65 research outputs found

    Defending Against Insider Use of Digital Steganography

    Get PDF
    The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse their privilege of access to the Internet to download, install, and use an information hiding tool, such as one of the hundreds of digital steganography applications available on the Internet, to steal sensitive, classified, or proprietary information. Effective countermeasures to this threat must begin with an organizational policy prohibiting installation of information hiding tools on user workstations and must also include automated tools capable of detecting attempts to download and use digital steganography applications. This paper will describe the threat from insider use of digital steganography applications; a new approach to detecting the presence or use of these applications; and extraction of hidden information when a known signature of one of these applications is detected. The analytical approach to steganalysis involves the development and use of computer forensic tools that can detect fingerprints and signatures of digital steganography applications. These tools can be employed in both an off-line forensic-based mode as well as a real-time network surveillance mode. Detection of fingerprints or signatures in either mode may lead to the discovery and extraction of hidden information. Accordingly, this approach represents a significant improvement over traditional blind detection techniques which typically only provide a probability that information may be hidden in a given file without providing a capability to extract any hidden information. Keywords: insider, steganography, steganalysis, computer forensics, artifacts, fingerprints, hash values, signature

    The equation of state for two flavor QCD at N_t=6

    Full text link
    We calculate the two flavor equation of state for QCD on lattices with lattice spacing a=(6T)^{-1} and find that cutoff effects are substantially reduced compared to an earlier study using a=(4T)^{-1}. However, it is likely that significant cutoff effects remain. We fit the lattice data to expected forms of the free energy density for a second order phase transition at zero-quark-mass, which allows us to extrapolate the equation of state to m_q=0 and to extract the speed of sound. We find that the equation of state depends weakly on the quark mass for small quark mass.Comment: 24 pages, latex, 11 postscipt figure

    Accumulation of copy number alterations and clinical progression across advanced prostate cancer.

    Get PDF
    BACKGROUND: Genomic copy number alterations commonly occur in prostate cancer and are one measure of genomic instability. The clinical implication of copy number change in advanced prostate cancer, which defines a wide spectrum of disease from high-risk localised to metastatic, is unknown. METHODS: We performed copy number profiling on 688 tumour regions from 300 patients, who presented with advanced prostate cancer prior to the start of long-term androgen deprivation therapy (ADT), in the control arm of the prospective randomised STAMPEDE trial. Patients were categorised into metastatic states as follows; high-risk non-metastatic with or without local lymph node involvement, or metastatic low/high volume. We followed up patients for a median of 7 years. Univariable and multivariable Cox survival models were fitted to estimate the association between the burden of copy number alteration as a continuous variable and the hazard of death or disease progression. RESULTS: The burden of copy number alterations positively associated with radiologically evident distant metastases at diagnosis (P=0.00006) and showed a non-linear relationship with clinical outcome on univariable and multivariable analysis, characterised by a sharp increase in the relative risk of progression (P=0.003) and death (P=0.045) for each unit increase, stabilising into more modest increases with higher copy number burdens. This association between copy number burden and outcome was similar in each metastatic state. Copy number loss occurred significantly more frequently than gain at the lowest copy number burden quartile (q=4.1 × 10-6). Loss of segments in chromosome 5q21-22 and gains at 8q21-24, respectively including CHD1 and cMYC occurred more frequently in cases with higher copy number alteration (for either region: Kolmogorov-Smirnov distance, 0.5; adjusted P<0.0001). Copy number alterations showed variability across tumour regions in the same prostate. This variance associated with increased risk of distant metastases (Kruskal-Wallis test P=0.037). CONCLUSIONS: Copy number alteration in advanced prostate cancer associates with increased risk of metastases at diagnosis. Accumulation of a limited number of copy number alterations associates with most of the increased risk of disease progression and death. The increased likelihood of involvement of specific segments in high copy number alteration burden cancers may suggest an order underlying the accumulation of copy number changes. TRIAL REGISTRATION: ClinicalTrials.gov NCT00268476 , registered on December 22, 2005. EudraCT  2004-000193-31 , registered on October 4, 2004

