38 research outputs found

    Financial and Legal Obligations that appear from Internet Traffic - Technology of Information and Communication Kosovo Case

    Get PDF
    In this case study we have presented the comparison of the calls made by the clients to the telephone operator Y and the calls which have been transferred to the company responsible for the quiz through telephone calls. During this analysis we gathered calls from the Composite Call Data Record (CDR), the CDR partition is divided in two part, the CDR Originating part and the part of the CDR transit part.The part of the CDR Originating are as the showed following: Calling Party Number, Called Party Number, Date Fort Start Of Charge, Time For Start Of Charge, Time For Stop Of Charge and Chargeable Duration. The part of the CDR Transit part contains completely the same data that must be identical because it is the same call that additionally contains other information such as the name of the incoming route from which the call and outbound route or where the call came from is addressed by identifying its name. The data has been decoded by the hexadecimal system in the decade system to compare the numbers of calls, duration calls and time of calls. From the analysis that is done in this case study has come out there is a difference from the number of calls as well the duration of the calls that have been on the part of the customers to the operator Y and the calls directed by the operator Y in the contracting company X

    Facial cellulitis caused by Candida guilliermondi in an immunocompetent patient: a rare case report

    Get PDF
    Background: Candida cellulitis is a rare disease, primarily reported in immunocompromised patients. Atypical Candida spp. infections are increasing, largely due to the growing number of immunocompromised patients. This case report describes a 52-year-old immunocompetent patient with facial cellulitis caused by Candida guilliermondi. Candida guilliermondi has not previously been reported as a cause of facial cellulitis in either immunocompromised or immunocompetent patients. Case presentation: A 52-year-old, otherwise healthy, male patient presented with facial cellulitis that did not respond to intravenous antibiotics. Culture of the drained pus revealed Candida guilliermondi. The patient was successfully treated with intravenous fluconazole. Conclusion: This case highlights the possibility of atypical Candida spp. causing deep facial infections in immunocompetent patients. Candida guilliermondi has not been previously reported as a cause of facial cellulitis in either immunocompromised or immunocompetent patients. Healthcare providers should consider atypical Candida spp. infections in the differential diagnosis of deep facial infections in both immunocompromised and immunocompetent patients

    On the Effects of Diversity on Intrusion Tolerance

    Get PDF
    The security gains of intrusion-tolerant systems are directly dependent on the assumption that system components fail independently of one another. The coverage of this assumption in a real-world deployment depends on how diversity is employed, using, for example, diverse off-the-shelf components. In this paper we detail a study we have done with vulnerability data, reported in the period 1999 to 2007, which we extracted from the NIST National Vulnerability Database. We provide empirical analysis of the data collected as well as exploratory analyses of the potential gains in security from employing diverse operating systems. The modelling approaches presented are of practical significance to system designers wishing to employ diversity with off-the-shelf components since often the vulnerability reports are the only direct security evidence available to the

    Software dependability with off-the-shelf components

    No full text
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    An experimental study of diversity with off-the-shelf antiVirus engines

    No full text

    Threat and Risk Assessment Methodologies in the Automotive Domain

    No full text

    EDCC 2015 - Fast Abstracts & Student Forum Proceedings: The Tenth European Dependable Computing Conference 2015

    No full text
    International audienceFast Abstracts are short presentations of work in progress or opinion pieces and aim to serve as a rapid and flexible mechanism to (i) Report on current work that may or may not be complete; (ii) Introduce new ideas to the community; (iii) State positions on controversial issues or open problems. On the other hand, the goal of the Student Forum is to encourage students to attend EDCC and present their work, exchange ideas with researchers and practitioners, and get early feedback on their research efforts

    Social and privacy threats in social networks, challenges and the most critical issues

    No full text
    Online social networks are permeating every aspect of our daily lives. With their incomparable popularity, social networks have evolved from platforms for news distribution and communication and social interaction to essential tools for online content distribution, professional networking, social recommendations, marketing, and more. Due to their heterogeneous nature and complexity, there are many technical and social challenges that need to be addressed. Specifically, security and privacy are among the most critical issues in online social networks. This paper identifies the characteristic features of social networks and the impact they have on their users. The main objective is to contribute to the discussion about privacy and security by identifying potential threats and challenges in this dimension of cyberspace
    corecore