SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Holm Hannes) "

Sökning: WFRF:(Holm Hannes)

  • Resultat 1-25 av 85
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Ali, Amna, et al. (författare)
  • Autonomic dysfunction is associated with cardiac remodelling in heart failure patients
  • 2018
  • Ingår i: Heart Failure Clinics. - : Wiley. - 1551-7136 .- 2055-5822. ; 5:1, s. 46-52
  • Tidskriftsartikel (refereegranskat)abstract
    • AIMS: Orthostatic hypotension (OH) is a cardinal sign of autonomic dysfunction and a common co-morbidity in heart failure (HF). The role of autonomic dysfunction in the development of structural cardiac anomalies in HF patients has not been sufficiently explored. We aimed to assess relations between orthostatic blood pressure (BP) responses during active standing and echocardiographic changes in a series of patients admitted for HF.METHODS AND RESULTS: One hundred and forty-nine patients hospitalized for HF [mean age: 74 years; 30% women; ejection fraction (LVEF) 40 ± 16%] were examined with conventional echocardiograms and active-standing test. Associations of cardiac remodelling parameters with the difference between supine and standing (after 3 min) systolic/diastolic BP were examined. Systolic BP decreased (-1.1 ± 15 mmHg), whereas diastolic BP increased (+1.0 ± 9.5 mmHg) after 3 min of active standing. A total of 34 patients (23%) met conventional OH criteria; i.e. systolic/diastolic BP decreases by ≥20/10 mmHg. In the multivariable linear regression analysis, adjusted for traditional cardiovascular risk factors and LVEF, a decrease in systolic BP upon standing was associated with greater left atrial volume [β per -10 mmHg: 2.37, standard error (SE) = 1.16, P = 0.043], and greater left ventricular mass (β per -10 mmHg: 5.67, SE = 2.24, P = 0.012), but not with other echocardiographic parameters. No significant associations were observed between signs of cardiac remodelling and decrease in diastolic BP.CONCLUSIONS: Orthostatic decrease in systolic BP among older HF patients is associated with structural cardiac changes such as increased left atrial volume and left ventricular mass, independently of traditional risk factors and left ventricular dysfunction.
  •  
3.
  • Alonso-Blanco, Carlos, et al. (författare)
  • 1,135 Genomes Reveal the Global Pattern of Polymorphism in Arabidopsis thaliana
  • 2016
  • Ingår i: Cell. - : Elsevier. - 0092-8674 .- 1097-4172. ; 166:2, s. 481-491
  • Tidskriftsartikel (refereegranskat)abstract
    • Arabidopsis thaliana serves as a model organism for the study of fundamental physiological, cellular, and molecular processes. It has also greatly advanced our understanding of intraspecific genome variation. We present a detailed map of variation in 1,135 high-quality re-sequenced natural inbred lines representing the native Eurasian and North African range and recently colonized North America. We identify relict populations that continue to inhabit ancestral habitats, primarily in the Iberian Peninsula. They have mixed with a lineage that has spread to northern latitudes from an unknown glacial refugium and is now found in a much broader spectrum of habitats. Insights into the history of the species and the fine-scale distribution of genetic diversity provide the basis for full exploitation of A. thaliana natural variation through integration of genomes and epigenomes with molecular and non-molecular phenotypes.
  •  
4.
  • Andersson, Dennis, et al. (författare)
  • Exploratory Sequential Data Analysis of a Cyber Defence Exercise
  • 2011
  • Ingår i: Proceedings of the International Defense and Homeland Security Simulation Workshop (DHSS) 2011. - : Caltek s.r.l.. ; , s. 27-32
  • Konferensbidrag (refereegranskat)abstract
    • Baltic Cyber Shield 2010 (BCS), a multi-national civilmilitary cyber defence exercise (CDX), aimed to improve the capability of performing a CDX and investigate how IT attacks and defence of critical infrastructure can be studied. The exercise resulted in a massive dataset to be analyzed and many lessons learned in planning and executing a large-scale multinational CDX. A reconstruction & exploration (R&E) approach was used to capture incidents such as attacks and defensive counter-measures during the exercise. This paper introduces the usage of R&E combined with exploratory sequential data analysis (ESDA) and discusses benefits and limitations of using these methods for analyzing multi-national cyber defence exercises. Using ESDA we were able to generate statistical data on attacks from BCS, such as number of reported attacks by the attackers and the defenders on different type of services. Initial results from these explorations will be analyzed and discussed.
