scispace - formally typeset
Search or ask a question
Institution

University of Luxembourg

EducationLuxembourg, Luxembourg
About: University of Luxembourg is a education organization based out in Luxembourg, Luxembourg. It is known for research contribution in the topics: Context (language use) & Computer science. The organization has 4744 authors who have published 22175 publications receiving 381824 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new graphical security model called attack–defense trees is developed, which generalizes the well-known attack trees model and demonstrates the usefulness of the formal foundations of attack– Defense trees by relating attack– defense terms to other scientific research disciplines.
Abstract: The advent of the information age has notably amplified the importance of security. Unfortunately security considerations still widely occur as an afterthought. For many companies, security is not a requirement to conduct business and is therefore readily neglected. However the lack of security may obstruct, impede and even ruin an otherwise flourishing enterprise. Only when internal computer networks shut down, web portals are inaccessible, mail servers are attacked, or similar incidents affect the day to day business of an enterprise, security enters into the field of vision of companies. As such, security by design is only slowly becoming accepted practice. Amongst security researchers, there is no dispute that a reasonable approach to- wards uninterrupted business activities includes security measures and controls from the beginning. To support these efforts, many security models have been developed. Graphical security models are a type of security model that help illus- trate and guide the consideration of security throughout the lifecycle of a product, system or company. Their visual properties are especially well-suited to elucidate security requirements and corresponding security measures. During the last four years, we have developed a new graphical security model called attack–defense trees. The new framework, presented in this thesis, generalizes the well-known attack trees model. Attack–defense trees formally extend attack trees and enhance them with defenses. To be able to deploy attack–defense trees as a security support tool, we have equipped them with three different syntaxes: A visually appealing, graph-based syntax that is dedicated to representing security problems, an algebraic, term-based syntax that simplifies correct, formal and quantitative analysis of security scenarios and a textual syntax that is a compromise between succinct, visual representation and easy, computerized input. We have also equipped attack–defense trees with a variety of semantics. This became necessary, since different applications require different interpretations of attack–defense trees. Besides the very specific and problem oriented propositional, De Morgan and multiset semantics, we have introduced equational semantics. The latter semantics is, in fact, an alternative, unified presentation of semantics based on equational theory. We have expressed the propositional and the multiset seman- tics in terms of the equational semantics. This facilitates algorithmic treatment since the two different semantics have a unified formal foundation. To be able to perform quantitative security analysis, we have introduced the notion of an attribute for attack–defense trees. To guarantee that the evaluation of an attribute on two or more semantically equal attack–defense trees results in the same value, we have introduced the notion of a compatibility condition between semantics and attributes. We have also provided usability guidelines for attributes. These guidelines help a user to specify security-relevant questions that can unambiguously be answered using attributes. We have performed several case studies that allowed us to test and improve the attack–defense tree methodology. We have provided detailed explanations for our design choices during the case studies as well as extensive applicability guidelines that serve a prospective user of the attack–defense tree methodology as a user manual. We have demonstrated the usefulness of the formal foundations of attack–defense trees by relating attack–defense terms to other scientific research disciplines. Con- cretely, we have shown that attack–defense trees in the propositional semantics are computationally as complex as propositional attack trees. Moreover, we have described how to merge Bayesian networks with attack–defense trees and have il- lustrated that attack–defense trees in the propositional semantics are equivalent to a specific class of games frequently occurring in game theory. Concluding the thesis, we have related the attack–defense tree methodology to other graphical security models in an extensive literature overview over similar methodologies.

160 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present results of an experiment that has been designed to evaluate several competing hypotheses to explain the stylized fact of declining contributions in repeated public goods experiments, and the data favor the hypothesis of selfish-biased conditional cooperation as the source for the declining contributions over the competing hypotheses.

