CINXE.COM
Search results for: anti-forensic countermeasure
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: anti-forensic countermeasure</title> <meta name="description" content="Search results for: anti-forensic countermeasure"> <meta name="keywords" content="anti-forensic countermeasure"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="anti-forensic countermeasure" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="anti-forensic countermeasure"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 23</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: anti-forensic countermeasure</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Exploration and Evaluation of the Effect of Multiple Countermeasures on Road Safety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atheer%20Al-Nuaimi">Atheer Al-Nuaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Harry%20Evdorides"> Harry Evdorides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every day many people die or get disabled or injured on roads around the world, which necessitates more specific treatments for transportation safety issues. International road assessment program (iRAP) model is one of the comprehensive road safety models which accounting for many factors that affect road safety in a cost-effective way in low and middle income countries. In iRAP model road safety has been divided into five star ratings from 1 star (the lowest level) to 5 star (the highest level). These star ratings are based on star rating score which is calculated by iRAP methodology depending on road attributes, traffic volumes and operating speeds. The outcome of iRAP methodology are the treatments that can be used to improve road safety and reduce fatalities and serious injuries (FSI) numbers. These countermeasures can be used separately as a single countermeasure or mix as multiple countermeasures for a location. There is general agreement that the adequacy of a countermeasure is liable to consistent losses when it is utilized as a part of mix with different countermeasures. That is, accident diminishment appraisals of individual countermeasures cannot be easily added together. The iRAP model philosophy makes utilization of a multiple countermeasure adjustment factors to predict diminishments in the effectiveness of road safety countermeasures when more than one countermeasure is chosen. A multiple countermeasure correction factors are figured for every 100-meter segment and for every accident type. However, restrictions of this methodology incorporate a presumable over-estimation in the predicted crash reduction. This study aims to adjust this correction factor by developing new models to calculate the effect of using multiple countermeasures on the number of fatalities for a location or an entire road. Regression models have been used to establish relationships between crash frequencies and the factors that affect their rates. Multiple linear regression, negative binomial regression, and Poisson regression techniques were used to develop models that can address the effectiveness of using multiple countermeasures. Analyses are conducted using The R Project for Statistical Computing showed that a model developed by negative binomial regression technique could give more reliable results of the predicted number of fatalities after the implementation of road safety multiple countermeasures than the results from iRAP model. The results also showed that the negative binomial regression approach gives more precise results in comparison with multiple linear and Poisson regression techniques because of the overdispersion and standard error issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20road%20assessment%20program" title="international road assessment program">international road assessment program</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20binomial" title=" negative binomial"> negative binomial</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20multiple%20countermeasures" title=" road multiple countermeasures"> road multiple countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title=" road safety"> road safety</a> </p> <a href="https://publications.waset.org/abstracts/63990/exploration-and-evaluation-of-the-effect-of-multiple-countermeasures-on-road-safety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63990.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norshima%20Humaidi">Norshima Humaidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Saif%20Hussein%20Abdallah%20Alghazo"> Saif Hussein Abdallah Alghazo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20behaviour" title=" protection behaviour"> protection behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20competencies" title=" information security competencies"> information security competencies</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasure%20awareness" title=" countermeasure awareness"> countermeasure awareness</a> </p> <a href="https://publications.waset.org/abstracts/157751/enhancing-cybersecurity-protective-behaviour-role-of-information-security-competencies-and-procedural-information-security-countermeasure-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ariq%20Bani%20Hardi">Ariq Bani Hardi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-forensic%20countermeasure" title="anti-forensic countermeasure">anti-forensic countermeasure</a>, <a href="https://publications.waset.org/abstracts/search?q=SMS%20encryption%20android" title=" SMS encryption android"> SMS encryption android</a>, <a href="https://publications.waset.org/abstracts/search?q=examination%20and%20analysis" title=" examination and analysis"> examination and analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title=" digital forensic"> digital forensic</a> </p> <a href="https://publications.waset.org/abstracts/95008/anti-forensic-countermeasure-an-examination-and-analysis-extended-procedure-for-information-hiding-of-android-sms-encryption-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95008.