Optimizing Defense Strategies for Complex Multi-State Systems

Author(s):  
Gregory Levitin
Keyword(s):  
2020 ◽  
Author(s):  
Tam ngoc Nguyen

We proposes a new scientific model that enables the ability to collect evidence, and explain the motivations behind people's cyber malicious/ethical behaviors. Existing models mainly focus on detecting already-committed actions and associated response strategies, which is not proactive. That is the reason why little has been done in order to prevent malicious behaviors early, despite the fact that issues like insider threats cost corporations billions of dollars annually, and its time to detection often lasts for more than a year.We address those problems by our main contributions of:+ A better model for ethical/malicious behavioral analysis with a strong focus on understanding people's motivations. + Research results regarding ethical behaviors of more than 200 participants, during the historic Covid-19 pandemic. + Novel attack and defense strategies based on validated model and survey results. + Strategies for continuous model development and integration, utilizing latest technologies such as natural language processing, and machine learning. We employed mixed-mode research approach of: integrating and combining proven behavioral science models, case studying of hackers, survey research, quantitative analysis, and qualitative analysis. For practical deployments, corporations may utilize our model in: improving HR processes and research, prioritizing plans based on the model's informed human behavioral metrics, better analysis in existing or potential cyber insider threat cases, generating more defense tactics in information warfare and so on.


Author(s):  
Bianka Siewert

AbstractThe well-known photosensitizers hypericin, harmane, and emodin are typical pigments of certain mushroom species—is this a coincidence or an indication towards a photoactivated defense mechanism in the phylum Basidiomycota? This perspective article explores this hypothesis by cross-linking the chemistry of fungal pigments with structural requirements from known photosensitizers and insights from photoactivated strategies in the kingdom Plantae. Thereby, light is shed on a yet unexplored playground dealing with ecological questions, photopharmaceutical opportunities, and biotechnological potentials.


Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 769
Author(s):  
Dong Mu ◽  
Xiongping Yue ◽  
Huanyu Ren

A cyber-physical supply network is composed of an undirected cyber supply network and a directed physical supply network. Such interdependence among firms increases efficiency but creates more vulnerabilities. The adverse effects of any failure can be amplified and propagated throughout the network. This paper aimed at investigating the robustness of the cyber-physical supply network against cascading failures. Considering that the cascading failure is triggered by overloading in the cyber supply network and is provoked by underload in the physical supply network, a realistic cascading model for cyber-physical supply networks is proposed. We conducted a numerical simulation under cyber node and physical node failure with varying parameters. The simulation results demonstrated that there are critical thresholds for both firm’s capacities, which can determine whether capacity expansion is helpful; there is also a cascade window for network load distribution, which can determine the cascading failures occurrence and scale. Our work may be beneficial for developing cascade control and defense strategies in cyber-physical supply networks.


BIOspektrum ◽  
2021 ◽  
Vol 27 (4) ◽  
pp. 376-379
Author(s):  
Nora Schmidt ◽  
Mathias Munschauer

AbstractUsing RNA antisense purification and mass spectrometry, we identified more than 100 human proteins that directly and specifically bind SARS-CoV-2 RNA in infected cells. To gain insights into the functions of selected RNA interactors, we applied genetic perturbation and pharmacological inhibition experiments, and mapped the contact sites on the viral RNA. This led to the identification of host dependency factors and defense strategies, which can guide the design of novel therapeutics against SARS-CoV-2.


Author(s):  
Pooja Rathee ◽  
Swagat Tripathy ◽  
Sahil Khatter ◽  
BP Patra ◽  
PN Murthy ◽  
...  

