569 research outputs found

    A Dynamically Configurable Log-based Distributed Security Event Detection Methodology using Simple Event Correlator

    Get PDF
    Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case. In addition, the system detects every implemented malicious use case, with a low false positive rate

    Creative Collaboration: Streamlining Digital Project Management and Workflow at Cleveland State University

    Get PDF
    Digital projects are diverse, and there are a variety of ways to manage them. Learn how Cleveland State is streamlining workflows and making the most of limited resources across multiple departments. To streamline project approval and improve communication, the Cleveland State University Library re-evaluated and revised its process to use Microsoft SharePoint to manage workflows. Learn about the process from gathering and reviewing project requirements to implementing workflows based on needs

    Introduction: Controlling the Message in the Social Media Marketplace of Ideas

    Get PDF
    The presidential candidate\u27s campaign faced the threat of being derailed following a scathing depiction of him posted by an individual citizen. Regardless of whether the claims made against the candidate were truthful, the message already had gone viral, and the candidate\u27s campaign flailed in its efforts to respond. Finally, one of the candidate\u27s supporters not affiliated with his campaign repackaged the critic\u27s depiction into a new theme, one that resonated positively with voters. The repackaged message itself continued well beyond its original posting as it was replicated in different forums time and time again

    Emergency Care Triage Scales in Developing Countries: A Protocol for a Systematic Review of Outcomes, Evidence and Quality

    Get PDF
    Emergency Department triage scales can play a key role in the development of emergency care capacity for developing countries. Numerous studies exist on the reliability and validity of these systems in High Income Countries. However, little is known about the efficacy of these systems in developing countries. This systematic review protocol aims to prepare a team of international experts to investigate published literature on triage system implementation outcomes in Low and Middle Income Countries (LMICs). A systematic search will be completed from published literature, without language or date restrictions, in the following databases: EMBASE, Web of Science, Pubmed, Scopus, CINAHL, and Global Health. The search strategy for all databases include these terms: (Emergency) AND (triage). Other search terms were included, as well as a novel search string to limit to LMICs. A-priori roles, definitions, timeline and strategies are explicitly stated for this systematic review. Study protocol will be submitted to PROSPERO and the University of North Carolina Institutional Review Board. Data Abstraction forms and Quality of Evidence tables will be piloted on preliminary included studies. Study team members will review protocol for completeness. Initial search using the specified PICOTTS criteria revealed 3150 abstracts for review. Consensus from two independent reviewers will reveal full text articles to assess for eligibility. After final editing by review team, submission to PROSPERO, and approval by UNC IRB, this systematic review will resume with review of full text articles for eligibility.Master of Public Healt

    Concrete Roughness Characterization using Laser Profilometry for Fiber-Reinforced Polymer Sheet Application

    Get PDF
    The failure of a reinforced concrete member strengthened with fiberreinforced polymer (FRP) laminates may be caused by crushing of concrete, rupture of FRP laminates, or delamination of the FRP sheet. Therefore, the effectiveness and failure mode of FRP sheets applied to beams and columns is related to the degree of adhesion of the epoxy to the concrete surface. When a peeling or delamination failure can be avoided, a more effective engagement of the FRP sheet occurs, which results in more efficient use of the material. One of the principal factors affecting the bond behavior between the concrete and epoxy is the roughness of the concrete substrate. To prepare the bond surface, sand blasting or grinding is typically used to roughen the concrete. To that end, a portable device has been developed to measure the roughness of concrete surfaces. This device can be used as a quality-control tool to characterize surface roughness and identify when an adequate surface preparation has been attained. The method uses laser striping and image analysis. The method was tested on six slabs of sandblasted concrete, which were sandblasted to varying degrees of surface roughness, and a series of nine plastic model concrete surface profiles

    Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology

    Get PDF
    Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event correlation system designed to overcome these limitations by distributing the event correlation workload across the network of event-producing systems. To demonstrate the utility of the methodology, we model and simulate centralized, decentralized, and hybrid log analysis environments over three accountability levels and compare their performance in terms of detection capability, network bandwidth utilization, database query efficiency, and configurability. The results show that when compared to centralized event correlation, dynamically configured distributed event correlation provides increased flexibility, a significant reduction in network traffic in low and medium accountability environments, and a decrease in database query execution time in the high-accountability case

    Resident Instruction in Social Emergency Medicine

    Get PDF
    Understanding social determinants of health (SDH) and their intersection with emergency medicine, also known as social emergency medicine (SEM), is an important area of EM training.https://knowledgeconnection.mainehealth.org/lambrew-retreat-2021/1043/thumbnail.jp

    Visual Vibrometry: Estimating Material Properties from Small Motions in Video

    Get PDF
    The estimation of material properties is important for scene understanding, with many applications in vision, robotics, and structural engineering. This paper connects fundamentals of vibration mechanics with computer vision techniques in order to infer material properties from small, often imperceptible motion in video. Objects tend to vibrate in a set of preferred modes. The shapes and frequencies of these modes depend on the structure and material properties of an object. Focusing on the case where geometry is known or fixed, we show how information about an object’s modes of vibration can be extracted from video and used to make inferences about that object’s material properties. We demonstrate our approach by estimating material properties for a variety of rods and fabrics by passively observing their motion in high-speed and regular framerate video.National Science Foundation (U.S.) (Robust Intelligence 1212849 Reconstructive Recognition)Shell Oil CompanyQatar Computing Research InstituteNational Science Foundation (U.S.). Graduate Research Fellowshi
    • …
    corecore