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xulu%20Yao">Xulu Yao</a>, <a href="https://publications.waset.org/abstracts/search?q=Moi%20Hoon%20Yap"> Moi Hoon Yap</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanlong%20Zhang"> Yanlong Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GUI" title="GUI">GUI</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=GAN" title=" GAN"> GAN</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20augmentation" title=" data augmentation"> data augmentation</a> </p> <a href="https://publications.waset.org/abstracts/143650/data-augmentation-for-automatic-graphical-user-interface-generation-based-on-generative-adversarial-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Mercury Contamination of Wetland Caused by Wastewater from Chlor-Alkali Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mitsuo%20Yoshida">Mitsuo Yoshida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A significant mercury contamination of soil/sediment was unveiled by an environmental monitoring program in a wetland along La Plata River, west to Montevideo City, Uruguay. The mercury contamination was caused by industrial wastewater discharged from a chlor-alkali plant using a mercury-cell process. The contamination level is above 60 mg/kg in soil/sediment. Most of mercury (Hg) in the environment is inorganic, but some fractions are converted by bacteria to methylmercury (MeHg), a toxic organic compound. MeHg biologically accumulates through a food-chain and become serious public health risk. In order to clarify the contaminated part for countermeasure operation, an intervention value of mercury contamination of sediment/soil was defined as 15 mg/kg (total Hg) by the authority. According to the intervention value, mercury contaminated area in the La Plata site is approximately 48,280 m² and estimated total volume of contaminated sediments/soils was around 18,750 m³. The countermeasures to contaminated zone were proposed in two stages; (i) mitigation of risks for public health and (ii) site remediation. The first stage is an installation of fens and net around the contamination zone, for mitigating risks of exposure, inhalation, and intake. The food chain among wetland-river ecosystem was also interrupted by the installation of net and fens. The state of mercury contamination in La Plata site and plan of countermeasure was disclosed to local people and the public, and consensus on setting off-limit area was successfully achieved. Mass media also contribute to share the information on the contamination site. The cost for countermeasures was borne by the industry under the polluter-pay-principle. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chlor-alkali%20plant" title="chlor-alkali plant">chlor-alkali plant</a>, <a href="https://publications.waset.org/abstracts/search?q=mercury%20contamination" title=" mercury contamination"> mercury contamination</a>, <a href="https://publications.waset.org/abstracts/search?q=polluter%20pay%20principle" title=" polluter pay principle"> polluter pay principle</a>, <a href="https://publications.waset.org/abstracts/search?q=Uruguay" title=" Uruguay"> Uruguay</a>, <a href="https://publications.waset.org/abstracts/search?q=wetland" title=" wetland"> wetland</a> </p> <a href="https://publications.waset.org/abstracts/102082/mercury-contamination-of-wetland-caused-by-wastewater-from-chlor-alkali-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Phone Number Spoofing Attack in VoLTE 4G</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joo-Hyung%20Oh">Joo-Hyung Oh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=VoLTE" title=" VoLTE"> VoLTE</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20number%20spoofing" title=" phone number spoofing"> phone number spoofing</a> </p> <a href="https://publications.waset.org/abstracts/22199/phone-number-spoofing-attack-in-volte-4g" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22199.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">432</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Phone Number Spoofing Attack in VoLTE</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joo-Hyung%20Oh">Joo-Hyung Oh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sekwon%20Kim"> Sekwon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Myoungsun%20Noh"> Myoungsun Noh</a>, <a href="https://publications.waset.org/abstracts/search?q=Chaetae%20Im"> Chaetae Im</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=VoLTE" title=" VoLTE"> VoLTE</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20number%20spoofing" title=" phone number spoofing"> phone number spoofing</a> </p> <a href="https://publications.waset.org/abstracts/21718/phone-number-spoofing-attack-in-volte" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">522</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yinan%20Cao">Yinan Cao</a>, <a href="https://publications.waset.org/abstracts/search?q=Francine%20Herrmann"> Francine Herrmann</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automation" title="automation">automation</a>, <a href="https://publications.waset.org/abstracts/search?q=adversary%20emulation" title=" adversary emulation"> adversary emulation</a>, <a href="https://publications.waset.org/abstracts/search?q=CALDERA" title=" CALDERA"> CALDERA</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title=" countermeasures"> countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=MITRE%20ATT%26CK" title=" MITRE ATT&CK"> MITRE ATT&CK</a> </p> <a href="https://publications.waset.org/abstracts/130552/adversary-emulation-implementation-of-automated-countermeasure-in-caldera-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130552.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> A Survey on Countermeasures of Cache-Timing Attack on AES Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Settana%20M.%20Abdulh">Settana M. Abdulh</a>, <a href="https://publications.waset.org/abstracts/search?q=Naila%20A.%20Sadalla"> Naila A. Sadalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaseen%20H.