84 research outputs found

    NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

    Full text link
    As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and improve mobile network security through better understanding of the threat landscape. NEMESYS will gather and analyze information about the nature of cyber-attacks targeting mobile users and the mobile network so that appropriate counter-measures can be taken. We will develop a data collection infrastructure that incorporates virtualized mobile honeypots and a honeyclient, to gather, detect and provide early warning of mobile attacks and better understand the modus operandi of cyber-criminals that target mobile devices. By correlating the extracted information with the known patterns of attacks from wireline networks, we will reveal and identify trends in the way that cyber-criminals launch attacks against mobile devices.Comment: Accepted for publication in Proceedings of the 28th International Symposium on Computer and Information Sciences (ISCIS'13); 9 pages; 1 figur

    Data Protection and Cybersecurity Certification Activities and Schemes in the Energy Sector

    Get PDF
    Cybersecurity concerns have been at the forefront of regulatory reform in the European Union (EU) recently. One of the outcomes of these reforms is the introduction of certification schemes for information and communication technology (ICT) products, services and processes, as well as for data processing operations concerning personal data. These schemes aim to provide an avenue for consumers to assess the compliance posture of organisations concerning the privacy and security of ICT products, services and processes. They also present manufacturers, providers and data controllers with the opportunity to demonstrate compliance with regulatory requirements through a verifiable third-party assessment. As these certification schemes are being developed, various sectors, including the electrical power and energy sector, will need to access the impact on their operations and plan towards successful implementation. Relying on a doctrinal method, this paper identifies relevant EU legal instruments on data protection and cybersecurity certification and their interpretation in order to examine their potential impact when applying certification schemes within the Electrical Power and Energy System (EPES) domain. The result suggests that the EPES domain employs different technologies and services from diverse areas, which can result in the application of several certification schemes within its environment, including horizontal, technological and sector-specific schemes. This has the potential for creating a complex constellation of implementation models and would require careful design to avoid proliferation and disincentivising of stakeholders. © 2022 by the authors. Licensee MDPI, Basel, Switzerland

    Simulating fog and edge computing scenarios: an overview and research challenges

    Get PDF
    The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected heterogeneous endpoints located at the edge of networks while, at the same time, meeting quality of service levels. The complexity of computing at the edge makes it increasingly difficult for infrastructure providers to plan for and provision resources to meet this demand. While simulation frameworks are used extensively in the modelling of cloud computing environments in order to test and validate technical solutions, they are at a nascent stage of development and adoption for fog and edge computing. This paper provides an overview of challenges posed by fog and edge computing in relation to simulation

    Complicated Gallstones after Laparoscopic Sleeve Gastrectomy

    Get PDF
    Background. The natural history of gallstone formation after laparoscopic sleeve gastrectomy (LSG), the incidence of symptomatic gallstones, and timing of cholecystectomy are not well established. Methods. A retrospective review of prospectively collected database of 150 patients that underwent LSG was reviewed. Results. Preoperatively, gallbladder disease was identified in 32 of the patients (23.2%). Postoperatively, eight of 138 patients (5.8%) became symptomatic. Namely, three of 23 patients (13%) who had evident cholelithiasis preoperatively developed complicated cholelithiasis. From the cohort of patients without preoperative cholelithiasis, five of 106 patients (4.7%) experienced complicated gallstones after LSG. Total cumulative incidence of complicated gallstones was 4.7% (95% CI: 1.3–8.1%). The gallbladder disease-free survival rate was 92.2% at 2 years. No patient underwent cholecystectomy earlier than 9 months or later than 23 months indicating the post-LSG effect. Conclusion. A significant proportion of bariatric patients compared to the general population became symptomatic and soon developed complications after LSG, thus early cholecystectomy is warranted. Routine concomitant cholecystectomy could be considered because the proportion of patients who developed complications especially those with potentially significant morbidities is high and the time to develop complications is short and because of the real technical difficulties during subsequent cholecystectomy

    Towards simulation and optimization of cache placement on large virtual Content Distribution Networks

