952 research outputs found

    Hybrid Spam Filtering for Mobile Communication

    Full text link
    Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is the trade-offs between accuracy of anti-spam classifiers and the communication overhead. Experimental results show how, depending on the proportion of spam messages, different filtering %%@ parameters should be set.Comment: 6 pages, 5 figures, 1 tabl

    Glomangiomyoma of the Trachea

    Get PDF
    A glomus tumor is an uncommon soft tissue tumor that is most commonly found in the subungual area and a glomus originating in the trachea is extremely rare. Histologically and ultrastructurally, these tumors have been divided into three subtypes: classic glomus tumors, glomangiomas, and glomangiomyomas. Glomangiomyomas account for less than 10% of all glomus tumors and are the least common type. We report a case of a 54-year-old man with glomangiomyoma of the trachea who presented with stridor. We treated the tumor by segmental resection and primary repair via a transcervical approach

    Postoperative clinical outcomes and radiological healing according to deep and superficial layer detachment in first facet involving subscapularis tendon tear

    Get PDF
    Background Subscapularis tendon insertion at the first facet has separate layers (deep and superficial). The purpose of this study is to evaluate postoperative clinical outcomes and radiological healing according to each layer of detachment in the first facet involving subscapularis tendon tear. Methods Eighty-three patients who underwent arthroscopic repair due to First facet involving the scapularis tendon tear accompanying small to medium sized posterosuperior cuff tear were classified into three groups (group A: deep layer partial detachment, group B: deep layer complete detachment, but no superficial layer detachment, and group C: deep layer and superficial layer complete detachment). Subscapularis tendon healing was evaluated using computed tomography arthrogram and clinical result was evaluated using American Shoulder and Elbow Surgeons (ASES) shoulder score, Constant score and University of California Los Angeles (UCLA) shoulder score. Results Retear rate of the subscapularis tendon was 2.2%, 18.2%, and 33.3% in group A, group B, and group C, respectively. These rates showed statistically significant difference among the three groups, which were classified by deep and superficial layer detachment in the first facet (p=0.003). Group A showed significant difference in subscapularis tendon healing compared with group B and group C (p=0.018 and p<0.001, respectively), but there was no statistical difference between group B and group C (p=0.292). Regarding clinical outcomes, there was no significant difference among three groups in ASES and UCLA score at final follow-up (p=0.070 and p=0.106, respectively). Conclusions Complete detachment of deep layer may be related with retear occurrence regardless with detachment of superficial layer, but clinical outcome may not be related with each layer detachment in the first facet involving subscapularis tendon tear

    Inhibition of RAGE signaling through the intracellular delivery of inhibitor peptides by PEI cationization

    Get PDF
    The receptor for advanced glycation end products (RAGE) is a multi-ligand cell surface receptor and a member of the immunoglobulin superfamily. RAGE is involved in a wide range of inflammatory, degenerative and hyper-proliferative disorders which span over different organs by engaging diverse ligands, including advanced glycation end products, S100 family proteins, high-mobility group protein B1 (HMGB1) and amyloid beta. We previously demonstrated that the cytoplasmic domain of RAGE is phosphorylated upon the binding of ligands, enabling the recruitment of two distinct pairs of adaptor proteins, Toll-interleukin 1 receptor domain-containing adaptor protein (TIRAP) and myeloid differentiation protein 88 (MyD88). This engagement allows the activation of downstream effector molecules, and thereby mediates a wide variety of cellular processes, such as inflammatory responses, apoptotic cell death, migration and cell growth. Therefore, inhibition of the binding of TIRAP to RAGE may abrogate intracellular signaling from ligand-activated RAGE. In the present study, we developed inhibitor peptides for RAGE signaling (RAGE-I) by mimicking the phosphorylatable cytosolic domain of RAGE. RAGE-I was efficiently delivered into the cells by polyethylenimine (PEI) cationization. We demonstrated that RAGE-I specifically bound to TIRAP and abrogated the activation of Cdc42 induced by ligand-activated RAGE. Furthermore, we were able to reduce neuronal cell death induced by an excess amount of S100B and to inhibit the migration and invasion of glioma cells in vitro. Our results indicate that RAGE-I provides a powerful tool for therapeutics to block RAGE-mediated multiple signaling