  •  
5.
  • Barker, Abigail, et al. (författare)
  • Disequilibrium in historic volcanic rocks from Fogo, Cape Verde traces carbonatite metasomatism of recycled ocean crust
  • 2023
  • Ingår i: Lithos. - : Elsevier. - 0024-4937 .- 1872-6143. ; , s. 107328-107328
  • Tidskriftsartikel (refereegranskat)abstract
    • Fogo, Cape Verde, located upon thick oceanic lithosphere, provides a window into processes occurring in the mantle where recycled ocean crust in an upwelling mantle plume interacts with ambient mantle. Our objective is to investigate the nature of the lithologies of the mantle sources involved in the petrogenesis of historic volcanic rocks from Fogo. We observe enclaves and mingling textures in the lavas combined with oxygen isotope disequilibrium between olivine and clinopyroxene phenocrysts. Olivine δ18O values display positive correlations with Zr/Hf and Zr/Y and a negative correlation with U/Th, whereas clinopyroxene δ 18O values correlate positively with Ba/Nb. Heterogeneity between crystal populations and within the groundmass indicates that multiple magma batches are mixed beneath Fogo. In terms of mantle endmembers and source lithologies, a HIMU endmember was generated by melting of carbonated eclogite as indicated by low δ 18O values, Zr/Hf, Ba/Nb and high U/Th ratios. In contrast, we show the EM1 endmember has high δ 18O, Zr/Hf, Ba/Nb and low U/Th ratios, derived from melting of variably carbonated peridotite. Additionally, Ba/Th ratio are high, indicating that carbonatite melts have contributed to alkaline magma compositions at Fogo.
  •  
6.
  • Buschle, Markus, et al. (författare)
  • A tool for automatic enterprise architecture modeling
  • 2011
  • Ingår i: Proceedings of the CAiSE Forum 2011. ; , s. 25-32
  • Konferensbidrag (refereegranskat)abstract
    • Enterprise architecture is an approach which aim to provide decision support based on organization-wide models. The creation of these models is however cumbersome as multiple aspects of an organization need to be considered. The Enterprise Architecture approach would be significantly less demanding if data used to create the models could be collected automatically. This paper illustrates how a vulnerability scanner can be utilized for data collection in order to automatically create enterprise architecture models. We show how this approach can be realized by extending an earlier presented Enterprise Architecture tool. An example is provided through a case study applying the tool on a real network.
  •  
7.
  • Buschle, Markus, et al. (författare)
  • A Tool for automatic Enterprise Architecture modeling
  • 2012
  • Ingår i: IS Olympics. - Cham : Springer. - 9783642297489 ; , s. 1-15
  • Konferensbidrag (refereegranskat)abstract
    • Enterprise Architecture is an approach which aims to provide decision support based on organization-wide models. The creation of these models is however cumbersome as multiple aspects of an organization need to be considered. The Enterprise Architecture approach would be significantly less demanding if data used to create the models could be collected automatically. This paper illustrates how a vulnerability scanner can be utilized for data collection in order to automatically create Enterprise Architecture models, especially covering infrastructure aspects. We show how this approach can be realized by extending an earlier presented Enterprise Architecture tool. An example is provided through a case study applying the tool on a real network.
  •  
8.
