4,335 research outputs found
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
As today's organizational computer networks are ever evolving and becoming
more and more complex, finding potential vulnerabilities and conducting
security audits has become a crucial element in securing these networks. The
first step in auditing a network is reconnaissance by mapping it to get a
comprehensive overview over its structure. The growing complexity, however,
makes this task increasingly effortful, even more as mapping (instead of plain
scanning), presently, still involves a lot of manual work. Therefore, the
concept proposed in this paper automates the scanning and mapping of unknown
and non-cooperative computer networks in order to find security weaknesses or
verify access controls. It further helps to conduct audits by allowing
comparing documented with actual networks and finding unauthorized network
devices, as well as evaluating access control methods by conducting delta
scans. It uses a novel approach of augmenting data from iteratively chained
existing scanning tools with context, using genuine analytics modules to allow
assessing a network's topology instead of just generating a list of scanned
devices. It further contains a visualization model that provides a clear, lucid
topology map and a special graph for comparative analysis. The goal is to
provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure
Accelerator performance analysis of the Fermilab Muon Campus
Fermilab is dedicated to hosting world-class experiments in search of new
physics that will operate in the coming years. The Muon g-2 Experiment is one
such experiment that will determine with unprecedented precision the muon
anomalous magnetic moment, which offers an important test of the Standard
Model. We describe in this study the accelerator facility that will deliver a
muon beam to this experiment. We first present the lattice design that allows
for efficient capture, transport, and delivery of polarized muon beams. We then
numerically examine its performance by simulating pion production in the
target, muon collection by the downstream beam line optics, as well as
transport of muon polarization. We finally establish the conditions required
for the safe removal of unwanted secondary particles that minimizes
contamination of the final beam.Comment: 10 p
Stories of Hell and Healing: Internet Users’ Construction of Benzodiazepine Distress and Withdrawal
Abstract
Benzodiazepines are a group of drugs used mainly as sedatives, hypnotics, antiepileptics, and muscle relaxants. Consumption is recommended for 2 to 4 weeks only, due to fast onset of dependency and potentially distressing withdrawal symptoms. Few peer-review studies have drawn on the user experiences and language to appreciate firsthand experiences of benzodiazepine withdrawal or discontinuation syndrome. We looked extensively at patient stories of benzodiazepine withdrawal and recovery on Internet support sites and YouTube. Our analysis indicated that users employ rich metaphors to portray the psychologically disturbing and protracted nature of their suffering. We identified seven major themes: hell and isolation, anxiety and depression, alienation, physical distress, anger and remorse, waves and windows, and healing and renewal. By posting success stories, ex-users make known that “healing” can be a long, unpredictable process, but distress does lessen, and recovery can happen
Recent Low x and Diffractive Collider Data
Selected recent data from collider experiments pertaining to the
understanding of QCD at low Bjorken-x are reviewed. The status of QCD and Regge
factorisation in hard diffractive interactions is discussed in terms of data
from HERA and the Tevatron. The possibility of anomalous behaviour in the
total cross section is confronted with the most recent
measurements from LEP. Data from all three colliders that are sensitive to
possible BFKL effects are presented and different interpretations are
discussed.Comment: 9 pages, introductory talk from the 1999 Durham Phenomenology
Workshop on Collider Physic
Closed Strings with Low Harmonics and Kinks
Low-harmonic formulas for closed relativistic strings are given. General
parametrizations are presented for the addition of second- and third-harmonic
waves to the fundamental wave. The method of determination of the
parametrizations is based upon a product representation found for the finite
Fourier series of string motion in which the constraints are automatically
satisfied. The construction of strings with kinks is discussed, including
examples. A procedure is laid out for the representation of kinks that arise
from self-intersection, and subsequent intercommutation, for harmonically
parametrized cosmic strings.Comment: 39, CWRUTH-93-
- …