715 research outputs found

    Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack

    Get PDF
    Once the system is compromised, the forensics and investigation are always executed after the attacks and the loss of some useful instant evidence. Since there is no log information necessary for analyzing an attack cause after the cyber incident occurs, it is difficult to analyze the cause of an intrusion even after an intrusion event is recognized. Moreover, in an advanced cyber incident such as advanced persistent threats, several months or more are expended in only analyzing a cause, and it is difficult to find the cause with conventional security equipment. In this paper, we introduce a network intrusion forensics system for collecting and preserving the evidence of an intrusion, it is called Cyber Black Box that is deployed in Local Area Network environment. It quickly analyzes a cause of an intrusion event when the intrusion event occurs, and provides a function of collecting evidence data of the intrusion event. The paper also describes the experimental results of the network throughput performance by deploying our proposed system in an experimental testbed environment

    The survival of holes as thru-holes in thru-hole epitaxy: How can holes in 2D layers not sealed off during multiple stacking of those layers?

    Full text link
    Thru-hole epitaxy was recently reported to be able to grow readily detachable domains crystallographically aligned with the underlying substrate over 2D mask material transferred onto a substrate. While the experimental demonstration of thru-hole epitaxy of GaN over multiple stacks of hh-BN was evident, the detailed mechanism of how small holes in each stack of hh-BN survived as thru-holes during multiple stacking of hh-BN was not intuitively clear. Here, we show through Monte Carlo simulations that in what conditions holes in each stack of 2D mask layers can survive as thru-holes during multiple stacking. If more holes are laterally connected, the survival rate of thru-holes increases resulting in the epitaxial connectedness. This computational work verifies and supports that thru-hole epitaxy is attributed to the epitaxial connectedness established by thru-holes survived even through multiple stacks.Comment: 14 pages, 6 figure

    (Mis)Communicating with Geographic Information System Mapping: Part 1--Choosing Units of Representation

    Get PDF
    Extension professionals are increasingly using geographic information system (GIS) technology to develop and inform programs and services. In this article, we use a mapping exercise to demonstrate how the unit of data can be applied and inadvertently misrepresented in GIS mapping. We contrast the use of counts, percentages, and location quotients with the same data and the resulting divergence in maps. The discussion addresses ideal circumstances for using each unit of data. Overall, the article illustrates the need for Extension professionals to be cognizant of the benefits and limitations of various units of data to avoid miscommunication when using GIS mapping

    (Mis)Communicating with Geographic Information System Mapping: Part 2—Determining Data Cutoffs

    Get PDF
    The increasing use of geographic information system (GIS) technology in various fields suggests the need for professionals, including those in Extension, to be mindful of communicating data accurately and effectively. This article examines approaches to creating classes or groupings within data as well as the weaknesses of each approach. Data break units discussed in the article include equal intervals, quantiles, and units resulting from natural breaks. Ideal situations for each type of data break are presented. The article emphasizes the need for Extension professionals to consider the effects of data grouping to avoid miscommunication when using GIS mapping

    (Mis)Communicating with Geographic Information System Mapping: Part 1—Choosing Unit of Representation

    Get PDF
    Extension professionals are increasingly using geographic information system (GIS) technology to develop and inform programs and services. In this article, we use a mapping exercise to demonstrate how the unit of data can be applied and inadvertently misrepresented in GIS mapping. We contrast the use of counts, percentages, and location quotients with the same data and the resulting divergence in maps. The discussion addresses ideal circumstances for using each unit of data. Overall, the article illustrates the need for Extension professionals to be cognizant of the benefits and limitations of various units of data to avoid miscommunication when using GIS mapping

    (Mis)Communicating with Geographic Information System Mapping: Part 2—Determining Data Cutoffs

    Get PDF
    The increasing use of geographic information system (GIS) technology in various fields suggests the need for professionals, including those in Extension, to be mindful of communicating data accurately and effectively. This article examines approaches to creating classes or groupings within data as well as the weaknesses of each approach. Data break units discussed in the article include equal intervals, quantiles, and units resulting from natural breaks. Ideal situations for each type of data break are presented. The article emphasizes the need for Extension professionals to consider the effects of data grouping to avoid miscommunication when using GIS mapping

    Antimicrobial peptide from Bacillus subtilis CSB138: characterization, killing kinetics, and synergistic potency

    Get PDF
    We studied the prospect of synergy between the antimicrobial peptide p138c and non-peptide antibiotics for increasing the potency and bacterial killing kinetics of these agents. The production of p138c was maximized in the late exponential growth phase of Bacillus subtilis CSB138. Purification of p138c resulted in a total of 4800 arbitrary units (AU) with 19.15-fold and 3.2% recovery. Peptide p138c was thermo-tolerant up to 50 °C and stable at pH 5.8 to 11. The biochemical nature of p138c was determined by a bioassay, similar to tricine-SDS-PAGE, indicating inhibition at 3 kDa. The amino acid sequence of p138c was Gly-Leu-Glu-Glu-Thr-Val-Tyr-Ile-Tyr-Gly-Ala-Asn-Met-X-Ser. Potency and killing kinetics against vancomycin-resistant Staphylococcus aureus improved considerably when p138c was synergized with oxacillin, ampicillin, and penicillin G. The minimal inhibitory concentration (MIC) of p138c showed a 4-, 8-, and 16-fold improvement when p138c was combined with oxacillin, ampicillin, and penicillin G, respectively. The fractional inhibitory concentration index for the combination of p138c and oxacillin, ampicillin, and penicillin G was 0.3125, 0.25, and 0.09, respectively. Synergy with non-peptide antibiotics resulted in enhanced killing kinetics of p138c. Hence, the synergy between antimicrobial peptide and non-peptide antibiotics may enhance the potency and bacterial killing kinetics, providing more potent and rapidly acting agents for therapeutic use. [Int Microbiol 20(1):43-53 (2017)]Keywords: Bacillus subtilis · antimicrobial peptides · killing kinetic
    • …
    corecore