1,090 research outputs found

    Expand+Functional selection and systematic analysis of intronic splicing elements identify active sequence motifs and associated splicing factors

    Get PDF
    Despite the critical role of pre-mRNA splicing in generating proteomic diversity and regulating gene expression, the sequence composition and function of intronic splicing regulatory elements (ISREs) have not been well elucidated. Here, we employed a high-throughput in vivo Screening PLatform for Intronic Control Elements (SPLICE) to identify 125 unique ISRE sequences from a random nucleotide library in human cells. Bioinformatic analyses reveal consensus motifs that resemble splicing regulatory elements and binding sites for characterized splicing factors and that are enriched in the introns of naturally occurring spliced genes, supporting their biological relevance. In vivo characterization, including an RNAi silencing study, demonstrate that ISRE sequences can exhibit combinatorial regulatory activity and that multiple trans-acting factors are involved in the regulatory effect of a single ISRE. Our work provides an initial examination into the sequence characteristics and function of ISREs, providing an important contribution to the splicing code

    Detecting and characterizing lateral phishing at scale

    Get PDF
    We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefit-ting from both the implicit trust and the information in the hijacked user's account. We develop a classifier that finds hundreds of real-world lateral phishing emails, while generating under four false positives per every one-million employee-sent emails. Drawing on the attacks we detect, as well as a corpus of user-reported incidents, we quantify the scale of lateral phishing, identify several thematic content and recipient targeting strategies that attackers follow, illuminate two types of sophisticated behaviors that attackers exhibit, and estimate the success rate of these attacks. Collectively, these results expand our mental models of the 'enterprise attacker' and shed light on the current state of enterprise phishing attacks

    Ein Detektorsystem zum Nachweis der e/Ī³-Komponente grosser Luftschauer im UHE-Bereich

    Get PDF

    Mobile Application Adoption by Young Adults: A Social Network Perspective

    Get PDF
    The use of mobile applications, defined as small programs that run on a mobile device and perform tasks ranging from banking to gaming and web browsing, is exploding. Within the past two years, the industry has grown from essentially nothing to a $2 billion marketplace, but adoption rates are still on the rise. Using network theory, this study examines how the adoption of mobile apps among young consumers is influenced by others in their social network. The results suggest that the likelihood of adoption and usage of mobile apps increases with their use by the consumer\u27s strongest relationship partner. In addition, the authors find marginal support for the hypothesis that the adoption of mobile apps will be more strongly influenced by a consumer\u27s social contacts (friends, compared to family members), possibly due to their closer similarity to the consumer. Managerial and theoretical implications are discussed

    Elevation of two subspecies of Dunnock Prunella modularis to species rank

    Get PDF
    The Western Palearctic endemic Dunnock Prunella modularis was recently revealed to comprise three distinct genetic lineages, each distributed in different Pleistocene refugia. Specifically, one is isolated in the Iberian refugium, another is confined to the Caucasus refugium, and the third is distributed in both the Italian and Balkan refugia, as well as across broader Europe. There is a probable absence of gene flow between the refugia. Analysis of plumage and song characteristics reveals robust differences between the Iberian subspecies P. m. mabbotti, Caucasian P. m. obscura and nominate P. m. modularis. Our assessments, in conjunction with genetic isolation, support species recognition under the Phylogenetic, Biological and Comprehensive Biological Species Concepts, via qualitative and quantitative criteria, and diagnosability. We thus propose the elevation of Iberian Dunnock P. mabbotti and Caucasian Dunnock P. obscura to species level

    Limitations of Scanned Human Copresence Encounters for Modelling Proximity-Borne Malware

    Get PDF

    A Fistful of Bitcoins: Characterizing Payments among Men with No Names

    Get PDF
    Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on a combination of cryptographic protection and a peer-to-peer protocol for witnessing settlements. Consequently, Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters. From this analysis, we consider the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale

    Palaeoclimatic events, dispersal and migratory losses along the Afro-European axis as drivers of biogeographic distribution in Sylvia warblers

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The Old World warbler genus <it>Sylvia </it>has been used extensively as a model system in a variety of ecological, genetic, and morphological studies. The genus is comprised of about 25 species, and 70% of these species have distributions at or near the Mediterranean Sea. This distribution pattern suggests a possible role for the Messinian Salinity Crisis (from 5.96-5.33 Ma) as a driving force in lineage diversification. Other species distributions suggest that Late Miocene to Pliocene Afro-tropical forest dynamics have also been important in the evolution of <it>Sylvia </it>lineages. Using a molecular phylogenetic hypothesis and other methods, we seek to develop a biogeographic hypothesis for <it>Sylvia </it>and to explicitly assess the roles of these climate-driven events.</p> <p>Results</p> <p>We present the first strongly supported molecular phylogeny for <it>Sylvia</it>. With one exception, species fall into one of three strongly supported clades: one small clade of species distributed mainly in Africa and Europe, one large clade of species distributed mainly in Africa and Asia, and another large clade with primarily a circum-Mediterranean distribution. Asia is reconstructed as the ancestral area for <it>Sylvia</it>. Long-distance migration is reconstructed as the ancestral character state for the genus, and sedentary behavior subsequently evolved seven times.</p> <p>Conclusion</p> <p>Molecular clock calibration suggests that <it>Sylvia </it>arose in the early Miocene and diverged into three main clades by 12.6 Ma. Divergence estimates indicate that the Messinian Salinity Crisis had a minor impact on <it>Sylvia</it>. Instead, over-water dispersals, repeated loss of long-distance migration, and palaeo-climatic events in Africa played primary roles in <it>Sylvia </it>divergence and distribution.</p
    • ā€¦
    corecore