    Get PDF
    IP video traffic is forecast to be 82% of all IP traffic by 2022. Traditionally, Content Distribution Networks (CDN) were used extensively to meet the quality of service levels for IP video services. To handle the dramatic growth in video traffic, CDN operators are migrating their infrastructure to the cloud and fog in order to leverage its greater availability and flexibility. For hyper-scale deployments, energy consumption, cache placement, and resource availability can be analyzed using simulation in order to improve resource utilization and performance. Recently, a discrete-time simulator for modelling hierarchical virtual CDNs (vCDNs) was proposed with reduced memory requirements and increased performance using multi-core systems to cater to the scale and complexity of these networks. The first iteration of this discrete-time simulator featured a number of limitations impacting accuracy and applicability: it supports only tree-based topology structures, the results are computed per level, and requests of the same content differ only in time duration. In this paper, we present an improved simulation framework that (a) supports graph-based network topologies, (b) requests have been reconstituted for differentiation of requirements, and (c) statistics are now computed per site and network metrics per link, improving the granularity and parallel performance. Moreover, we also propose a two-phase optimization scheme that makes use of simulation outputs to guide the search for optimal cache placements. In order to evaluate our proposal, we simulate a vCDN network based on real traces obtained from the BT vCDN infrastructure and analyze performance and scalability aspects

    Acute occlusion of the celiac axis and its branches with perforation of gastric fundus and splenic infarction, findings on spiral computed tomography: a case report

    Get PDF
    We present the contrast-enhanced spiral CT findings in a case of acute celiac artery occlusion with gastric perforation and total splenic infarction. Spiral CT depicted thrombus in the celiac axis and its branches, stenosis of the superior mesenteric artery, splenic infarction and lack of enhancement of the gastric wall with a large necrotic gap. Spiral CT enabled prompt diagnosis and therapy in this rare condition in a patient with suspicion of acute mesenteric ischemia

    Heterogeneity, high performance computing, self-organization and the Cloud

    Get PDF
    This open access book addresses the most recent developments in cloud computing such as HPC in the Cloud, heterogeneous cloud, self-organising and self-management, and discusses the business implications of cloud computing adoption. Establishing the need for a new architecture for cloud computing, it discusses a novel cloud management and delivery architecture based on the principles of self-organisation and self-management. This focus shifts the deployment and optimisation effort from the consumer to the software stack running on the cloud infrastructure. It also outlines validation challenges and introduces a novel generalised extensible simulation framework to illustrate the effectiveness, performance and scalability of self-organising and self-managing delivery models on hyperscale cloud infrastructures. It concludes with a number of potential use cases for self-organising, self-managing clouds and the impact on those businesses

    Disease-biased and shared characteristics of the immunoglobulin gene repertoires in marginal zone B cell lymphoproliferations.

    Get PDF
    The B cell receptor immunoglobulin (BcR IG) gene repertoires of marginal zone (MZ) lymphoproliferations were analyzed in order to obtain insight into their ontogenetic relationships. Our cohort included cases with MZ lymphomas (n=488) i.e. splenic (SMZL), nodal (NMZL) and extranodal (ENMZL) as well as provisional entities (n=76) according to the World Health Organization classification. The most striking IG gene repertoire skewing was observed in SMZL. However, restrictions were also identified in all other MZ lymphomas studied, particularly ENMZL, with significantly different IG gene distributions depending on the primary site of involvement. Cross-entity comparisons of the MZ IG sequence dataset with a large dataset of IG sequences (MZ-related or not; n=65,837) revealed four major clusters of cases sharing homologous ('public') heavy variable complementarity-determining region 3. These clusters included rearrangements from SMZL, ENMZL (gastric, salivary gland, ocular adnexa), chronic lymphocytic leukemia but also rheumatoid factors and non-malignant spleen MZ cells. In conclusion, different MZ lymphomas display biased immunogenetic signatures indicating distinct antigen exposure histories. The existence of rare public stereotypes raises the intriguing possibility that common, pathogen-triggered, immune-mediated mechanisms, may result in diverse B lymphoproliferations due to targeting versatile progenitor B cells and/or operating in particular microenvironments.This work was supported in part by H2020 “AEGLE, An analytics framework for integrated and personalized healthcare services in Europe”, by the European Union (EU); H2020 No. 692298 project “MEDGENET, Medical Genomics and Epigenomics Network” by the EU; grant AZV 15-30015A from the Ministry of Health of the Czech Republic, and the project CEITEC2020 LQ1601 from the Ministry of Education, Youth, and Sports of the Czech Republic; Bloodwise Research Grant (15019); the Swedish Cancer Society, the Swedish Research Council, the Knut and Alice Wallenberg Foundation, Karolinska Institutet, Stockholm, the Lion’s Cancer Research Foundation, Uppsala, the Marcus Borgström Foundation and Selander’s Foundation, Uppsala
    corecore