Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Más filtros

Bases de datos
Tipo del documento
Asunto de la revista
Intervalo de año de publicación
1.
Sensors (Basel) ; 21(18)2021 Sep 16.
Artículo en Inglés | MEDLINE | ID: mdl-34577432

RESUMEN

Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid. The resulting increase in communication creates a larger attack surface for malicious actors. Indeed, cyber attacks on power grids have already succeeded in causing temporary, large-scale blackouts in the recent past. In this paper, we analyze the communication infrastructure of power grids to derive resulting fundamental challenges of power grids with respect to cybersecurity. Based on these challenges, we identify a broad set of resulting attack vectors and attack scenarios that threaten the security of power grids. To address these challenges, we propose to rely on a defense-in-depth strategy, which encompasses measures for (i) device and application security, (ii) network security, and (iii) physical security, as well as (iv) policies, procedures, and awareness. For each of these categories, we distill and discuss a comprehensive set of state-of-the art approaches, as well as identify further opportunities to strengthen cybersecurity in interconnected power grids.

2.
Nature ; 493(7431): 187-90, 2013 Jan 10.
Artículo en Inglés | MEDLINE | ID: mdl-23235823

RESUMEN

A subset of ultraluminous X-ray sources (those with luminosities of less than 10(40) erg s(-1); ref. 1) are thought to be powered by the accretion of gas onto black holes with masses of ∼5-20M cicled dot, probably by means of an accretion disk. The X-ray and radio emission are coupled in such Galactic sources; the radio emission originates in a relativistic jet thought to be launched from the innermost regions near the black hole, with the most powerful emission occurring when the rate of infalling matter approaches a theoretical maximum (the Eddington limit). Only four such maximal sources are known in the Milky Way, and the absorption of soft X-rays in the interstellar medium hinders the determination of the causal sequence of events that leads to the ejection of the jet. Here we report radio and X-ray observations of a bright new X-ray source in the nearby galaxy M 31, whose peak luminosity exceeded 10(39) erg s(-1). The radio luminosity is extremely high and shows variability on a timescale of tens of minutes, arguing that the source is highly compact and powered by accretion close to the Eddington limit onto a black hole of stellar mass. Continued radio and X-ray monitoring of such sources should reveal the causal relationship between the accretion flow and the powerful jet emission.

3.
BMC Med Genomics ; 10(Suppl 2): 44, 2017 07 26.
Artículo en Inglés | MEDLINE | ID: mdl-28786361

RESUMEN

BACKGROUND: Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. METHODS: We propose FHE-BLOOM and PHE-BLOOM, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-BLOOM is fully secure in the semi-honest model while PHE-BLOOM slightly relaxes security guarantees in a trade-off for highly improved performance. RESULTS: We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-BLOOM is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. CONCLUSIONS: Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-BLOOM, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-BLOOM, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.


Asunto(s)
Seguridad Computacional , Genómica/métodos , Servicios Externos , Enfermedad/genética , Pruebas Genéticas , Humanos , Factores de Tiempo , Secuenciación Completa del Genoma
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA