73 research outputs found

    Is the Neuraminidase Inhibitor Tamiflu Effective in the Treatment of Influenza?

    Get PDF
    Influenza is a disease that has caused the deaths of tens of millions people in the last century alone. The influenza neuraminidase protein is essential in the mechanism infection. It enables the virus to leave the infected cell and proliferate. Antiviral neuraminidase inhibitor drugs can be used for treatment. The drug Tamiflu is the standard of care for both treatment and prophylaxis of influenza. The Cochrane reports of 2009 and 2014 conclude that evidence is lacking to support this. Numerous bodies disagree. Cochrane also question the accuracy and credibility of many studies and agencies in support of Tamiflu. This paper explores the issues

    Email Archive Analysis Through Graphical Visualization

    Get PDF
    The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spam and virus filtering. Current email analysis in standard client applications consists of keyword based matching techniques for filtering and expert driven manual exploration of email files. We have implemented a tool, called the Email Mining Toolkit (EMT) for analyzing email archives which includes a graphical display to explore relationships between users and groups of email users. The chronological flow of an email message can be analyzed by EMT. Our design goal is to embed the technology into standard email clients, such as Outlook, revealing far more information about a user's own email history than is otherwise now possible. In this paper we detail the visualization techniques implemented in EMT. We show the utility of these tools and underlying models for detecting email misuse such as viral propagation, and spam spread as examples

    Modeling User Search-Behavior for Masquerade Detection

    Get PDF
    Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by modeling user search behavior to detect deviations indicating a masquerade attack. We hypothesize that each individual user knows their own file system well enough to search in a limited, targeted and unique fashion in order to find information germane to their current task. Masqueraders, on the other hand, will likely not know the file system and layout of another user's desktop, and would likely search more extensively and broadly in a manner that is different than the victim user being impersonated. We extend prior research by devising taxonomies of UNIX commands and Windows applications that are used to abstract sequences of user commands and actions. The experimental results show that modeling search behavior reliably detects all masqueraders with a very low false positive rate of 0.13%, far better than prior published results. The limited set of features used for search behavior modeling also results in large performance gains over the same modeling techniques that use larger sets of features

    Automated Social Hierarchy Detection through Email Network Analysis

    Get PDF
    We present our work on automatically extracting social hierarchies from electronic communication data. Data mining based on user behavior can be leveraged to analyze and catalog patterns of communications between entities to rank relationships. The advantage is that the analysis can be done in an automatic fashion and can adopt itself to organizational changes over time. We illustrate the algorithms over real world data using the Enron corporation's email archive. The results show great promise when compared to the corporations work chart and judicial proceeding analyzing the major players

    Behavior Profiling of Email

    Get PDF
    This paper describes the forensic and intelligence analysis capabilities of the Email Mining Toolkit (EMT) under development at the Columbia Intrusion Detection (IDS) Lab. EMT provides the means of loading, parsing and analyzing email logs, including content, in a wide range of formats. Many tools and techniques have been available from the fields of Information Retrieval (IR) and Natural Language Processing (NLP) for analyzing documents of various sorts, including emails. EMT, however, extends these kinds of analyses with an entirely new set of analyses that model "user behavior." EMT thus models the behavior of individual user email accounts, or groups of accounts, including the "social cliques" revealed by a user's email behavior

    Human biallelic MFN2 mutations induce mitochondrial dysfunction, upper body adipose hyperplasia, and suppression of leptin expression

    Get PDF
    MFN2 encodes mitofusin 2, a membrane-bound mediator of mitochondrial membrane fusion and inter-organelle communication. MFN2 mutations cause axonal neuropathy, with associated lipodystrophy only occasionally noted, however homozygosity for the p.Arg707Trp mutation was recently associated with upper body adipose overgrowth. We describe similar massive adipose overgrowth with suppressed leptin expression in four further patients with biallelic MFN2 mutations and at least one p.Arg707Trp allele. Overgrown tissue was composed of normal-sized, UCP1-negative unilocular adipocytes, with mitochondrial network fragmentation, disorganised cristae, and increased autophagosomes. There was strong transcriptional evidence of mitochondrial stress signalling, increased protein synthesis, and suppression of signatures of cell death in affected tissue, whereas mitochondrial morphology and gene expression were normal in skin fibroblasts. These findings suggest that specific MFN2 mutations cause tissue-selective mitochondrial dysfunction with increased adipocyte proliferation and survival, confirm a novel form of excess adiposity with paradoxical suppression of leptin expression, and suggest potential targeted therapies
    corecore