%20Taha"> Yaseen H. Taha</a>, <a href="https://publications.waset.org/abstracts/search?q=Howaida%20Elshoush"> Howaida Elshoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES%20algorithm" title="AES algorithm">AES algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack" title=" side channel attack"> side channel attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20attack" title=" cache timing attack"> cache timing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20countermeasure" title=" cache timing countermeasure"> cache timing countermeasure</a> </p> <a href="https://publications.waset.org/abstracts/17652/a-survey-on-countermeasures-of-cache-timing-attack-on-aes-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> A Blockchain-Based Protection Strategy against Social Network Phishing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francesco%20Buccafurri">Francesco Buccafurri</a>, <a href="https://publications.waset.org/abstracts/search?q=Celeste%20Romolo"> Celeste Romolo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20sharing" title=" information sharing"> information sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a> </p> <a href="https://publications.waset.org/abstracts/90849/a-blockchain-based-protection-strategy-against-social-network-phishing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Shear Reinforcement of Stone Columns During Soil Liquefaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zeineb%20Ben%20Salem">Zeineb Ben Salem</a>, <a href="https://publications.waset.org/abstracts/search?q=Wissem%20Frikha"> Wissem Frikha</a>, <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Bouassida"> Mounir Bouassida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this paper is to assess the effectiveness of stone columns as a liquefaction countermeasure focusing on shear reinforcementbenefit. In fact, stone columns which have high shear modulus relative to the surrounding soils potentially can carry higher shear stress levels. Thus, stone columns provide shear reinforcement and decrease the Cyclic Shear Stress Ratio CSR to which the treated soils would be subjected during an earthquake. In order to quantify the level of shear stress reduction in reinforced soil, several approaches have been developed. Nevertheless, the available approaches do not take into account the improvement of the soil parameters, mainly the shear modulusdue to stone columns installation. Indeed, in situ control tests carried out before and after the installation of stone columns based upon the results of collected data derived from 24 case histories have given evidence of the improvement of the existing soil properties.In this paper, the assessment of shear reinforcement of stone columns that accounts such improvement of the soil parameters due to stone column installation is investigated. Comparative results indicate that considering the improvement effects considerably affect the assessment of shear reinforcement for liquefaction analysis of reinforced soil by stone columns. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=stone%20column" title="stone column">stone column</a>, <a href="https://publications.waset.org/abstracts/search?q=liquefaction" title=" liquefaction"> liquefaction</a>, <a href="https://publications.waset.org/abstracts/search?q=shear%20reinforcement" title=" shear reinforcement"> shear reinforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=CSR" title=" CSR"> CSR</a>, <a href="https://publications.waset.org/abstracts/search?q=soil%20improvement" title=" soil improvement"> soil improvement</a> </p> <a href="https://publications.waset.org/abstracts/146200/shear-reinforcement-of-stone-columns-during-soil-liquefaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146200.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Calibrating Risk Factors for Road Safety in Low Income Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atheer%20Al-Nuaimi">Atheer Al-Nuaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Harry%20Evdorides"> Harry Evdorides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Daily, many individuals die or get harmed on streets around the globe, which requires more particular solutions for transport safety issues. International road assessment program (iRAP) is one of the models that are considering many variables which influence road user’s safety. In iRAP, roads have been partitioned into five-star ratings from 1 star (the most reduced level) to 5 star (the most noteworthy level). These levels are calculated from risk factors which represent the effect of the geometric and traffic conditions on rod safety. The result of iRAP philosophy are the countermeasures that can be utilized to enhance safety levels and lessen fatalities numbers. These countermeasures can be utilized independently as a single treatment or in combination with other countermeasures for a section or an entire road. There is a general understanding that the efficiency of a countermeasure is liable to reduction when it is used in combination with various countermeasures. That is, crash diminishment estimations of single countermeasures cannot be summed easily. In the iRAP model, the fatalities estimations are calculated using a specific methodology. However, this methodology suffers overestimations. Therefore, this study has developed a calibration method to estimate fatalities numbers more accurately. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crash%20risk%20factors" title="crash risk factors">crash risk factors</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20road%20assessment%20program" title=" international road assessment program"> international road assessment program</a>, <a href="https://publications.waset.org/abstracts/search?q=low-income%20countries" title=" low-income countries"> low-income countries</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title=" road safety"> road safety</a> </p> <a href="https://publications.waset.org/abstracts/106648/calibrating-risk-factors-for-road-safety-in-low-income-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> The Evaluation of Costs and Greenhouse Gas Reduction by Using Technologies for Energy from Sewage Sludge</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Futoshi%20Kakuta">Futoshi Kakuta</a>, <a href="https://publications.waset.org/abstracts/search?q=Takashi%20Ishida"> Takashi Ishida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sewage sludge is a biomass resource that can create a solid fuel and electricity. Utilizing sewage sludge as a renewable energy can contribute to the reduction of greenhouse gasses. In Japan, 'The National Plan for the Promotion of Biomass Utilization' and 'The Priority Plan for Social Infrastructure Development' were approved at cabinet meetings in December 2010 and August 2012, respectively, to promote the energy utilization of sewage sludge. This study investigated costs and greenhouse gas emission in different sewage sludge treatments with technologies for energy from sewage sludge. Costs were estimated on capital costs and O&M costs including energy consumption of solid fuel plants and biogas power generation plants for sewage sludge. Results showed that cost of sludge digestion treatment with solid fuel technologies was 8% lower than