showing the technical "know-how" of hackers and their ability to bypass any security in place, demonstrating that no infrastructure, software or device can be consid- ered secure. Researchers concentrated on the gamification, learning and teaching theory of cyber-security to end-users in numerous fields through various techniques and scenarios to raise cyber-situational awareness [2][1]. However, they overlooked the users’ ability to gather information on these attacks. In this paper, we argue that there is an endemic issue in the the understanding of hacking practices leading to vulnerable devices, software and architectures. We therefore propose a transparent gamification platform for hackers. The platform is designed with hacker user-interaction and deception in mind enabling researchers to gather data on the techniques and practices of hackers. To this end, we developed a fully extendable gamification architecture allowing researchers to deploy virtualised hosts on the internet. Each virtualised hosts contains a specific vulnerability (i.e. web application, software, etc). Each vulnerability is connected to a game engine, an interaction engine and a scoring engine

    Microcystin-leucine arginine causes cytotoxic effects in sertoli cells resulting in reproductive dysfunction in male mice

    Get PDF
    2016-2017 > Academic research: refereed > Publication in refereed journal201804_a bcmaVersion of RecordPublishe

    Towards Spatial Word Embeddings

    Get PDF
    Leveraging textual and spatial data provided in spatio-textual objects (eg., tweets), has become increasingly important in real-world applications, favoured by the increasing rate of their availability these last decades (eg., through smartphones). In this paper, we propose a spatial retrofitting method of word embeddings that could reveal the localised similarity of word pairs as well as the diversity of their localised meanings. Experiments based on the semantic location prediction task show that our method achieves significant improvement over strong baselines

    Enhancing Smart Environments with Mobile Robots

    Full text link

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    SILAC-based proteomic quantification of chemoattractant-induced cytoskeleton dynamics on a second to minute timescale

    Get PDF
    Cytoskeletal dynamics during cell behaviours ranging from endocytosis and exocytosis to cell division and movement is controlled by a complex network of signalling pathways, the full details of which are as yet unresolved. Here we show that SILAC-based proteomic methods can be used to characterize the rapid chemoattractant-induced dynamic changes in the actin–myosin cytoskeleton and regulatory elements on a proteome-wide scale with a second to minute timescale resolution. This approach provides novel insights in the ensemble kinetics of key cytoskeletal constituents and association of known and novel identified binding proteins. We validate the proteomic data by detailed microscopy-based analysis of in vivo translocation dynamics for key signalling factors. This rapid large-scale proteomic approach may be applied to other situations where highly dynamic changes in complex cellular compartments are expected to play a key role

    Setting research priorities for sexual, reproductive, maternal, newborn, child and adolescent health in humanitarian settings

    Get PDF
    Background: An estimated 70.8 million people are forcibly displaced worldwide, 75% of whom are women and children. Prioritizing a global research agenda to inform guidance, service delivery, access to and quality of services is essential to improve the survival and health of women, children and adolescents in humanitarian settings. / Method: A mixed-methods design was adapted from the Child Health and Nutrition Research Initiative (CHNRI) methodology to solicit priority research questions across the sexual, reproductive, maternal, newborn, child and adolescent health (SRMNCAH) domains in humanitarian settings. The first step (CHNRI) involved data collection and scoring of perceived priority questions, using a web-based survey over two rounds (first, to generate the questions and secondly, to score them). Over 1000 stakeholders from across the globe were approached; 177 took part in the first survey and 69 took part in the second. These research questions were prioritized by generating a research prioritization score (RPP) across four dimensions: answerability, program feasibility, public health relevance and equity. A Delphi process of 29 experts followed, where the 50 scored and prioritized CHRNI research questions were shortlisted. The top five questions from the CHNRI scored list for each SRMNCAH domain were voted on, rendering a final list per domain. / Results: A total of 280 questions were generated. Generated questions covered sexual and reproductive health (SRH) (n = 90, 32.1%), maternal health (n = 75, 26.8%), newborn health (n = 42, 15.0%), child health (n = 43, 15.4%), and non-SRH aspects of adolescent health (n = 31, 11.1%). A shortlist of the top ten prioritized questions for each domain were generated on the basis of the computed RPPs. During the Delphi process, the prioritized questions, based on the CHNRI process, were further refined. Five questions from the shortlist of each of the SRMNCAH domain were formulated, resulting in 25 priority questions across SRMNCAH. For example, one of the prioritized SRH shortlisted and prioritized research question included: “What are effective strategies to implement good quality comprehensive contraceptive services (long-acting, short-acting and EC) for women and girls in humanitarian settings?” / Conclusion: Data needs, effective intervention strategies and approaches, as well as greater efficiency and quality during delivery of care in humanitarian settings were prioritized. The findings from this research provide guidance for researchers, program implementers, as well as donor agencies on SRMNCAH research priorities in humanitarian settings. A global research agenda could save the lives of those who are at greatest risk and vulnerability as well as increase opportunities for translation and innovation for SRMNCAH in humanitarian settings