Purpose 505(b) (2) application is one of the advantageous ways of regulatory submission. This submission approach can lead to fast-track approval for wide-ranging products, exclusively for those that exemplify a limited change from formerly approved drug. Safety and efficacy evidence in terms of non-clinical and clinical portion of the Reference Listed Drug (RLD), are trusted upon. Additionally, supplementary data essentially required to establish comparability with the RLD, are presented in the dossier. Methods This retrospective analysis is to understand the FDA's expectations and avoid errors in terms of data support approval for a new product submitted under the 505 (b) (2) route. The current script is an analysis on how to architect 505(b) (2) regulatory strategy by developing a different set of documents/information. Results The ultimate goal of this review is to allow drug developers to easily navigate through various 505 (b) (2) submissions and defense strategies for registration processes available to the new drug manufacturers and to understand an effective, safer filing route by facilitating early market launch with a prospect of lower cost. Conclusion Before considering option 505 (b) (2), general companies should have a good understanding of product’s potential productivity, scalability, patent infringement, expensive clinical studies and/or non-clinical studies to appropriately strategize scientific and commercial opportunities. This leverage will potentially quicken the development program and will definitely lower the clinical and regulatory risk of new product entrants.


Author(s):  
Lailla C. Gandra ◽  
Karina D. Amaral ◽  
Joel C. Couceiro ◽  
Rômulo A. C. Dângelo ◽  
Danival J. De Souza ◽  
...  

2018 ◽  
Vol 31 (3) ◽  
pp. 386-398 ◽  
Author(s):  
Ronaldo José Durigan Dalio ◽  
Heros José Máximo ◽  
Tiago Silva Oliveira ◽  
Thamara de Medeiros Azevedo ◽  
Henrique Leme Felizatti ◽  
...  

Coevolution has shaped the molecular basis of an extensive number of defense mechanisms in plant-pathogen interactions. Phytophthora parasitica, a hemibiothrophic oomycete pathogen and the causal agent of citrus root rot and gummosis, interacts differently with Citrus sunki and Poncirus trifoliata, two commonly favored citrus rootstocks that are recognized as susceptible and resistant, respectively, to P. parasitica. The molecular core of these interactions remains elusive. Here, we provide evidence on the defense strategies employed by both susceptible and resistant citrus rootstocks, in parallel with P. parasitica deployment of effectors. Time course expression analysis (quantitative real-time polymerase chain reaction) of several defense-related genes were evaluated during i) plant disease development, ii) necrosis, and iii) pathogen effector gene expression. In C. sunki, P. parasitica deploys effectors, including elicitins, NPP1 (necrosis-inducing Phytophthora protein 1), CBEL (cellulose-binding elicitor and lectin activity), RxLR, and CRN (crinkler), and, consequently, this susceptible plant activates its main defense signaling pathways that result in the hypersensitive response and necrosis. Despite the strong plant-defense response, it fails to withstand P. parasitica invasion, confirming its hemibiothrophic lifestyle. In Poncirus trifoliata, the effectors were strongly expressed, nevertheless failing to induce any immunity manipulation and disease development, suggesting a nonhost resistance type, in which the plant relies on preformed biochemical and anatomical barriers.


Author(s):  
Ismail Melih Tas ◽  
Onur Ozbirecikli ◽  
Ugur Cagai ◽  
Erhan Taskin ◽  
Huseyin Tas

2011 ◽  
Vol 2011 ◽  
pp. 1-28 ◽  
Author(s):  
Zhongqiang Chen ◽  
Zhanyan Liang ◽  
Yuan Zhang ◽  
Zhongrong Chen

Grayware encyclopedias collect known species to provide information for incident analysis, however, the lack of categorization and generalization capability renders them ineffective in the development of defense strategies against clustered strains. A grayware categorization framework is therefore proposed here to not only classify grayware according to diverse taxonomic features but also facilitate evaluations on grayware risk to cyberspace. Armed with Support Vector Machines, the framework builds learning models based on training data extracted automatically from grayware encyclopedias and visualizes categorization results with Self-Organizing Maps. The features used in learning models are selected with information gain and the high dimensionality of feature space is reduced by word stemming and stopword removal process. The grayware categorizations on diversified features reveal that grayware typically attempts to improve its penetration rate by resorting to multiple installation mechanisms and reduced code footprints. The framework also shows that grayware evades detection by attacking victims' security applications and resists being removed by enhancing its clotting capability with infected hosts. Our analysis further points out that species in categoriesSpywareandAdwarecontinue to dominate the grayware landscape and impose extremely critical threats to the Internet ecosystem.


Sign in / Sign up

Export Citation Format

Share Document