landfill disposal. Greenhouse gas emission of sludge digestion treatment with solid fuel technologies was also 6,390t as CO2 smaller than landfill disposal. Biogas power generation reduced the electricity of a wastewater treatment plant by 30% and the cost by 5%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=global%20warming%20countermeasure" title="global warming countermeasure">global warming countermeasure</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20technology" title=" energy technology"> energy technology</a>, <a href="https://publications.waset.org/abstracts/search?q=solid%20fuel%20production" title=" solid fuel production"> solid fuel production</a>, <a href="https://publications.waset.org/abstracts/search?q=biogas" title=" biogas"> biogas</a> </p> <a href="https://publications.waset.org/abstracts/34070/the-evaluation-of-costs-and-greenhouse-gas-reduction-by-using-technologies-for-energy-from-sewage-sludge" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34070.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">386</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> FEM Based Numerical Simulation and Analysis of a Landslide Triggered by the Fluctuations of Ground-Water Levels</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Deepak%20Raj%20Bhat">Deepak Raj Bhat</a>, <a href="https://publications.waset.org/abstracts/search?q=Akihiko%20Wakai"> Akihiko Wakai</a>, <a href="https://publications.waset.org/abstracts/search?q=Shigeru%20Ogita"> Shigeru Ogita</a>, <a href="https://publications.waset.org/abstracts/search?q=Yorihiro%20Tanaka"> Yorihiro Tanaka</a>, <a href="https://publications.waset.org/abstracts/search?q=Kazushige%20Hayashi"> Kazushige Hayashi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shinro%20Abe"> Shinro Abe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, the newly developed finite element methods are used for numerical analysis ofa landslide triggered by the fluctuations of ground-water levels in different cases I-IV. In case I, the ground-water level is fixed in such a way that the overall factor of safety (Fs) would be greater or equal to 1 (i.e., stable condition). Then, the ground-water level is gradually increased up to 1.0 m for, making the overall factor of safety (Fs) less than one (i.e., stable or moving condition). Then, the newly developed finite element model is applied for numerical simulation of the slope for each case. Based on the numerical analysis results of each Cases I-IV, the details of the deformation pattern and shear strain pattern are compared to each other. Moreover, the change in mobilized shear strength and local factor of safety along the slip surface of the landslide for each case are discussed to understand the triggering behaviors of a landslide due to the increased in ground water level. It is expected that this study will help to better understand the role of groundwater fluctuation for triggering of a landslide or slope failure disasters, and it would be also helpful for the judgment of the countermeasure works for the prevention and mitigation of landslide and slope failure disasters in near future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20method" title="finite element method">finite element method</a>, <a href="https://publications.waset.org/abstracts/search?q=ground%20water%20fluctuations" title=" ground water fluctuations"> ground water fluctuations</a>, <a href="https://publications.waset.org/abstracts/search?q=constitutive%20model" title=" constitutive model"> constitutive model</a>, <a href="https://publications.waset.org/abstracts/search?q=landslides" title=" landslides"> landslides</a>, <a href="https://publications.waset.org/abstracts/search?q=long-term%20disaster%20management%20system" title=" long-term disaster management system"> long-term disaster management system</a> </p> <a href="https://publications.waset.org/abstracts/154661/fem-based-numerical-simulation-and-analysis-of-a-landslide-triggered-by-the-fluctuations-of-ground-water-levels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154661.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Estimation of World Steel Production by Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reina%20Kawase">Reina Kawase</a> </p> <p class="card-text"><strong>Abstract:</strong></p> World GHG emissions should be reduced 50% by 2050 compared with 1990 level. CO2 emission reduction from steel sector, an energy-intensive sector, is essential. To estimate CO2 emission from steel sector in the world, estimation of steel production is required. The world steel production by process is estimated during the period of 2005-2050. The world is divided into aggregated 35 regions. For a steel making process, two kinds of processes are considered; basic oxygen furnace (BOF) and electric arc furnace (EAF). Steel production by process in each region is decided based on a current production capacity, supply-demand balance of steel and scrap, technology innovation of steel making, steel consumption projection, and goods trade. World steel production under moderate countermeasure scenario in 2050 increases by 1.3 times compared with that in 2012. When domestic scrap recycling is promoted, steel production in developed regions increases about 1.5 times. The share in developed regions changes from 34 %(2012) to about 40%(2050). This is because developed regions are main suppliers of scrap. 48-57% of world steel production is produced by EAF. Under the scenario which thinks much of supply-demand balance of steel, steel production in developing regions increases is 1.4 times and is larger than that in developed regions. The share in developing regions, however, is not so different from current level. The increase in steel production by EAF is the largest under the scenario in which supply-demand balance of steel is an important factor. The share reaches 65%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=global%20steel%20production" title="global steel production">global steel production</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20distribution%20scenario" title=" production distribution scenario"> production distribution scenario</a>, <a href="https://publications.waset.org/abstracts/search?q=steel%20making%20process" title=" steel making process"> steel making process</a>, <a href="https://publications.waset.org/abstracts/search?q=supply-demand%20balance" title=" supply-demand balance"> supply-demand balance</a> </p> <a href="https://publications.waset.org/abstracts/42610/estimation-of-world-steel-production-by-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42610.