    ESPEN Guideline: Clinical Nutrition in inflammatory bowel disease

    Get PDF
    Introduction: The ESPEN guideline presents a multidisciplinary focus on clinical nutrition in inflammatory bowel disease (IBD). Methodology: The guideline is based on extensive systematic review of the literature, but relies on expert opinion when objective data were lacking or inconclusive. The conclusions and 64 recommendations have been subject to full peer review and a Delphi process in which uniformly positive responses (agree or strongly agree) were required. Results: IBD is increasingly common and potential dietary factors in its aetiology are briefly reviewed. Malnutrition is highly prevalent in IBD – especially in Crohn's disease. Increased energy and protein requirements are observed in some patients. The management of malnu-trition in IBD is considered within the general context of support for malnourished patients. Treatment of iron deficiency (parenterally if necessary) is strongly recommended. Routine provision of a special diet in IBD is not however supported. Parenteral nutrition is indicated only when enteral nutrition has failed or is impossible. The recommended perioperative man-agement of patients with IBD undergoing surgery accords with general ESPEN guidance for patients having abdominal surgery. Probiotics may be helpful in UC but not Crohn's disease. Primary therapy using nutrition to treat IBD is not supported in ulcerative colitis, but is mod-erately well supported in Crohn's disease, especially in children where the adverse conse-quences of steroid therapy are proportionally greater. However, exclusion diets are generally not recommended and there is little evidence to support any particular formula feed when nutritional regimens are constructed. Conclusions: Available objective data to guide nutritional support and primary nutritional therapy in IBD are presented as 64 recommendations, of which 9 are very strong recom-mendations (grade A), 22 are strong recommendations (grade B) and 12 are based only on sparse evidence (grade 0); 21 recommendations are good practice points (GPP)

    Global transpiration data from sap flow measurements : the SAPFLUXNET database

    Get PDF
    Plant transpiration links physiological responses of vegetation to water supply and demand with hydrological, energy, and carbon budgets at the land-atmosphere interface. However, despite being the main land evaporative flux at the global scale, transpiration and its response to environmental drivers are currently not well constrained by observations. Here we introduce the first global compilation of whole-plant transpiration data from sap flow measurements (SAPFLUXNET, https://sapfluxnet.creaf.cat/, last access: 8 June 2021). We harmonized and quality-controlled individual datasets supplied by contributors worldwide in a semi-automatic data workflow implemented in the R programming language. Datasets include sub-daily time series of sap flow and hydrometeorological drivers for one or more growing seasons, as well as metadata on the stand characteristics, plant attributes, and technical details of the measurements. SAPFLUXNET contains 202 globally distributed datasets with sap flow time series for 2714 plants, mostly trees, of 174 species. SAPFLUXNET has a broad bioclimatic coverage, with woodland/shrubland and temperate forest biomes especially well represented (80 % of the datasets). The measurements cover a wide variety of stand structural characteristics and plant sizes. The datasets encompass the period between 1995 and 2018, with 50 % of the datasets being at least 3 years long. Accompanying radiation and vapour pressure deficit data are available for most of the datasets, while on-site soil water content is available for 56 % of the datasets. Many datasets contain data for species that make up 90 % or more of the total stand basal area, allowing the estimation of stand transpiration in diverse ecological settings. SAPFLUXNET adds to existing plant trait datasets, ecosystem flux networks, and remote sensing products to help increase our understanding of plant water use, plant responses to drought, and ecohydrological processes. SAPFLUXNET version 0.1.5 is freely available from the Zenodo repository (https://doi.org/10.5281/zenodo.3971689; Poyatos et al., 2020a). The "sapfluxnetr" R package - designed to access, visualize, and process SAPFLUXNET data - is available from CRAN.Peer reviewe

    Global maps of soil temperature

    Get PDF
    Research in global change ecology relies heavily on global climatic grids derived from estimates of air temperature in open areas at around 2 m above the ground. These climatic grids do not reflect conditions below vegetation canopies and near the ground surface, where critical ecosystem functions occur and most terrestrial species reside. Here, we provide global maps of soil temperature and bioclimatic variables at a 1-km2 resolution for 0–5 and 5–15 cm soil depth. These maps were created by calculating the difference (i.e. offset) between in situ soil temperature measurements, based on time series from over 1200 1-km2 pixels (summarized from 8519 unique temperature sensors) across all the world\u27s major terrestrial biomes, and coarse-grained air temperature estimates from ERA5-Land (an atmospheric reanalysis by the European Centre for Medium-Range Weather Forecasts). We show that mean annual soil temperature differs markedly from the corresponding gridded air temperature, by up to 10°C (mean = 3.0 ± 2.1°C), with substantial variation across biomes and seasons. Over the year, soils in cold and/or dry biomes are substantially warmer (+3.6 ± 2.3°C) than gridded air temperature, whereas soils in warm and humid environments are on average slightly cooler (−0.7 ± 2.3°C). The observed substantial and biome-specific offsets emphasize that the projected impacts of climate and climate change on near-surface biodiversity and ecosystem functioning are inaccurately assessed when air rather than soil temperature is used, especially in cold environments. The global soil-related bioclimatic variables provided here are an important step forward for any application in ecology and related disciplines. Nevertheless, we highlight the need to fill remaining geographic gaps by collecting more in situ measurements of microclimate conditions to further enhance the spatiotemporal resolution of global soil temperature products for ecological applications
    corecore