    Screening for inborn errors of metabolism in high-risk children: a 3-year pilot study in Zhejiang Province, China

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Tandem mass spectrometry (MS/MS) has been available in China for 8 years. This technique makes it possible to screen for a wide range of previously unscreened inborn errors of metabolism (IEM) using a single test. This 3-year pilot study investigated the screening, diagnosis, treatment and outcomes of IEM in symptomatic infants and children.</p> <p>Methods</p> <p>All children encountered in the Newborn Screening Center of Zhejiang Province during a 3-year period with symptoms suspicious for IEM were screened for metabolic diseases. Dried blood spots were collected and analyzed by tandem mass spectrometry. The diagnoses were further confirmed by clinical symptoms and biochemical analysis. Neonatal intrahepatic cholestasis caused by citrin deficiency, ornithine transcarbamylase deficiency and primary carnitine deficiency were confirmed by DNA analysis.</p> <p>Results</p> <p>A total of 11,060 symptomatic patients (6,720 boys, 4,340 girls) with a median age of 28.8 months (range: 0.04-168.2 months) were screened. Among these, 62 were diagnosed with IEM, with a detection rate of 0.56%. Thirty-five were males and 27 females and the median age was 3.55 months (range 0.07-143.9 months). Of the 62 patients, 27 (43.5%) had aminoacidemias, 26 (41.9%) had organic acidemias and nine (14.5%) had fatty acid oxidation disorders.</p> <p>Conclusions</p> <p>Because most symptomatic patients are diagnosed at an older age, mental retardation and motor delay are difficult to reverse. Additionally, poor medication compliance reduces the efficacy of treatment. More extensive newborn screening is thus imperative for ensuring early diagnosis and enhancing the treatment efficacy of IEM.</p

    Analysis of Insulin Doses of Chinese Type 2 Diabetic Patients with Intensive Insulin Treatment

    Get PDF
    BACKGROUND: To investigate the daily insulin doses and the ratio of basal insulin to total daily insulin in Chinese type 2 diabetic patients who received basal bolus insulin therapy. METHODOLOGY/PRINCIPAL FINDINGS: Totally 2480 patients prescribed with pre-meal bolus insulin and bedtime basal insulin were included. The mean daily insulin doses was 38.22 ± 14.92 IU/day, the mean daily insulin doses per weight was 0.58 ± 0.22 IU/kg, the mean bolus insulin dose was 0.44 ± 0.17 IU/kg and the mean basal insulin dose was 0.13 ± 0.08 IU/kg. The mean basal/total daily insulin ratio (BD/TDD) was 0.23 ± 0.08. In most patients (47.94%), the BD/TDD was between 0.20 and 0.30. Diabetic duration, BMI, HbA1c, fasting and postprandial blood glucose level were positively associated with daily insulin dose, while age was negatively associated with daily insulin dose. Diabetic duration, BMI, HbA1c, fasting blood glucose level, and using metformin were positively associated with BD/TDD ratio, while age, postprandial C peptide, postprandial blood glucose level and CRE level were negatively associated with BD/TDD ratio. CONCLUSIONS/SIGNIFICANCE: The daily insulin doses of intensive treatment in Chinese type 2 diabetic patients was 38.22 IU/day, the mean daily insulin doses per weight was 0.58 IU/kg, mean BD/TDD ratio was 0.23
    corecore