Refine
Year of publication
- 2020 (18) (remove)
Document Type
- Article (18) (remove)
Language
- English (18) (remove)
Has Fulltext
- no (18) (remove)
Keywords
- Hydrogen evolution reaction (1)
- MITRE (1)
- OSINT (1)
- PEM water electrolysis (1)
- PtCoMn (1)
- Ternary alloy catalyst preparation (1)
- advanced persistent threats (1)
- antecedents (1)
- compassionate love (1)
- cyber kill chain (1)
A systematic method for obtaining a novel electrode structure based on PtCoMn ternary alloy catalyst supported on graphitic carbon nanofibers (CNF) for hydrogen evolution reaction (HER) in acidic media is proposed. Ternary alloy nanoparticles (Co0.6Mn0.4 Pt), with a mean crystallite diameter under 10 nm, were electrodeposited onto a graphitic support material using a two-step pulsed deposition technique. Initially, a surface functionalisation of the carbon nanofibers is performed with the aid of oxygen plasma. Subsequently, a short galvanostatic pulse electrodeposition technique is applied. It has been demonstrated that, if pulsing current is employed, compositionally controlled PtCoMn catalysts can be achieved. Variations of metal concentration ratios in the electrolyte and main deposition parameters, such as current density and pulse shape, led to electrodes with relevant catalytic activity towards HER. The samples were further characterised using several physico-chemical methods to reveal their morphology, structure, chemical and electrochemical properties. X-ray diffraction confirms the PtCoMn alloy formation on the graphitic support and energy dispersive X-ray spectroscopy highlights the presence of the three metallic components from the alloy structure. The preliminary tests regarding the electrocatalytic activity of the developed electrodes display promising results compared to commercial Pt/C catalysts. The PtCoMn/CNF electrode exhibits a decrease in hydrogen evolution overpotential of about 250 mV at 40 mA cm−2 in acidic solution (0.5 M H2SO4) when compared to similar platinum based electrodes (Pt/CNF) and a Tafel slope of around 120 mV dec−1, indicating that HER takes place under the Volmer-Heyrovsky mechanism.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
Leadership Beyond Narcissism: On the Role of Compassionate Love as Antecedent of Servant Leadership
(2020)
While we already know a lot about the outcomes and boundary conditions of servant leadership, there is still a need for research on its antecedents. Building on the theory of purposeful work behavior and further theorizing by van Dierendonck and Patterson (2015), we examine if leaders’ propensity for compassionate love will evoke servant leadership behavior. At the same time, we contrast compassionate love to leaders’ narcissism as psychological counterpart to compassionate love, because narcissism is not associated with leader effectiveness, but with leader emergence instead. We collected data from 170 leader-follower-dyads in a field study in Germany, while measuring leaders’ compassionate love and narcissism, and followers’ perceptions of servant leadership. We found a positive association between leaders’ compassionate love and servant leadership behavior, while narcissism was negatively associated with servant leadership. Theoretical and practical implications, as well as pathways for future research are discussed.