  • Christensson, Anders, et al. (författare)
  • The shrunken pore syndrome is associated with declined right ventricular systolic function in a heart failure population – the HARVEST study
  • 2016
  • Ingår i: Scandinavian Journal of Clinical & Laboratory Investigation. - : Informa UK Limited. - 0036-5513 .- 1502-7686. ; 76:7, s. 568-574
  • Tidskriftsartikel (refereegranskat)abstract
    • The close relationship between heart and kidney diseases was studied with respect to the ‘Shrunken pore syndrome’ that is characterized by a difference in renal filtration between cystatin C and creatinine. Patients were retrieved from the HeARt and brain failure inVESTigation trail (HARVEST) which is an ongoing study undertaken in individuals hospitalized for the diagnosis of heart failure. Ninety-five of 116 patients who underwent transthoracic echocardiograms (TTE) were eligible for this study. We used four different formulas for estimated glomerular filtration rate (eGFR); CKD-EPIcreatinine, CKD-EPIcystatin C, LMrev and CAPA. Presence of the syndrome was defined as eGFR cystatin C ≤ 60% of eGFR creatinine and absence of the syndrome as eGFR cystatin C >90% and <110% of eGFR creatinine. In a linear regression model, adjusted for age and sex, and the ‘Shrunken pore syndrome’ defined by the equation pair CAPA and LMrev and the equation pair CKD-EPIcystatin C and CKD-EPIcreatinine, echocardiographic parameters were studied. The ‘Shrunken pore syndrome’ showed statistically significant associations with measurements of right ventricular (RV) systolic function; (TAPSE and RV S’) (according to the equation pair CKD-EPIcystatin C and CKD-EPIcreatinine). In conclusion, heart failure patients with the ‘Shrunken pore syndrome’ are at increased risk of having RV systolic dysfunction whilst heart failure patients without ‘Shrunken pore syndrome’ seem protected. These findings may indicate common pathophysiological events in the kidneys and the heart explaining the observed increased risk of mortality in subjects with the ‘Shrunken pore syndrome’.
  •  
9.
  • Dennis, Andersson, et al. (författare)
  • Analysis of a Cyber Defense Exercise using Exploratory Sequential Data Analysis
  • 2011
  • Konferensbidrag (refereegranskat)abstract
    • Baltic Cyber Shield 2010 (BCS), a multi-national civil-military cyber defense exercise (CDX), aimed to improve the capability of performing a CDX and investigate how IT attacks and defense of critical infrastructure can be studied. The exercise resulted in a massive dataset to be analyzed and many lessons learned in planning and executing a large-scale multi-national CDX. A reconstruction & exploration (R&E) approach was used to capture incidents such as attacks and defensive countermeasures during the exercise. This paper introduces the usage of R&E combined with exploratory sequential data analysis (ESDA) and discusses benefits and limitations of using these methods for analyzing multi-national cyber defense exercises.Using ESDA we were able to generate statistical data on attacks from BCS, such as number of reported attacks by the attackers and the defenders on different type of services. Initial results from these explorations will be analyzed and discussed.
  •  
10.
  •  
11.
  • Dieden, Anna, et al. (författare)
  • Galectin-4 is associated with diabetes and obesity in a heart failure population
  • 2023
  • Ingår i: Scientific Reports. - : Springer Nature. - 2045-2322. ; 13, s. 1-10
  • Tidskriftsartikel (refereegranskat)abstract
    • An association between high Galectin-4 (Gal-4) and prevalence of diabetes in subjects with heart failure (HF) has previously been reported. The purpose of this study was to confirm these findings, as well as to further investigate this association, in a Swedish HF population. In addition, a second aim was to explore Gal-4’s association with obesity and biomarkers of metabolism and heart failure. Gal-4 was measured using a proximity extension array technique in 324 hospitalized HF patients within the Swedish HeArt and bRain failure investigation trial cohort. Obesity was defined as BMI ≥ 30. Multivariable logistic regression models were used to explore associations between Gal-4 and diabetes/obesity, and linear regression models were used to explore the associations between Gal-4 and biomarkers. A total of 309 participants (29.1% female; mean age 74.8 years) provided complete data for the analysis of associations between Gal-4 and diabetes. Additionally, for the analysis of heart failure phenotype, complete data was available for 230 subjects. Gal-4 was positively associated with prevalent diabetes (OR 2.60; CI 95% 1.56–4.32). In multivariable models, Gal-4 levels were significantly associated with obesity, but only for subjects with diabetes (OR 2.48; 1.09–5.62). Additionally, Gal-4 demonstrated a significant association with the incretin Glucose-dependent insulinotropic polypeptide (GIP), as well as with biomarkers of HF. In the stratified analyses, the association between Gal-4 and diabetes was prominent in patients with reduced ejection fraction (n = 160, OR 3.26; 95%CI 1.88–5.66), while it was not observed in those without (n = 70, 1.96 (0.75–5.10)). In this cross-sectional, observational study, higher Gal-4 levels in HF patients were associated with higher GIP levels. Further, increased levels of Gal-4 were associated with increased likelihood of diabetes, and obesity. This association was particularly pronounced in individuals with HF characterized by reduced ejection fraction. Additionally, Gal-4 levels were significantly elevated in heart failure patients with diabetes and obesity.
