![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessConti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning
Ransomware-as-a-service (RaaS) is increasing the scale and complexity of ransomware attacks. Understanding the internal operations behind RaaS has been a challenge due to the illegality of such activities. The...
-
Chapter and Conference Paper
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning
Due to the proliferation of malware, defenders are increasingly turning to automation and machine learning as part of the malware detection toolchain. However, machine learning models are susceptible to advers...
-
Chapter and Conference Paper
Disrupting Active Directory Attacks with Deep Learning for Organic Honeyuser Placement
Honeypots have been a long-established form of passive defense in a wide variety of systems. They are often used for the reliability and low false positive rate. However, the deployment of honeypots in the Act...
-
Article
On the motivations and challenges of affiliates involved in cybercrime
The cybercrime industry is characterised by work specialisation to the point that it has become a volume industry with various “as-a-service” offerings. One well-established “as-a-service” business model is bl...
-
Chapter and Conference Paper
Large Scale Analysis of DoH Deployment on the Internet
DNS over HTTPS (DoH) is one of the standards to protect the security and privacy of users. The choice of DoH provider has controversial consequences, from monopolisation of surveillance to lost visibility by n...
-
Chapter and Conference Paper
A Better Infected Hosts Detection Combining Ensemble Learning and Threat Intelligence
Ensemble learning techniques have been successfully proposed and used to improve threats detection in cybersecurity. These techniques usually improve the detection results by combining algorithms that togethe...
-
Chapter and Conference Paper
Deep Convolutional Neural Networks for DGA Detection
A Domain Generation Algorithm (DGA) is an algorithm to generate domain names in a deterministic but seemly random way. Malware use DGAs to generate the next domain to access the Command & Control (C&C) communi...
-
Chapter and Conference Paper
Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior
During the last couple of years there has been an important surge on the use of HTTPs by malware. The reason for this increase is not completely understood yet, but it is hypothesized that it was forced by org...
-
Article
Newly isolated Bacillus sp. G51 from Patagonian wool produces an enzyme combination suitable for felt-resist treatments of organic wool
Bacteria from Patagonian Merino wool were isolated to assess their wool-keratinolytic activity and potential for felt-resist treatments. Strains from Bacillus, Exiguobacterium, Deinococcus, and Micrococcus produc...
-
Article
Hypertrophy of the tensor fascia lata muscle as a complication of total hip arthroplasty
Hypertrophy of the tensor fascia lata muscle (HTFLM) is a rare complication after total hip arthroplasty (THA) and is a potential source of pain, palpable mass, or both.
-
Chapter and Conference Paper
An Empirical Study of the Robustness of Energy-Aware Schedulers for High Performance Computing Systems under Uncertainty
This article presents an empirical evaluation of energy-aware schedulers under uncertainties in both the execution time of tasks and the energy consumption of the computing infrastructure. We address an import...
-
Article
Reply to the comment of Fügenschuh et al. on the paper ‘Estimating displacement along the Brenner Fault and orogen-parallel extension in the Eastern Alps’ by Rosenberg and Garcia, Int J Earth Sci (Geol Rundsch) (2011) 100:1129–1145
-
Article
Anxiolytic-like effect of losartan injected into amygdala of the acutely stressed rats
It has been recognized that the stress-related peptides are involved in anxiety states. Angiotensin II receptor blockade by systemic administration of the AT1 receptor antagonists has been proposed as a new treat...
-
Article
Relationship between the degree of osteolysis and cultures obtained by sonication of the prostheses in patients with aseptic loosening of a hip or knee arthroplasty
The pathogenesis of prosthesis loosening is not well understood. The aim of our study was to sonicate components of joint prostheses removed due to aseptic loosening, culture the sonicate fluid, and to correla...
-
Article
Accuracy of CT-guided joint aspiration in patients with suspected infection status post-total hip arthroplasty
To determine the accuracy of guided computed tomography aspiration in the detection of septic hip prosthesis before surgery.
-
Article
Neutrophils in frozen section and type of microorganism isolated at the time of resection arthroplasty for the treatment of infection
The histology of periprosthetic tissue is a gold standard for the diagnosis of periprosthetic joint infection. However, the specificity and sensitivity of histology has never been 100%. In the present study we...
-
Article
Serum C-reactive protein as predictor of infected arthroplasty
The objective of the study is to determine the usefulness of C-reactive protein (CRP) as a predictor of postoperative evolution after total joint arthroplasty (TJA). One hundred and three consecutive patients ...
-
Article
Infected chronic hematoma mimicking soft tissue neoplasm
A rare case of an infected chronic hematoma in a patient with immunodeficiency syndrome mimicking a soft tissue neoplasm is presented. There are few reported cases of hematogenous infection of chronic hematoma...
-
Article
Elbow tuberculosis: an unusual location and diagnostic problem
Tuberculous arthritis of the elbow joint is not commonly seen by orthopaedic physicians. In the past 20 years, with the pandemic of the human immunodeficiency virus and the increase in immunocompromised people...
-
Article
The Procurement Team as a Factor of Bone Allograft Contamination
We studied the effect of the procurement team on the risk of contamination in 270 large bone allografts retrieved from 53 non-living donors under strictly aseptic conditions.