22 research outputs found

    Study of Security Issues in Pervasive Environment of Next Generation Internet of Things

    Full text link
    Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current security solutions fail as new threats appear to de-struct the reliability of information. The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks. Real time analysis of information from the heterogeneous smart objects needs use of cloud services. This can fall prey to cloud specific security threats. Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.Comment: 12 pages, CISIM 201

    Rationale for Stereotactic Body Radiation Therapy in Treating Patients with Oligometastatic Hormone-Naïve Prostate Cancer

    Get PDF
    Despite advances in treatment for metastatic prostate cancer, patients eventually progress to castrate-resistant disease and ultimately succumb to their cancer. Androgen deprivation therapy (ADT) is the standard treatment for metastatic prostate cancer and has been shown to improve median time to progression and median survival time. Research suggests that castrate-resistant clones may be present early in the disease process prior to the initiation of ADT. These clones are not susceptible to ADT and may even flourish when androgen-responsive clones are depleted. Stereotactic body radiation therapy (SBRT) is a safe and efficacious method of treating clinically localized prostate cancer and metastases. In patients with a limited number of metastatic sites, SBRT may have a role in eliminating castrate-resistant clones and possibly delaying progression to castrate-resistant disease

    A Two-stage Flow-based Intrusion Detection Model ForNext-generation Networks

    Get PDF
    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results

    Bio-authentication for layered remote health monitor framework

    No full text
    Aged people, patients with chronic disease, patients at remote location need continuous monitoring under healthcare professionals. Remote health monitor is likely to be an effective approach to provide healthcare service in a simple and cost effective way. However, effective implementation of this type of framework needs consideration of variety of security threats. In this paper, a layer based remote health monitor framework is proposed to analyze health condition of patients from remote places. Beside this, a multi-modal biometric authentication mechanism is proposed here to reduce misuse of health data and biometrics templates in heterogeneous cloud environment. Main focus of the paper is to design semi-continuous authentication mechanism after establishing mutual 1:1 trust relationship among the participants in cloud environment. Behavioral biometrics keystroke analysis is fused with physiological biometrics face recognition to enhance accuracy of authentication. Instead of considering traditional performance evaluation parameters for biometrics, this paper considers a few performance metrics for determining efficiency of semi-continuous verification of the proposed framework

    Synthesis and enzymatic evaluation of ketose phosphonates: the interplay between mutarotation, monofluorination and acidity

    No full text
    Ketose-phosphonates may adopt open chain, or \u3b1- or \u3b2-furanosyl, or \u3b1- or \u3b2-pyranosyl configurational isomers in aqueous solution. An HPLC and NMR analysis of a series of ketose-phosphonates with a thymidylyltransferase (dTDP-glucose pyrophosphorylase) implied a rapid dynamic equilibrium between the pyranosyl forms of gluco-ketose phosphonate leading to efficient production of unique sugar nucleotide analogues. The preparation of diastereomerically pure gluco-configured monofluoromethylenephosphonates enabled the determination of the thymidylyltransferase preference for CHF stereochemistry. The effects of acidity upon thymidylyltransferase substrate specificity were determined using a series of monofluoro- and difluoro- ketose-phosphonates. WaterLOGSY NMR spectroscopy demonstrated a switching of the ordered Bi-Bi mechanism with ketose-phosphonate substrates. Ketose-phosphonates are presented as a unique class of sugar 1-phosphate analogues with potential applications as glycosyltransferase probes.Peer reviewed: YesNRC publication: Ye

    A Privacy-Preserving Model for Biometric Fusion

    No full text
    Biometric designs have attracted attention in practical technological schemes with high requirements in terms of accuracy, security and privacy. Nevertheless, multimodalities have been approached with skepticism, as fusion deployments are affected by performance metrics. In this paper, we introduce a basic fusion model blueprint for a privacy-preserving cloud-based user verification/authentication. We consider the case of three modalities, permanently "located" in different databases of semi-honest providers, being combined according to their strength performance parameters, in a user-specific weighted score level fusion. Secure multiparty computation techniques are utilized for protecting confidentiality and privacy among the parties.status: publishe
    corecore