  •  
12.
  • Franke, Ulrik, et al. (författare)
  • The Distribution of Time to Recovery of Enterprise IT Services
  • 2014
  • Ingår i: IEEE Transactions on Reliability. - 0018-9529 .- 1558-1721. ; 63:4, s. 858-867
  • Tidskriftsartikel (refereegranskat)abstract
    • The context of this article is the availability of enterprise IT services, a key concern for many enterprises. While there is a plethora of literature concerned with service availability, there is no previous systematic empirical study on IT service time to recovery following outages. The existing literature typically assumes a distribution, or builds on analogies to related areas such as software engineering. Therefore, our objective is to find the statistical distribution of IT service time to recovery. Method-wise, this investigation is based on logs of more than 1 800 incidents in a large Nordic bank, corresponding to more than 11 000 hours of recorded downtime. Five possible distributions of time to recovery from the literature were investigated using the Akaike Information Criterion to find the distribution offering the best fit. The results show that the log-normal distribution outperformed the others for all tested service channels (collections of IT services). It is concluded that the log-normal distribution offers the best fit of IT service time to recovery. Using this distribution in simulation and decision-support tools offers the prospect of better predictions of downtime and downtime costs to the practitioner community.
  •  
13.
  • Gisladottir, Rosa S, et al. (författare)
  • Sequence Variants in TAAR5 and Other Loci Affect Human Odor Perception and Naming.
  • 2020
  • Ingår i: Current biology : CB. - : Elsevier BV. - 1879-0445 .- 0960-9822. ; 30:23
  • Tidskriftsartikel (refereegranskat)abstract
    • Olfactory receptor (OR) genes in humans form a special class characterized by unusually high DNA sequence diversity, which should give rise to differences in perception and behavior. In the largest genome-wide association study to date based on olfactory testing, we investigated odor perception and naming with smell tasks performed by 9,122 Icelanders, with replication in a separate sample of 2,204 individuals. We discovered an association between a low-frequency missense variant in TAAR5 and reduced intensity rating of fish odor containing trimethylamine (p.Ser95Pro, pcombined= 5.6× 10-15). We demonstrate that TAAR5 genotype affects aversion to fish odor, reflected by linguistic descriptions of the odor and pleasantness ratings. We also discovered common sequence variants in two canonical olfactory receptor loci that associate with increased intensity and naming of licorice odor (trans-anethole: lead variant p.Lys233Asn in OR6C70, pcombined= 8.8× 10-16 and pcombined= 1.4× 10-9) and enhanced naming of cinnamon (trans-cinnamaldehyde; intergenic variant rs317787-T, pcombined= 5.0× 10-17). Together, our results show that TAAR5 genotype variation influences human odor responses and highlight that sequence diversity in canonical OR genes can lead to enhanced olfactory ability, in contrast to the view that greater tolerance for mutations in the human OR repertoire leads to diminished function.
  •  
14.
  •  
15.
  • Holm, Hannes, et al. (författare)
  • A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
  • 2015
  • Ingår i: Information and Software Technology. - : Elsevier BV. - 0950-5849 .- 1873-6025. ; 58, s. 304-318
  • Tidskriftsartikel (refereegranskat)abstract
    • Context: Software vulnerabilities in general, and software vulnerabilities with publicly available exploits in particular, are important to manage for both developers and users. This is however a difficult matter to address as time is limited and vulnerabilities are frequent. Objective: This paper presents a Bayesian network based model that can be used by enterprise decision makers to estimate the likelihood that a professional penetration tester is able to obtain knowledge of critical vulnerabilities and exploits for these vulnerabilities for software under different circumstances. Method: Data on the activities in the model are gathered from previous empirical studies, vulnerability databases and a survey with 58 individuals who all have been credited for the discovery of critical software vulnerabilities. Results: The proposed model describes 13 states related by 17 activities, and a total of 33 different datasets. Conclusion: Estimates by the model can be used to support decisions regarding what software to acquire, or what measures to invest in during software development projects.