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Feasibility of Iron Scrap Recycling with Considering Demand-Supply Balance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reina%20Kawase">Reina Kawase</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuzuru%20Matsuoka"> Yuzuru Matsuoka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To mitigate climate change, to reduce CO2 emission from steel sector, energy intensive sector, is essential. One of the effective countermeasure is recycling of iron scrap and shifting to electric arc furnace. This research analyzes the feasibility of iron scrap recycling with considering demand-supply balance and quantifies the effective by CO2 emission reduction. Generally, the quality of steel made from iron scrap is lower than the quality of steel made from basic oxygen furnace. So, the constraint of demand side is goods-wise steel demand and that of supply side is generation of iron scap. Material Stock and Flow Model (MSFM_demand) was developed to estimate goods-wise steel demand and generation of iron scrap and was applied to 35 regions which aggregated countries in the world for 2005-2050. The crude steel production was estimated under two case; BaU case (No countermeasures) and CM case (With countermeasures). For all the estimation periods, crude steel production is greater than generation of iron scrap. This makes it impossible to substitute electric arc furnaces for all the basic oxygen furnaces. Even though 100% recycling rate of iron scrap, under BaU case, CO2 emission in 2050 increases by 12% compared to that in 2005. With same condition, 32% of CO2 emission reduction is achieved in CM case. With a constraint from demand side, the reduction potential is 6% (CM case). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=iron%20scrap%20recycling" title="iron scrap recycling">iron scrap recycling</a>, <a href="https://publications.waset.org/abstracts/search?q=CO2%20emission%20reduction" title=" CO2 emission reduction"> CO2 emission reduction</a>, <a href="https://publications.waset.org/abstracts/search?q=steel%20demand" title=" steel demand"> steel demand</a>, <a href="https://publications.waset.org/abstracts/search?q=MSFM%20demand" title=" MSFM demand"> MSFM demand</a> </p> <a href="https://publications.waset.org/abstracts/21060/feasibility-of-iron-scrap-recycling-with-considering-demand-supply-balance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">552</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oludare%20Isaac%20Abiodun">Oludare Isaac Abiodun</a>, <a href="https://publications.waset.org/abstracts/search?q=Esther%20Omolara%20Abiodun"> Esther Omolara Abiodun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberterrorism" title="cyberterrorism">cyberterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20security" title=" computer security"> computer security</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=threat" title=" threat"> threat</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic%20solution" title=" digital forensic solution"> digital forensic solution</a> </p> <a href="https://publications.waset.org/abstracts/159714/emerging-cyber-threats-and-cognitive-vulnerabilities-cyberterrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159714.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Total and Leachable Concentration of Trace Elements in Soil towards Human Health Risk, Related with Coal Mine in Jorong, South Kalimantan, Indonesia </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arie%20Pujiwati">Arie Pujiwati</a>, <a href="https://publications.waset.org/abstracts/search?q=Kengo%20Nakamura"> Kengo Nakamura</a>, <a href="https://publications.waset.org/abstracts/search?q=Noriaki%20Watanabe"> Noriaki Watanabe</a>, <a href="https://publications.waset.org/abstracts/search?q=Takeshi%20Komai"> Takeshi Komai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Coal mining is well known to cause considerable environmental impacts, including trace element contamination of soil. This study aimed to assess the trace element (As, Cd, Co, Cu, Ni, Pb, Sb, and Zn) contamination of soil in the vicinity of coal mining activities, using the case study of Asam-asam River basin, South Kalimantan, Indonesia, and to assess the human health risk, incorporating total and bioavailable (water-leachable and acid-leachable) concentrations. The results show the enrichment of As and Co in soil, surpassing the background soil value. Contamination was evaluated based on the index of geo-accumulation, <em>I<sub>geo</sub></em> and the pollution index, <em>PI</em>. <em>I<sub>geo</sub></em> values showed that the soil was generally uncontaminated (<em>I<sub>geo</sub></em> ≤ 0), except for elevated As and Co. Mean <em>PI</em> for Ni and Cu indicated slight contamination. Regarding the assessment of health risks, the Hazard Index, <em>HI</em> showed adverse risks (<em>HI</em> > 1) for Ni, Co, and As. Further, Ni and As were found to pose unacceptable carcinogenic risk (<em>risk</em> > 1.10<sup>-5</sup>). Farming, settlement, and plantation were found to present greater risk than coal mines. These results show that coal mining activity in the study area contaminates the soils by particular elements and may pose potential human health risk in its surrounding area. This study is important for setting appropriate countermeasure actions and improving basic coal mining management in Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coal%20mine" title="coal mine">coal mine</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=trace%20elements" title=" trace elements"> trace elements</a>, <a href="https://publications.waset.org/abstracts/search?q=soil" title=" soil"> soil</a> </p> <a href="https://publications.waset.org/abstracts/72852/total-and-leachable-concentration-of-trace-elements-in-soil-towards-human-health-risk-related-with-coal-mine-in-jorong-south-kalimantan-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72852.