160 citations

Journal ArticleDOI
TL;DR: The empirical link between child-related sexual fantasies and sexual victimization of prepubescent children and high levels of subjective distress from this inclination underscore the importance of evidence-based child sexual abuse prevention approaches in the community.
Abstract: Consistent evidence exists for sexual interest in children in nonclinical/nonforensic male populations. However, prevalences for community men's self-reported sexual interest in children have been based on indiscriminate definitions including postpubescent individuals, age-restricted samples, and/or small convenience samples. The present research assessed men's self-reported sexual interest in children (including child prostitution and child sex tourism) on the community level and examined the link between strictly defined sexual fantasies and behaviors involving prepubescent children. In an online survey of 8,718 German men, 4.1% reported sexual fantasies involving prepubescent children, 3.2% reported sexual offending against prepubescent children, and 0.1% reported a pedophilic sexual preference. Sexual fantasies involving prepubescent children were positively related to sexual offending against prepubescent children. Sexual interest in children was associated with subjectively perceived need for therapeutic help. In contrast to findings from forensic samples, men who reported child pornography use exclusively were identified as a subgroup differing from contact sexual offenders against prepubescent children and men who reported both child pornography use and contact sexual offenses against prepubescent children. The empirical link between child-related sexual fantasies and sexual victimization of prepubescent children and high levels of subjective distress from this inclination underscore the importance of evidence-based child sexual abuse prevention approaches in the community. Findings are discussed in terms of their relation to pedophilic disorder.

160 citations

Journal ArticleDOI
TL;DR: A broad overview of magnetic hyperthermia addressing new perspectives and the progress on relevant features such as the ad hoc preparation of magnetic nanoparticles, physical modeling of magnetic heating, methods to determine the heat dissipation power of magnetic colloids including the development of experimental apparatus and the influence of biological matrices on the heating efficiency is presented in this paper.
Abstract: Nowadays, magnetic hyperthermia constitutes a complementary approach to cancer treatment. The use of magnetic particles as heating mediators, proposed in the 1950s, provides a novel strategy for improving tumor treatment and, consequently, patient quality of life. This review reports a broad overview about several aspects of magnetic hyperthermia addressing new perspectives and the progress on relevant features such as the ad hoc preparation of magnetic nanoparticles, physical modeling of magnetic heating, methods to determine the heat dissipation power of magnetic colloids including the development of experimental apparatus and the influence of biological matrices on the heating efficiency.

160 citations

Journal ArticleDOI
TL;DR: An integrated, iterative approach of computational modeling, in vitro experiments, metabolomics, and genomic analysis is presented to accelerate the identification of metabolic capabilities for poorly characterized (anaerobic) microorganisms to yield novel biochemical insights about the target organism.
Abstract: The human gut microbiota plays a central role in human well-being and disease. In this study, we present an integrated, iterative approach of computational modeling, in vitro experiments, metabolomics, and genomic analysis to accelerate the identification of metabolic capabilities for poorly characterized (anaerobic) microorganisms. We demonstrate this approach for the beneficial human gut microbe Faecalibacterium prausnitzii strain A2-165. We generated an automated draft reconstruction, which we curated against the limited biochemical data. This reconstruction modeling was used to develop in silico and in vitro a chemically defined medium (CDM), which was validated experimentally. Subsequent metabolomic analysis of the spent medium for growth on CDM was performed. We refined our metabolic reconstruction according to in vitro observed metabolite consumption and secretion and propose improvements to the current genome annotation of F. prausnitzii A2-165. We then used the reconstruction to systematically characterize its metabolic properties. Novel carbon source utilization capabilities and inabilities were predicted based on metabolic modeling and validated experimentally. This study resulted in a functional metabolic map of F. prausnitzii, which is available for further applications. The presented workflow can be readily extended to other poorly characterized and uncharacterized organisms to yield novel biochemical insights about the target organism.

160 citations


Authors

Showing all 4893 results

NameH-indexPapersCitations
Jun Wang1661093141621
Leroy Hood158853128452
Andreas Heinz108107845002
Philippe Dubois101109848086
John W. Berry9735152470
Michael Müller9133326237
Bart Preneel8284425572
Bjorn Ottersten81105828359
Sander Kersten7924623985
Alexandre Tkatchenko7727126863
Rudi Balling7523819529
Lionel C. Briand7538024519
Min Wang7271619197
Stephen H. Friend7018453422
Ekhard K. H. Salje7058119938
Network Information
Related Institutions (5)
Royal Institute of Technology
68.4K papers, 1.9M citations

90% related

University of York
56.9K papers, 2.4M citations

90% related

ETH Zurich
122.4K papers, 5.1M citations

90% related

Carnegie Mellon University
104.3K papers, 5.9M citations

90% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202360
2022250
20211,671
20201,776
20191,710
20181,663