588 research outputs found
Thermoregulatory and cardiovascular responses to creatine, glycerol and alpha lipoic acid in trained cyclists
<p>Abstract</p> <p>Background</p> <p>It has been shown that supplementation with creatine (Cr) and glycerol (Gly), when combined with glucose (Glu) necessary for the enhancement of Cr uptake by skeletal muscle, induces significant improvements in thermoregulatory and cardiovascular responses during exercise in the heat.</p> <p>Purpose</p> <p>To determine whether Cr/Gly-induced thermoregulatory and cardiovascular responses are maintained when the majority (~75%) of the Glu in the Cr/Gly supplement is replaced with the insulintropic agent alpha lipoic acid (Ala).</p> <p>Methods</p> <p>22 healthy endurance trained cyclists were randomly assigned to receive either 20 g/day (4 × 5 g/day) of Cr, 2 g <sup>.</sup>kg<sup>-1</sup> BM per day (4 × 0.5 g <sup>.</sup>kg<sup>-1</sup> BM per day) of Gly and 150 g/day (4 × 37.5 g/day) of Glu or 20 g/day (4 × 5 g/day) of Cr monohydrate, 2 g <sup>.</sup>kg<sup>-1</sup> BM per day (4 × 0.5 g <sup>.</sup>kg<sup>-1</sup> BM per day) of Gly (100 g/day (4 × 25 g/day) of Glu and 1000 mg/day (4 × 250 mg/day) of Ala for 7 days for 7 days. Exercise trials were conducted pre- and post-supplementation and involved 40 min of constant-load cycling exercise at 70% O<sub>2</sub> max by a self-paced 16.1 km time trial at 30°C and 70% relative humidity.</p> <p>Results</p> <p>Median and range values of TBW increased significantly by 2.1 (1.3-3.3) L and 1.8 (0.2-4.6) L in Cr/Gly/Glu and Cr/Gly/Glu/Ala groups respectively (<it>P</it> = 0.03) and of BM not significantly by 1.8 (0.2-3.0) kg and 1.2 (0.5-2.1) kg in Cr/Gly/Glu and in Cr/Gly/Glu/Ala, respectively (<it>P</it> = 0.75). During constant load exercise, heart rate (HR) and core temperature (Tcore) were significantly lower post-supplementation: HR was reduced on average by 3.3 ± 2.1 beats/min and by 4.8 ± 3.3 beats/min (mean ± SD) and Tcore by 0.2 ± 0.1 (mean ± SD) in the Cr/Gly/Glu and Cr/Gly/Glu/Ala, respectively The reduction in HR and Tcore was not significantly different between the supplementation groups.</p> <p>Conclusions</p> <p>In comparison to the established hyper hydrating Cr/Gly/Glu supplement, supplement containing Cr/Gly/Ala and decreased amount of Glu provides equal improvements in thermoregulatory and cardiovascular responses during exercise in the heat.</p
Talos: a prototype Intrusion Detection and Prevention system for profiling ransomware behaviour
Abstract: In this paper, we profile the behaviour and functionality of multiple recent variants of WannaCry and CrySiS/Dharma, through static and dynamic malware analysis. We then analyse and detail the commonly occurring behavioural features of ransomware. These features are utilised to develop a prototype Intrusion Detection and Prevention System (IDPS) named Talos, which comprises of several detection mechanisms/components. Benchmarking is later performed to test and validate the performance of the proposed Talos IDPS system and the results discussed in detail. It is established that the Talos system can successfully detect all ransomware variants tested, in an average of 1.7 seconds and instigate remedial action in a timely manner following first detection. The paper concludes with a summarisation of our main findings and discussion of potential future works which may be carried out to allow the effective detection and prevention of ransomware on systems and networks
Recommended from our members
Cyber Threat Intelligence Sharing in Nigeria
Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria\u27s cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an approach informed by grounded theory. We coded the data, organised the data into categories, and used constant comparison to check our code\u27s consistency and accuracy. We developed memos from which our descriptive grounded theory emerged. After a detailed study, we found that cybersecurity practitioners in Nigeria are enthusiastic about collaborating to exchange and receive cyber threat intelligence. However, we discovered two impediments to sharing. Firstly, the existence of competing standardisation in cyber threat intelligence sharing and, secondly, the lack of practitioner\u27s skills in data protection. These barriers inhibit cyber security practitioners from disseminating such cyber threat intelligence sharing inside Nigeria. Based on our findings, we conclude that overcoming these impediments will help cybersecurity practitioners share more cyber threat intelligence in Nigeria
Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries