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Study of Expatriation as Countermeasure to Citizenship-Based Taxation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriele%20Palumbo">Gabriele Palumbo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research empirically examines some of the reasons behind the fact that recently the number of people giving up their American citizenship for tax purposes has recently increased drastically. The United States Jurisdiction represents a unicum in the practice of taxing worldwide income not only to residents of the United States but also to U.S. citizens living abroad. The worldwide income taxation also affects people defined as “Accidental Americans” who are unaware that they are U.S. citizens. Those people are considered Americans even though they have not been to the United States. American residents abroad can rely on United States income tax treaties and some national law provisions, such as the exclusion of foreign income and foreign tax credits, which are designed specifically to avoid double taxation. However, this mechanism may prove unsatisfactory for people who have not been linked anymore or individuals who have never had relations with the United States. U.S. citizens who are determined to cut all of the ties between themselves and the United States, especially those that involve tax implications, can renounce their U.S. citizenship with the expatriation procedure. The expatriation process represents the extrema ratio and implicates several steps which must be followed carefully. This paper shows the complexity of the procedure that a U.S. citizen who is resident in a foreign country would have to follow to relinquish U.S. citizenship for tax purposes. The mechanism is intended to discourage people from renounce. Going beyond the question of whether U.S. tax regulation is fair or not, this principle nowadays characterizes a popular topic that many scholars and lawyers are discussing. The outcome provides interesting implications that could induce the Congress to rethink the definition of citizenship for both fiscal and nationality law purposes. Indeed, even if a sort of checks and balances has the task of mitigating the renunciation of U.S. citizenship, more and more U.S. citizens desire to get rid of their citizenship. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=double%20taxation" title="double taxation">double taxation</a>, <a href="https://publications.waset.org/abstracts/search?q=expatriation%20tax" title=" expatriation tax"> expatriation tax</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20taxation" title=" international taxation"> international taxation</a>, <a href="https://publications.waset.org/abstracts/search?q=relinquishment%20of%20United%20States%20citizenship" title=" relinquishment of United States citizenship"> relinquishment of United States citizenship</a> </p> <a href="https://publications.waset.org/abstracts/162665/study-of-expatriation-as-countermeasure-to-citizenship-based-taxation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Cultural Works Interacting with the Generational Aesthetic Gap between Gen X and Gen Z in China: A Qualitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qianyu%20Zhang">Qianyu Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The spread of digital technology in China has worsened the generation gap and intergenerational competition for cultural and aesthetic discourse. Meanwhile, the increased accessibility of cultural works has encouraged the sharing and inheritance of collective cultural memories between generations. However, not each cultural work can engage positively with efforts to bridge intergenerational aesthetic differences. This study argues that in contemporary China, where new media and the Internet are widely available, featured cultural works have more potential to help enhance the cultural aesthetic consensus among different generations, thus becoming an effective countermeasure to narrow the intergenerational aesthetic rift and cultural discontinuity. Specifically, the generational aesthetic gap is expected to be bridged or improved through the shared appreciation or consumption of cultural works that meet certain conditions by several generations. In-depth interviews of Gen X and Gen Z (N=15, respectively) in China uncovered their preferences and commonalities for cultural works and shared experiences in appreciating them. Results demonstrate that both generations’ shared appreciation of cultural work is a necessary but insufficient condition for its effective response to the generational aesthetic gap. Coding analysis rendered six dimensions that cultural works with the potential to bridge the intergenerational aesthetic divide should satisfy simultaneously: genre, theme, content, elements, quality, and accessibility. Cultural works that engage multiple senses/ compound realistic, domestic and contemporary cultural memories/ contain the narrative of family life and nationalism/ include more elements familiar to the previous generation/ are superb-produced and unaffected/ are more accessible better promote intergenerational aesthetic exchange and value recognition. Moreover, compared to the dilemma of the previous generation facing the aesthetic gap, the later generation plays a crucial role in bridging the generational aesthetic divide. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultural%20works" title="cultural works">cultural works</a>, <a href="https://publications.waset.org/abstracts/search?q=generation%20gap" title=" generation gap"> generation gap</a>, <a href="https://publications.waset.org/abstracts/search?q=generation%20X" title=" generation X"> generation X</a>, <a href="https://publications.waset.org/abstracts/search?q=generation%20Z" title=" generation Z"> generation Z</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20memory" title=" cultural memory"> cultural memory</a> </p> <a href="https://publications.waset.org/abstracts/160756/cultural-works-interacting-with-the-generational-aesthetic-gap-between-gen-x-and-gen-z-in-china-a-qualitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160756.