You can run, but you can't hide: Good technique but imperfect science
نویسندگان
چکیده
منابع مشابه
Activity Server: You can run but you can't hide
The activity server is a software utility that provides high-level information on what a user or a number of users are doing by combining data inputs from various sources. These sources are: 1) thejinger server, 2) the phone server, and 3) the location server. The finger server provides information on users' activities or lack thereof on hosts within a local network; the phone server abstracts ...
متن کامل'You Can Run, but You Cannot Hide': Tracking Objects that leave the Field-of-View
In the past, there has been significant research on tracking objects based on features that characterize objects. However, once the features to detect the object are not available from the position of a tracker, it is not clear how to track the object. Our goal in this paper is to track an object even though the object leaves the field-of-view. In this paper, we firstly describe the problems re...
متن کاملYou Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers
With the increase of sophistication and severity of DDoS attack, it is important for a victim site to quickly identify the potential attackers and eliminate their traffic. Our work is based on the probabilistic marking algorithm by Savage[12] in which an attack graph can be constructed by a victim site. We extend the concept further such that we can deduce the local traffic rate of each router ...
متن کاملImmunotherapy of Myelodysplastic Syndrome: You Can Run, but You Can't Hide.
The hypomethylating agent decitabine induces expression of the cancer/testis antigen NY-ESO-1 in the myeloid cells of patients with myelodysplastic syndrome (MDS). Patients with MDS treated with decitabine and an NY-ESO-1 vaccine developed NY-ESO-1-specific T-cell responses directed against their abnormal myeloid cells, raising hopes for combinatorial immunotherapy of this disease. Clin Cancer ...
متن کاملYou can run but you can't hide: tracking T cells in metastatic melanoma patients treated with tumor-infiltrating lymphocytes
Methods In this study, we have utilized high-throughput CDR3 sequencing of the T cell receptor, thus providing a unique genetic signature for each individual T cell since it is maintained throughout division and present on the respective daughter cells. To this end, the TIL infusion product from 14 treated melanoma patients (7 CR/PR and 7 SD/PD) were sorted into CD8 and CD4 subsets and sequence...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Thoracic and Cardiovascular Surgery
سال: 2017
ISSN: 0022-5223
DOI: 10.1016/j.jtcvs.2016.12.027