Abstract—Control flow hijacking has been a major challenge in software security. Several means of protections have been developed but insecurities persist. This is because existing protections have sometimes been circumvented while some resilient protections do not cover all applications. Studies have revealed that a holistic way of tackling software insecurity could involve watchdog monitoring and detection via Control Flow Integrity (CFI). The CFI concept has shown a good measure of reliability to mitigate control flow hijacking. However, sophisticated attack techniques in the form of Return Oriented Programming (ROP) have persisted. A flexible protection is desirable, which not only covers as many architecture structures as possible but also mitigates known resilient attacks like ROP. The solution proffered here is a hybrid of CFI and watchdog timing via inter-process signaling (IP-CFI). It is a software-based protection that involves recompilation of the target program. The implementation here is on vulnerable RISC-V-based process but is flexible and could be adapted on other architectures. We present a proof of concept in IP-CFI which when applied to a vulnerable program, ROP is mitigated. The target program incurs a run-time overhead of 1.5%. The code is available
Policing the Cyber Threat: Exploring the threat from Cyber Crime and the ability of local Law Enforcement to respond
The landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agencies has been robust, with significant investment in mitigating against, and tackling cyber threats. However, at a local level, police forces have to deal with an unknown demand, whilst trying to come to terms with new crime types, terminology and criminal techniques which are far from traditional. This paper looks to identify the demand from cyber crime in one police force in the United Kingdom, and whether there is consistency in the recording of crime. As well as this, it looks to understand whether the force can deal with cyber crime from the point of view of the Police Officers and Police Staff in the organisation
Matters of Biocybersecurity with Consideration to Propaganda Outlets and Biological Agents
The modern era holds vast modalities in human data utilization. Within Biocybersecurity (BCS), categories of biological information, especially medical information transmitted online, can be viewed as pathways to destabilize organizations. Therefore, analysis of how the public, along with medical providers, process such data, and the methods by which false information, particularly propaganda, can be used to upset the flow of verified information to populations of medical professionals, is important for maintenance of public health. Herein, we discuss some interplay of BCS within the scope of propaganda and considerations for navigating the field
AMPK is essential for energy homeostasis regulation and glucose sensing by POMC and AgRP neurons
Hypothalamic AMP-activated protein kinase (AMPK) has been suggested to act as a key sensing mechanism, responding to hormones and nutrients in the regulation of energy homeostasis. However, the precise neuronal populations and cellular mechanisms involved are unclear. The effects of long-term manipulation of hypothalamic AMPK on energy balance are also unknown. To directly address such issues, we generated POMC alpha 2KO and AgRP alpha 2KO mice lacking AMPK alpha 2 in proopiomelanocortin- (POMC-) and agouti-related protein-expressing (AgRP-expressing) neurons, key regulators of energy homeostasis. POMC alpha 2KO mice developed obesity due to reduced energy expenditure and dysregulated food intake but remained sensitive to leptin. in contrast, AgRPa2KO mice developed an age-dependent lean phenotype with increased sensitivity to a melanocortin agonist. Electrophysiological studies in AMPK alpha 2-deficient POMC or AgRP neurons revealed normal leptin or insulin action but absent responses to alterations in extracellular glucose levels, showing that glucose-sensing signaling mechanisms in these neurons are distinct from those pathways utilized by leptin or insulin. Taken together with the divergent phenotypes of POMC alpha 2KO and AgRP alpha 2KO mice, our findings suggest that while AMPK plays a key role in hypothalamic function, it does not act as a general sensor and integrator of energy homeostasis in the mediobasal hypothalamus
Reduction in BACE1 decreases body weight, protects against diet-induced obesity and enhances insulin sensitivity in mice
Insulin resistance and impaired glucose homoeostasis are important indicators of Type 2 diabetes and are early risk factors of AD (Alzheimer's disease). An essential feature of AD pathology is the presence of BACE1 (β-site amyloid precursor protein-cleaving enzyme 1), which regulates production of toxic amyloid peptides. However, whether BACE1 also plays a role in glucose homoeostasis is presently unknown. We have used transgenic mice to analyse the effects of loss of BACE1 on body weight, and lipid and glucose homoeostasis. BACE1−/− mice are lean, with decreased adiposity, higher energy expenditure, and improved glucose disposal and peripheral insulin sensitivity than wild-type littermates. BACE1−/− mice are also protected from diet-induced obesity. BACE1-deficient skeletal muscle and liver exhibit improved insulin sensitivity. In a skeletal muscle cell line, BACE1 inhibition increased glucose uptake and enhanced insulin sensitivity. The loss of BACE1 is associated with increased levels of UCP1 (uncoupling protein 1) in BAT (brown adipose tissue) and UCP2 and UCP3 mRNA in skeletal muscle, indicative of increased uncoupled respiration and metabolic inefficiency. Thus BACE1 levels may play a critical role in glucose and lipid homoeostasis in conditions of chronic nutrient excess. Therefore strategies that ameliorate BACE1 activity may be important novel approaches for the treatment of diabetes
- …