  •  
16.
  • Holm, Hannes (författare)
  • A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures
  • 2014
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. Unfortunately, as modern IT systems typically are composed of numerous interconnected components, including personnel and processes that use or support it (often referred to as an enterprise architecture), this is not a simple endeavor. To make matters worse, there are malicious actors who seek to exploit vulnerabilities in the enterprise architecture to conduct unauthorized activity within it. Various models have been proposed by academia and industry to identify and mitigate vulnerabilities in enterprise architectures, however, so far none has provided a sufficiently comprehensive scope.The contribution of this thesis is a modeling framework and calculation engine that can be used as support by enterprise decision makers in regard to cyber security matters, e.g., chief information security officers. In summary, the contribution can be used to model and analyze the vulnerability of enterprise architectures, and provide mitigation suggestions based on the resulting estimates. The contribution has been tested in real-world cases and has been validated on both a component level and system level; the results of these studies show that it is adequate in terms of supporting enterprise decision making.This thesis is a composite thesis of eight papers. Paper 1 describes a method and dataset that can be used to validate the contribution described in this thesis and models similar to it. Paper 2 presents what statistical distributions that are best fit for modeling the time required to compromise computer systems. Paper 3 describes estimates on the effort required to discover novel web application vulnerabilities. Paper 4 describes estimates on the possibility of circumventing web application firewalls. Paper 5 describes a study of the time required by an attacker to obtain critical vulnerabilities and exploits for compiled software. Paper 6 presents the effectiveness of seven commonly used automated network vulnerability scanners. Paper 7 describes the ability of the signature-based intrusion detection system Snort at detecting attacks that are more novel, or older than its rule set. Finally, paper 8 describes a tool that can be used to estimate the vulnerability of enterprise architectures; this tool is founded upon the results presented in papers 1-7.
  •  
17.
  • Holm, Hannes (författare)
  • A Large-Scale Study of the Time Required To Compromise a Computer System
  • 2014
  • Ingår i: IEEE Transactions on Dependable and Secure Computing. - : IEEE Computer Society. - 1545-5971 .- 1941-0018. ; 11:1, s. 6506084-
  • Tidskriftsartikel (refereegranskat)abstract
    • A frequent assumption in the domain of cybersecurity is that cyberintrusions follow the properties of a Poisson process, i.e., that the number of intrusions is well modeled by a Poisson distribution and that the time between intrusions is exponentially distributed. This paper studies this property by analyzing all cyberintrusions that have been detected across more than 260,000 computer systems over a period of almost three years. The results show that the assumption of a Poisson process model might be unoptimalâthe log-normal distribution is a significantly better fit in terms of modeling both the number of detected intrusions and the time between intrusions, and the Pareto distribution is a significantly better fit in terms of modeling the time to first intrusion. The paper also analyzes whether time to compromise (TTC) increase for each successful intrusion of a computer system. The results regarding this property suggest that time to compromise decrease along the number of intrusions of a system.
  •  
18.
  • Holm, Hannes, et al. (författare)
  • A Manual for the Cyber Security Modeling Language
  • 2013
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • The Cyber Security Modeling Language (CySeMoL) is an attack graph toolthat can be used to estimate the cyber security of enterprise architectures. Cy-SeMoL includes theory on how attacks and defenses relate quantitatively; thus,users must only model their assets and how these are connected in order to enablecalculations. This report functions as a manual to facilitate practical usage andunderstanding of CySeMoL.
  •  
19.
  • Holm, Hannes, et al. (författare)
  • A metamodel for web application injection attacks and countermeasures
  • 2012
  • Ingår i: Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation. - Berlin, Heidelberg : Springer. - 9783642341625 ; , s. 198-217
  • Konferensbidrag (refereegranskat)abstract
    • Web application injection attacks such as cross site scripting and SQL injection are common and problematic for enterprises. In order to defend against them, practitioners with large heterogeneous system architectures and limited resources struggle to understand the effectiveness of different countermeasures under various conditions. This paper presents an enterprise architecture metamodel that can be used by enterprise decision makers when deciding between different countermeasures for web application injection attacks. The scope of the model is to provide low-effort guidance on an abstraction level of use for an enterprise decision maker. This metamodel is based on a literature review and revised according to the judgment by six domain experts identified through peer-review.
