38 research outputs found
Financial and Legal Obligations that appear from Internet Traffic - Technology of Information and Communication Kosovo Case
In this case study we have presented the comparison of the calls made by the clients to the telephone operator Y and the calls which have been transferred to the company responsible for the quiz through telephone calls. During this analysis we gathered calls from the Composite Call Data Record (CDR), the CDR partition is divided in two part, the CDR Originating part and the part of the CDR transit part.The part of the CDR Originating are as the showed following: Calling Party Number, Called Party Number, Date Fort Start Of Charge, Time For Start Of Charge, Time For Stop Of Charge and Chargeable Duration. The part of the CDR Transit part contains completely the same data that must be identical because it is the same call that additionally contains other information such as the name of the incoming route from which the call and outbound route or where the call came from is addressed by identifying its name. The data has been decoded by the hexadecimal system in the decade system to compare the numbers of calls, duration calls and time of calls. From the analysis that is done in this case study has come out there is a difference from the number of calls as well the duration of the calls that have been on the part of the customers to the operator Y and the calls directed by the operator Y in the contracting company X
Recommended from our members
Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach
Assessment of software COTS components is an essential part of component-based software development. Poorly chosen components may lead to solutions of low quality and that are difficult to maintain. The assessment may be based on incomplete knowledge about the COTS component itself and other aspects (e.g. vendorâs credentials, etc.), which may affect the decision of selecting COTS component(s). We argue in favor of assessment methods in which uncertainty is explicitly represented (âuncertainty explicitâ methods) using probability distributions. We provide details of a Bayesian model, which can be used to capture the uncertainties in the simultaneous assessment of two attributes, thus, also capturing the dependencies that might exist between them. We also provide empirical data from the use of this method for the assessment of off-the-shelf database servers which illustrate the advantages of âuncertainty explicitâ methods over conventional methods of COTS component assessment which assume that at the end of the assessment the values of the attributes become known with certainty
Facial cellulitis caused by Candida guilliermondi in an immunocompetent patient: a rare case report
Background: Candida cellulitis is a rare disease, primarily reported in immunocompromised patients. Atypical Candida spp. infections are increasing, largely due to the growing number of immunocompromised patients. This case report describes a 52-year-old immunocompetent patient with facial cellulitis caused by Candida guilliermondi. Candida guilliermondi has not previously been reported as a cause of facial cellulitis in either immunocompromised or immunocompetent patients.
Case presentation: A 52-year-old, otherwise healthy, male patient presented with facial cellulitis that did not respond to intravenous antibiotics. Culture of the drained pus revealed Candida guilliermondi. The patient was successfully treated with intravenous fluconazole.
Conclusion: This case highlights the possibility of atypical Candida spp. causing deep facial infections in immunocompetent patients. Candida guilliermondi has not been previously reported as a cause of facial cellulitis in either immunocompromised or immunocompetent patients. Healthcare providers should consider atypical Candida spp. infections in the differential diagnosis of deep facial infections in both immunocompromised and immunocompetent patients
On the Effects of Diversity on Intrusion Tolerance
The security gains of intrusion-tolerant systems are directly dependent on the assumption that system components fail independently of one another. The coverage of this assumption in a real-world deployment depends on how diversity is employed, using, for example, diverse off-the-shelf components. In this paper we detail a study we have done with vulnerability data, reported in the period 1999 to 2007, which we extracted from the NIST National Vulnerability Database. We provide empirical analysis of the data collected as well as exploratory analyses of the potential gains in security from employing diverse operating systems. The modelling approaches presented are of practical significance to system designers wishing to employ diversity with off-the-shelf components since often the vulnerability reports are the only direct security evidence available to the
Software dependability with off-the-shelf components
EThOS - Electronic Theses Online ServiceGBUnited Kingdo
EDCC 2015 - Fast Abstracts & Student Forum Proceedings: The Tenth European Dependable Computing Conference 2015
International audienceFast Abstracts are short presentations of work in progress or opinion pieces and aim to serve as a rapid and flexible mechanism to (i) Report on current work that may or may not be complete; (ii) Introduce new ideas to the community; (iii) State positions on controversial issues or open problems. On the other hand, the goal of the Student Forum is to encourage students to attend EDCC and present their work, exchange ideas with researchers and practitioners, and get early feedback on their research efforts
Social and privacy threats in social networks, challenges and the most critical issues
Online social networks are permeating every aspect of our daily lives. With their incomparable popularity, social networks have evolved from platforms for news distribution and communication and social interaction to essential tools for online content distribution, professional networking, social recommendations, marketing, and more. Due to their heterogeneous nature and complexity, there are many technical and social challenges that need to be addressed. Specifically, security and privacy are among the most critical issues in online social networks. This paper identifies the characteristic features of social networks and the impact they have on their users. The main objective is to contribute to the discussion about privacy and security by identifying potential threats and challenges in this dimension of cyberspace