4,299 research outputs found

    An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

    Full text link
    As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure

    Accelerator performance analysis of the Fermilab Muon Campus

    Full text link
    Fermilab is dedicated to hosting world-class experiments in search of new physics that will operate in the coming years. The Muon g-2 Experiment is one such experiment that will determine with unprecedented precision the muon anomalous magnetic moment, which offers an important test of the Standard Model. We describe in this study the accelerator facility that will deliver a muon beam to this experiment. We first present the lattice design that allows for efficient capture, transport, and delivery of polarized muon beams. We then numerically examine its performance by simulating pion production in the target, muon collection by the downstream beam line optics, as well as transport of muon polarization. We finally establish the conditions required for the safe removal of unwanted secondary particles that minimizes contamination of the final beam.Comment: 10 p

    Stories of Hell and Healing: Internet Users’ Construction of Benzodiazepine Distress and Withdrawal

    Get PDF
    Abstract Benzodiazepines are a group of drugs used mainly as sedatives, hypnotics, antiepileptics, and muscle relaxants. Consumption is recommended for 2 to 4 weeks only, due to fast onset of dependency and potentially distressing withdrawal symptoms. Few peer-review studies have drawn on the user experiences and language to appreciate firsthand experiences of benzodiazepine withdrawal or discontinuation syndrome. We looked extensively at patient stories of benzodiazepine withdrawal and recovery on Internet support sites and YouTube. Our analysis indicated that users employ rich metaphors to portray the psychologically disturbing and protracted nature of their suffering. We identified seven major themes: hell and isolation, anxiety and depression, alienation, physical distress, anger and remorse, waves and windows, and healing and renewal. By posting success stories, ex-users make known that “healing” can be a long, unpredictable process, but distress does lessen, and recovery can happen

    Recent Low x and Diffractive Collider Data

    Full text link
    Selected recent data from collider experiments pertaining to the understanding of QCD at low Bjorken-x are reviewed. The status of QCD and Regge factorisation in hard diffractive interactions is discussed in terms of data from HERA and the Tevatron. The possibility of anomalous behaviour in the γγ\gamma \gamma total cross section is confronted with the most recent measurements from LEP. Data from all three colliders that are sensitive to possible BFKL effects are presented and different interpretations are discussed.Comment: 9 pages, introductory talk from the 1999 Durham Phenomenology Workshop on Collider Physic

    Closed Strings with Low Harmonics and Kinks

    Full text link
    Low-harmonic formulas for closed relativistic strings are given. General parametrizations are presented for the addition of second- and third-harmonic waves to the fundamental wave. The method of determination of the parametrizations is based upon a product representation found for the finite Fourier series of string motion in which the constraints are automatically satisfied. The construction of strings with kinks is discussed, including examples. A procedure is laid out for the representation of kinks that arise from self-intersection, and subsequent intercommutation, for harmonically parametrized cosmic strings.Comment: 39, CWRUTH-93-
    • …
    corecore