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Determination of Geogrid Reinforced Ballast Behavior Using Finite Element Modeling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bu%C4%9Fra%20Sinmez">Buğra Sinmez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In some countries, such as China, Turkey, andseveralEuropeanUnionnations, the therailwaypavementstructuralsystem has recently undergonerapid growth as a vital element of the transportation infrastructure, particularlyfortheuse of high-speed trains. It is vitaltoconsiderthe High-SpeedInfrastructureDemandwhendevelopingandconstructingtherailwaypavementstructure. HSRL can create more substantial ldifficultiestotheballastorbaselayer of regularlyusedballastedrailwaypavementsthanstandardrailwaytrains. The deterioration of the theballastorbaselayermayleadtosubstructuredegradation, which might lead to safety concerns and catastrophicincidents. As a result, the efficiency of railways will be impactedbylargecargoesorhigh-speed trains. A railwaypavement construction can be strengthened using geosyntheticmaterials in theballastorfoundationlayer as a countermeasure. However, there is still a need in the literature to quantifytheinfluence of geosynthetic materials, particularlygeogrid, on the mechanical responses of railwaypavementstructuresto HSRL loads which is essential knowledge in supporting the selection of appropriate material and geogridinstallationposition. As a result, the purpose of this research is to see how a geogridreinforcementlayermayaffectthekeyfeatures of a ballastedrailwaypavementstructure, with a particular focus on the materialtypeandgeogridplacementpositionthatmayassistreducethe rate of degradation of the therailwaypavementstructuresystem. Thisstudyusesnumericalmodeling in a genuinerailwaycontexttovalidatethebenefit of geogrid reinforcement. The usage of geogrids in the railway system has been thoroughly researched in the technical literature. Three distinct types of geogrid installed at two distinct positions (i.e.,withintheballastlayer, betweentheballastandthesub-ballast layer) within a railwaypavementconstructionwereevaluatedunder a variety of verticalwheelloadsusing a three-dimensional (3D) finite element model. As a result, fouralternativegeogridreinforcementsystemsweremodeledtoreflectdifferentconditions in the ballastedrailwaysystems (G0: no reinforcement; G1: reinforcedwithgeogridhavingthelowestdensityandYoung'smodulus; G2: reinforcedwithgeogridhavingtheintermediateYoung'smodulusanddensity; G3: reinforcedwithgeogridhavingthegreatestdensityandYoung'smodulus). Themechanicalreactions of the railway, such as verticalsurfacedeflection, maximumprimarystressandstrain, andmaximumshearstress, werestudiedandcomparedbetweenthefourgeogridreinforcementscenariosandfourverticalwheelloadlevels (i.e., 75, 100, 150, and 200 kN). Differences in the mechanical reactions of railwaypavementconstructionsowingtotheuse of differentgeogridmaterialsdemonstratethebenefits of suchgeosynthetics in ballast. In comparison to a non-reinforcedrailwaypavementconstruction, thereinforcedconstructionsfeaturedecreasedverticalsurfacedeflection, maximum shear stress at the sleeper-ballast contact, and maximum main stress at the bottom of the ballast layer. As a result, addinggeogridtotheballastlayerandbetweentheballastandsub-ballast layer in a ballastedrailwaypavementconstruction has beenfoundtolowercriticalshearand main stresses as well as verticalsurfacedeflection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=geosynthetics" title="geosynthetics">geosynthetics</a>, <a href="https://publications.waset.org/abstracts/search?q=geogrid" title=" geogrid"> geogrid</a>, <a href="https://publications.waset.org/abstracts/search?q=railway" title=" railway"> railway</a>, <a href="https://publications.waset.org/abstracts/search?q=transportation" title=" transportation"> transportation</a> </p> <a href="https://publications.waset.org/abstracts/142242/determination-of-geogrid-reinforced-ballast-behavior-using-finite-element-modeling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> Experimental and Numerical Investigations on the Vulnerability of Flying Structures to High-Energy Laser Irradiations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vadim%20Allheily">Vadim Allheily</a>, <a href="https://publications.waset.org/abstracts/search?q=Rudiger%20Schmitt"> Rudiger Schmitt</a>, <a href="https://publications.waset.org/abstracts/search?q=Lionel%20Merlat"> Lionel Merlat</a>, <a href="https://publications.waset.org/abstracts/search?q=Gildas%20L%27Hostis"> Gildas L'Hostis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Inflight devices are nowadays major actors in both military and civilian landscapes. Among others, missiles, mortars, rockets or even drones this last decade are increasingly sophisticated, and it is today of prior manner to develop always more efficient defensive systems from all these potential threats. In this frame, recent High Energy Laser weapon prototypes (HEL) have demonstrated some extremely good operational abilities to shot down within seconds flying targets several kilometers off. Whereas test outcomes are promising from both experimental and cost-related perspectives, the deterioration process still needs to be explored to be able to closely predict the effects of a high-energy laser irradiation on typical structures, heading finally to an effective design of laser sources and protective countermeasures. Laser matter interaction researches have a long history of more than 40 years at the French-German Research Institute (ISL). Those studies were tied with laser sources development in the mid-60s, mainly for specific metrology of fast phenomena. Nowadays, laser matter interaction can be viewed as the terminal ballistics of conventional weapons, with the unique capability of laser beams to carry energy at light velocity over large ranges. In the last years, a strong focus was made at ISL on the interaction process of laser radiation with metal targets such as artillery shells. Due to the absorbed laser radiation and the resulting heating process, an encased explosive charge can be initiated resulting in deflagration or even detonation of the projectile in flight. Drones and Unmanned Air Vehicles (UAVs) are of outmost interests in modern warfare. Those aerial systems are usually made up of polymer-based composite materials, whose complexity involves new scientific challenges. Aside this main laser-matter interaction activity, a lot of experimental and numerical knowledge has been gathered at ISL within domains like spectrometry, thermodynamics or mechanics. Techniques and devices were developed to study separately each aspect concerned by this topic; optical characterization, thermal investigations, chemical reactions analysis or mechanical examinations are beyond carried out to neatly estimate essential key values. Results from these diverse tasks are then incorporated into analytic or FE numerical models that were elaborated, for example, to predict thermal repercussion on explosive charges or mechanical failures of structures. These