287 research outputs found
everything is at once: Reflections on embodied photography and collaborative process
In discussion with his co-collaborators, dance artists Natalie Garrett Brown and Amy Voris, this interview explores the photographic process of Christian Kipp, landscape and dance photographer, as he reflects on his experience of working on the Enter & Inhabit project. The questions asked by Garrett Brown and Voris were generated through movement and reflective writing in response to the photographic collection exhibited as part of the 2011 Dance and Somatic Practices Conference, Coventry, UK. In particular, the article explores the interrelationship between the somatic-informed movement practices and performance score creation of Garrett Brown and Voris and the sensorial play of Kipp’s photography. Co-authored by Garrett Brown, Kipp and Voris, this collection of questions and responses seeks to continue rather than merely document the Enter & Inhabit collaborative process
Lost in Translation: Improving Decoy Documents via Automated Translation
Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type of decoy to serve three main purposes. First, using a language that is not used in normal business practice gives real users a clear signal that the document is fake, so they waste less time examining it. Second, an attacker, if enticed, will need to exfiltrate the document's contents in order to translate it, providing a cleaner signal of malicious activity. Third, we consume significant adversarial resources as they must still read the document and decide if it contains valuable information, which is made more difficult as it will be somewhat scrambled through translation. In this paper, we expand upon the rationale behind using foreign language decoys. We present a preliminary evaluation which shows how they significantly increase the cost to attackers in terms of the amount of time that it takes to determine if a document is real and potentially contains valuable information or is entirely bogus, confounding their goal of exfiltrating important sensitive information
Bait and Snitch: Defending Computer Systems with Decoys
Threats against computer networks continue to multiply, but existing security solutions are persistently unable to keep pace with these challenges. In this paper we present a new paradigm for securing computational resources which we call decoy technology. This technique involves seeding a system with data that appears authentic but is in fact spurious. Attacks can then be detected by monitoring this phony information for access events. Decoys are capable of detecting malicious activity, such as insider and masquerade attacks, that are beyond the scope of traditional security measures. They can be used to address confidentiality breaches either proactively or after they have taken place. This work examines the challenges that must be overcome in order to successfully deploy decoys as part of a comprehensive security solution. It discusses situations where decoys are particularly useful as well as characteristics that effective decoy material should share. Furthermore, we describe the tools that we have developed to efficiently craft and distribute decoys in order to form a network of sensors that is capable of detecting adversarial action that occurs anywhere in an organizations system
Recommended from our members
Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment
Organizations face a persistent challenge detecting malicious insiders as well as outside attackers who compromise legitimate credentials and then masquerade as insiders. No matter how good an organization’s perimeter defenses are, eventually they will be compromised or betrayed from the inside. Monitored decoy documents (honey files with enticing names and content) are a promising approach to aid in the detection of malicious masqueraders and insiders. In this paper, we present a new technique for decoy document distribution that can be used to improve the scalability of insider detection. We develop a placement application that automates the deployment of decoy documents and we report on two user studies to evaluate its effectiveness. The first study indicates that our automated decoy distribution tool is capable of strategically placing decoy files in a way that offers comparable security to optimal manual deployment. In the second user study, we measure the frequency that normal users access decoy documents on their own systems and show that decoy files do not significantly interfere with normal user tasks
Recent Developments: The Uniform Arbitration Act
Since 1983, this annual Article 2 has been prepared to provide a survey of recent developments in the case law interpreting and applying the various state versions of the Uniform Arbitration Act3. The purpose is to promote uniformity in the interpretation of the U.A.A. by developing and explaining the underlying principles and rationales courts have applied in recent cases.
Impact of carprofen administration on stress and nociception responses of calves to cautery dehorning
Citation: Stock, M. L., Barth, L. A., Van Engen, N. K., Millman, S. T., Gehring, R., Wang, C., . . . Coetzee, J. F. (2016). Impact of carprofen administration on stress and nociception responses of calves to cautery dehorning. Journal of Animal Science, 94(2), 542-555. doi:10.2527/jas2015-9510The objective of this study was to investigate the effects of carprofen administered immediately before cautery dehorning on nociception and stress. Forty Holstein calves aged approximately 6 to 8 wk old were either placebo treated and sham dehorned (n = 10) or cautery dehorned following administration of carprofen (1.4 mg/kg) subcutaneously (n = 10) or orally (n = 10) or a subcutaneous and oral placebo (n = 10) in a randomized, controlled trial. All animals were given a cornual nerve block using lidocaine before dehorning. Response variables including mechanical nociception threshold, ocular temperature, heart rate, and respiratory rate were measured before and following cautery dehorning for 96 h. Blood samples were also collected over 96 h following dehorning and analyzed for plasma cortisol and substance P concentrations by RIA. Plasma carprofen concentration and ex vivo PGE2 concentrations were also determined for this time period. Average daily gain was calculated for 7 d after dehorning. Data were analyzed using a linear mixed effects model with repeated measures, controlling for baseline values by their inclusion as a covariate in addition to planned contrasts. Dehorning was associated with decreased nociception thresholds throughout the study and a stress response immediately after dehorning, following the loss of local anesthesia, and 48 h after dehorning compared with sham-dehorned calves. Carprofen was well absorbed after administration and reached concentrations that inhibited ex vivo PGE2 concentrations for 72 h (subcutaneous) and 96 h (oral) compared with placebo-treated calves (P < 0.05). Carprofen-treated calves tended to be less sensitive (P = 0.097) to nociceptive threshold tests. Overall, at the dosing regimen studied, the effect of carprofen on sensitivity and stress following cautery dehorning was minimal. Consideration of route of administration and dose determination studies may be warranted
ASTROMOD: a computer program integrating vegetation dynamics modelling, environmental modelling and spatial data visualisation in Microsoft Excel
This paper describes the development of a software framework for predicting vegetation change within
the Astroni crater, a state nature reserve near Naples, Italy. ASTROMOD (ASTROni MODel), is designed to
allow the analysis of environmental and management scenarios in the crater, thus aiding the reserve's manager in effective decision making. ASTROMOD comprises a vegetation dynamics model developed for forest ecosystems, combined with models of environmental determinants. It integrates a user-friendly interface for visualising spatial data, a parameter database and a series of programming modules within Microsoft Excel. This approach is a significant departure from other spatial biophysical modelling approaches which require costly and complex software tools
- …