5,091 research outputs found

    Analyzing Network Level Information

    Get PDF
    This chapter provides a brief description of the methods employed for collecting initial information about a given suspicious online communication message, including header and network information; and how to forensically analyze the dataset to attain the information that would be necessary to trace back to the source of the crime. The header content and network information are usually the immediate sources for collecting preliminary information about a given collection of suspicious online messages. The header analysis of an e-mail corpus identifying all the senders, the recipients associated with each sender, and the frequency of messages exchanged between users helps an investigator to understand the overall nature of e-mail communication. Electronic messages like e-mails or virtual network data present a potential dataset or a source of evidence containing personal communications, critical business communications, or agreements. When a crime is committed, it is always possible for the perpetrator to manipulate e-mails or any electronic evidence, forging the details to remove relevant evidence or tampering the data to mislead the investigator. Possible manipulation of such evidence may include backdating, executing time-stamp changes, altering the message sender, recipient, or message content, etc. However, such attempts of manipulation and misleading can be detected by examining the message header. By examining e-mail header and analyzing network information through forensic analysis, investigators can gain valuable insight into the source of a message that is otherwise not traceable through the message body. Investigators can utilize a range of existing algorithms and models and build on leveraging typical forensic planning. Such models focus on what type of information should be collected, ensuring the forensically sound collection and preservation of identified Electronically Stored Information (ESI). By applying these models, it is possible to achieve a full analysis and collect all the relevant information pertaining to the crime. The collected finding is then compiled to reconstruct the whole crime scene, deduct more accurate and logical conclusions [1]

    Why do Particle Clouds Generate Electric Charges?

    Full text link
    Grains in desert sandstorms spontaneously generate strong electrical charges; likewise volcanic dust plumes produce spectacular lightning displays. Charged particle clouds also cause devastating explosions in food, drug and coal processing industries. Despite the wide-ranging importance of granular charging in both nature and industry, even the simplest aspects of its causes remain elusive, because it is difficult to understand how inert grains in contact with little more than other inert grains can generate the large charges observed. Here, we present a simple yet predictive explanation for the charging of granular materials in collisional flows. We argue from very basic considerations that charge transfer can be expected in collisions of identical dielectric grains in the presence of an electric field, and we confirm the model's predictions using discrete-element simulations and a tabletop granular experiment

    Conversion of the death inhibitor ARC to a killer activates pancreatic β cell death in diabetes

    Get PDF
    Loss of insulin-secreting pancreatic β cells through apoptosis contributes to the progression of type 2 diabetes, but underlying mechanisms remain elusive. Here, we identify a pathway in which the cell death inhibitor ARC paradoxically becomes a killer during diabetes. While cytoplasmic ARC maintains β cell viability and pancreatic architecture, a pool of ARC relocates to the nucleus to induce β cell apoptosis in humans with diabetes and several pathophysiologically distinct mouse models. β cell death results through the coordinate downregulation of serpins (serine protease inhibitors) not previously known to be synthesized and secreted by β cells. Loss of the serpin α1-antitrypsin from the extracellular space unleashes elastase, triggering the disruption of β cell anchorage and subsequent cell death. Administration of α1-antitrypsin to mice with diabetes prevents β cell death and metabolic abnormalities. These data uncover a pathway for β cell loss in type 2 diabetes and identify an FDA-approved drug that may impede progression of this syndrome

    Inattentive Consumers in Markets for Services

    Get PDF
    In an experiment on markets for services, we find that consumers are likely to stick to default tariffs and achieve suboptimal outcomes. We find that inattention to the task of choosing a better tariff is likely to be a substantial problem in addition to any task and tariff complexity effect. The institutional setup on which we primarily model our experiment is the UK electricity and gas markets, and our conclusion is that the new measures by the UK regulator Ofgem to improve consumer outcomes are likely to be of limited impact

    Shared-network scheme of SMV and GOOSE in smart substation

    Get PDF

    SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    Get PDF
    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coin the term user provenance to refer to tracing users actions to supplement the authorisation decision when users request access. For example restricting access to a particular photograph to those which have “liked” the owners profile. However, such a tracing of actions has the potential to impact the privacy of users requesting access. To mitigate this potential privacy loss the concept of translucency is applied. This paper extends SoNeUCONABC model and presents SoNeUCONABCPro, an access control model which includes translucent user provenance. Entities and access control policies along with their enforcement procedure are formally defined. The evaluation demonstrates that the system satisfies the imposed goals and supports the feasibility of this model in different scenarios.This work was supported by the MINECO grants TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You) and TIN2016-79095-C2-2-R (SMOG-DEV); by the CAM grant S2013/ICE-3095 (CIBERDINE: Cybersecurity, Data, and Risks); and by the Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain (J. M. de Fuentes and L. Gonzalez-Manzano grants)

    Interactions in vivo between the Vif protein of HIV-1 and the precursor (Pr55GAG) of the virion nucleocapsid proteins

    Get PDF
    The abnormality of viral core structure seen in vif-defective HIV-1 grown in PBMCs has suggested a role for Vif in viral morphogenesis. Using an in vivo mammalian two-hybrid assay, the interaction between Vif and the precursor (Pr55GAG) of the virion nucleocapsid proteins has been analysed. This revealed the amino-terminal (aa 1–22) and central (aa 70–100) regions of Vif to be essential for its interaction with Pr55GAG, but deletion of the carboxy-terminal (aa 158–192) region of the protein had only a minor effect on its interaction. Initial deletion studies carried out on Pr55GAG showed that a 35-amino-acid region of the protein bridging the MA(p17)–CA(p24) junction was essential for its ability to interact with Vif. Site-directed mutagenesis of a conserved tryptophan (Trp21) near the amino terminus of Vif showed it to be important for the interaction with Pr55GAG. By contrast, mutagenesis of the highly conserved YLAL residues forming part of the BC-box motif, shown to be important in Vif promoting degradation of APOBEC3G/3F, had little or no effect on the Vif–Pr55GAG interaction

    Peripheral arterial volume distensibility changes with applied external pressure: significant difference between arteries with different compliance

    Get PDF
    This study aimed to quantify the different effect of external cuff pressure on arterial volume distensibility between peripheral arteries with different compliance. 30 healthy subjects were studied with the arm at two positions (0° and 45° from the horizontal level) to introduce different compliance of arteries. The electrocardiogram and finger and ear photoplethysmograms were recorded simultaneously under five external cuff pressures (0, 10, 20, 30 and 40 mmHg) on the whole arm to obtain arterial volume distensibility. With the applied external cuff pressures of 10, 20, 30 and 40 mmHg, the overall changes in arterial volume distensibility referred to those without external pressure were 0.010, 0.029, 0.054 and 0.108% per mmHg for the arm at the horizontal level, and 0.026, 0.071, 0.170 and 0.389% per mmHg for the arm at 45° from the horizontal level, confirming the non-linearity between arterial volume distensibility and external pressure. More interestingly, the significant differences in arterial volume distensibility changes were observed between the two arm positions, which were 0.016, 0.043, 0.116 and 0.281% per mmHg (all P < 0.01). Our findings demonstrated that arterial volume distensibility of peripheral arm arteries increased with external pressure, with a greater effect for more compliant arteries
    • …
    corecore