simulations highlight the influence of each phenomenon during the laser irradiation and forecast experimental observations with good accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=composite%20materials" title="composite materials">composite materials</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasure" title=" countermeasure"> countermeasure</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20work" title=" experimental work"> experimental work</a>, <a href="https://publications.waset.org/abstracts/search?q=high-energy%20laser" title=" high-energy laser"> high-energy laser</a>, <a href="https://publications.waset.org/abstracts/search?q=laser-matter%20interaction" title=" laser-matter interaction"> laser-matter interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a> </p> <a href="https://publications.waset.org/abstracts/85076/experimental-and-numerical-investigations-on-the-vulnerability-of-flying-structures-to-high-energy-laser-irradiations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85076.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Amifostine Analogue, Drde-30, Attenuates Radiation-Induced Lung Injury in Mice</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aastha%20Arora">Aastha Arora</a>, <a href="https://publications.waset.org/abstracts/search?q=Vikas%20Bhuria"> Vikas Bhuria</a>, <a href="https://publications.waset.org/abstracts/search?q=Saurabh%20Singh"> Saurabh Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Uma%20Pathak"> Uma Pathak</a>, <a href="https://publications.waset.org/abstracts/search?q=Shweta%20Mathur"> Shweta Mathur</a>, <a href="https://publications.waset.org/abstracts/search?q=Puja%20P.%20Hazari"> Puja P. Hazari</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajat%20Sandhir"> Rajat Sandhir</a>, <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Soni"> Ravi Soni</a>, <a href="https://publications.waset.org/abstracts/search?q=Anant%20N.%20Bhatt"> Anant N. Bhatt</a>, <a href="https://publications.waset.org/abstracts/search?q=Bilikere%20S.%20Dwarakanath"> Bilikere S. Dwarakanath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Radiotherapy is an effective curative and palliative option for patients with thoracic malignancies. However, lung injury, comprising of pneumonitis and fibrosis, remains a significant clin¬ical complication of thoracic radiation, thus making it a dose-limiting factor. Also, injury to the lung is often reported as part of multi-organ failure in victims of accidental radiation exposures. Radiation induced inflammatory response in the lung, characterized by leukocyte infiltration and vascular changes, is an important contributing factor for the injury. Therefore, countermeasure agents to attenuate radiation induced inflammatory response are considered as an important approach to prevent chronic lung damage. Although Amifostine, the widely used, FDA approved radio-protector, has been found to reduce the radiation induced pneumonitis during radiation therapy of non-small cell lung carcinoma, its application during mass and field exposure is limited due to associated toxicity and ineffectiveness with the oral administration. The amifostine analogue (DRDE-30) overcomes this limitation as it is orally effective in reducing the mortality of whole body irradiated mice. The current study was undertaken to investigate the potential of DRDE-30 to ameliorate radiation induced lung damage. DRDE-30 was administered intra-peritoneally, 30 minutes prior to 13.5 Gy thoracic (60Co-gamma) radiation in C57BL/6 mice. Broncheo- alveolar lavage fluid (BALF) and lung tissues were harvested at 12 and 24 weeks post irradiation for studying inflammatory and fibrotic markers. Lactate dehydrogenase (LDH) leakage, leukocyte count and protein content in BALF were used as parameters to evaluate lung vascular permeability. Inflammatory cell signaling (p38 phosphorylation) and anti-oxidant status (MnSOD and Catalase level) was assessed by Western blot, while X-ray CT scan, H & E staining and trichrome staining were done to study the lung architecture and collagen deposition. Irradiation of the lung increased the total protein content, LDH leakage and total leukocyte count in the BALF, reflecting endothelial barrier dysfunction. These disruptive effects were significantly abolished by DRDE-30, which appear to be linked to the DRDE-30 mediated abrogation of activation of the redox-sensitive pro- inflammatory signaling cascade, the MAPK pathway. Concurrent administration of DRDE-30 with radiation inhibited radiation-induced oxidative stress by strengthening the anti-oxidant defense system and abrogated p38 mitogen-activated protein kinase activation, which was associated with reduced vascular leak and macrophage recruitment to the lungs. Histopathological examination (by H & E staining) of the lung showed radiation-induced inflammation of the lungs, characterized by cellular infiltration, interstitial oedema, alveolar wall thickening, perivascular fibrosis and obstruction of alveolar spaces, which were all reduced by pre-administration of DRDE-30. Structural analysis with X-ray CT indicated lung architecture (linked to the degree of opacity) comparable to un-irradiated mice that correlated well with the lung morphology and reduced collagen deposition. Reduction in the radiation-induced inflammation and fibrosis brought about by DRDE-30 resulted in a profound increase in animal survival (72 % in the combination vs 24% with radiation) observed at the end of 24 weeks following irradiation. These findings establish the potential of the Amifostine analogue, DRDE-30, in reducing radiation induced pulmonary injury by attenuating the inflammatory and fibrotic responses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=amifostine" title="amifostine">amifostine</a>, <a href="https://publications.waset.org/abstracts/search?q=fibrosis" title=" fibrosis"> fibrosis</a>, <a href="https://publications.waset.org/abstracts/search?q=inflammation" title=" inflammation"> inflammation</a>, <a href="https://publications.waset.org/abstracts/search?q=lung%20injury%20radiation" title=" lung injury radiation"> lung injury radiation</a> </p> <a href="https://publications.waset.org/abstracts/40537/amifostine-analogue-drde-30-attenuates-radiation-induced-lung-injury-in-mice" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40537.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">510</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>