    Evidence of Log Integrity in Policy-based Security Monitoring

    Get PDF
    Abstract-Monitoring systems are commonly used by many organizations to collect information about their system and network operations. Typically, SNMP, IDS, or software agents generate log data and store them in a centralized monitoring system for analysis. However, malicious employees, attackers, or even organizations themselves can modify such data to hide malicious activities or to avoid expensive non-compliance fines. This paper proposes a cloud-based framework for verifying the trustworthiness of the logs based on a small amount of evidence data. A simple Cloud Security Monitoring (CSM) API, made available on the cloud services, allows organizations operating on the cloud to collect additional &quot;evidence&quot; about their systems. Such evidence is used to verify system compliance against the policies set by security managers or regulatory authorities. We present a strategy for randomly auditing and verifying resource compliance, and propose an architecture that allows the organizations to prove compliance to an external auditing agency

    AMI threats, intrusion detection requirements and deployment recommendations

    Full text link
    Abstract—Advanced Metering Infrastructures (AMI) facilitate bidirectional communication between smart meters and utilities, allowing information about consumption, outages, and electricity rates to be shared reliably and efficiently. However, the numerous smart meters being connected through mesh networks open new opportunities for attackers to interfere with communications and compromise utilities ’ assets or steal customers ’ private information. The goal of this paper is to survey the various threats facing AMIs and the common attack techniques used to realize them in order to identify and understand the requirements for a comprehensive intrusion detection solution. The threat analysis leads to an extensive “attack tree ” that captures the attackers’ key objectives (e.g., energy theft) and the individual attack steps (e.g., eavesdropping on the network) that would be involved in achieving them. With reference to the attack tree, we show the type of information that would be required to effectively detect attacks. We also suggest that the widest coverage in monitoring the attacks can be provided by a hybrid sensing infrastructure that uses both a centralized intrusion detection system and embedded meter sensors. I

    Observation of the Rare Decay of the η Meson to Four Muons

    Get PDF
    A search for the rare η→μ+μ−μ+μ− double-Dalitz decay is performed using a sample of proton-proton collisions, collected by the CMS experiment at the CERN LHC with high-rate muon triggers during 2017 and 2018 and corresponding to an integrated luminosity of 101  fb−1. A signal having a statistical significance well in excess of 5 standard deviations is observed. Using the η→μ+μ− decay as normalization, the branching fraction B(η→μ+μ−μ+μ−)=[5.0±0.8(stat)±0.7(syst)±0.7(B2μ)]×10−9 is measured, where the last term is the uncertainty in the normalization channel branching fraction. This work achieves an improved precision of over 5 orders of magnitude compared to previous results, leading to the first measurement of this branching fraction, which is found to agree with theoretical predictions

    Search for new physics in multijet events with at least one photon and large missing transverse momentum in proton-proton collisions at 13 TeV

    Get PDF
    A search for new physics in final states consisting of at least one photon, multiple jets, and large missing transverse momentum is presented, using proton-proton collision events at a center-of-mass energy of 13 TeV. The data correspond to an integrated luminosity of 137 fb−1, recorded by the CMS experiment at the CERN LHC from 2016 to 2018. The events are divided into mutually exclusive bins characterized by the missing transverse momentum, the number of jets, the number of b-tagged jets, and jets consistent with the presence of hadronically decaying W, Z, or Higgs bosons. The observed data are found to be consistent with the prediction from standard model processes. The results are interpreted in the context of simplified models of pair production of supersymmetric particles via strong and electroweak interactions. Depending on the details of the signal models, gluinos and squarks of masses up to 2.35 and 1.43 TeV, respectively, and electroweakinos of masses up to 1.23 TeV are excluded at 95% confidence level
    corecore