  •  
20.
  • Holm, Hannes, et al. (författare)
  • A quantitative evaluation of vulnerability scanning
  • 2011
  • Ingår i: Information Management & Computer Security. - : Emerald Group Publishing Limited. - 0968-5227 .- 1758-5805. ; 19:4, s. 231-247
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose – The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the platforms used.Design/methodology/approach – Both qualitative comparisons of functionality and quantitative comparisons of false positives and false negatives are made for seven different scanners. The quantitative assessment includes data from both authenticated and unauthenticated scans. Experiments were conducted on a computer network of 28 hosts with various operating systems, services and vulnerabilities. This network was set up by a team of security researchers and professionals.Findings – The data collected in this study show that authenticated vulnerability scanning is usable. However, automated scanning is not able to accurately identify all vulnerabilities present in computer networks. Also, scans of hosts running Windows are more accurate than scans of hosts running Linux.Research limitations/implications – This paper focuses on the direct output of automated scans with respect to the vulnerabilities they identify. Areas such as how to interpret the results assessed by each scanner (e.g. regarding remediation guidelines) or aggregating information about individual vulnerabilities into risk measures are out of scope.Practical implications – This paper describes how well automated vulnerability scanners perform when it comes to identifying security issues in a network. The findings suggest that a vulnerability scanner is a useable tool to have in your security toolbox given that user credentials are available for the hosts in your network. Manual effort is however needed to complement automated scanning in order to get satisfactory accuracy regarding network security problems.Originality/value – Previous studies have focused on the qualitative aspects on vulnerability assessment. This study presents a quantitative evaluation of seven of the most popular vulnerability scanners available on the market.
  •  
21.
  • Holm, Hannes, et al. (författare)
  • An expert-based investigation of the Common Vulnerability Scoring System
  • 2015
  • Ingår i: Computers & security (Print). - : Elsevier BV. - 0167-4048 .- 1872-6208. ; 53, s. 18-30
  • Tidskriftsartikel (refereegranskat)abstract
    • The Common Vulnerability Scoring System (CVSS) is the most widely used standard for quantifying the severity of security vulnerabilities. For instance, all vulnerabilities in the US National Vulnerability Database are scored according to this system. Unfortunately, it is largely unexplored whether or not its scores are accurate. This paper studies this property through a survey with opinions by 384 experts, covering more than 3000 vulnerabilities. The results show that the mean disagreement between the judgments of the experts and the CVSS Base Score is 0.38, with a variance of 4.46 (on a scale from 0 to 10). The direction of this difference depends on the type of vulnerability that is concerned. The experts then suggest a number of possible revisions to the CVSS that could explain this difference.
  •  
22.
  •  
23.
  • Holm, Hannes, et al. (författare)
  • Association of ventricular-arterial coupling with biomarkers involved in heart failure pathophysiology - the STANISLAS cohort
  • Ingår i: European Journal of Heart Failure. - 1879-0844.
  • Tidskriftsartikel (refereegranskat)abstract
    • AIMS: Impaired left ventricular-arterial coupling (VAC) has been shown to correlate with worse prognosis in cardiac diseases and heart failure (HF). The extent of the relationship between VAC and circulating biomarkers associated with HF has been scarcely documented. We aimed to explore associations of VAC with proteins involved in HF pathophysiology within a large population-based cohort of middle-aged individuals.METHODS AND RESULTS: In the forth visit of the STANISLAS family cohort, involving 1309 participants (mean age 48 ± 14 years; 48% male) from parent and children generations, we analysed the association of 32 HF-related proteins with non-invasively assessed VAC using pulse wave velocity (PWV)/global longitudinal strain (GLS) and arterial elastance (E a)/ventricular end-systolic elastance (E es). Among the 32 tested proteins, fatty acid-binding protein adipocyte 4, interleukin-6, growth differentiation factor 15, matrix metalloproteinase (MMP)-1, and MMP-9 and adrenomedullin were positively associated with PWV/GLS whereas transforming growth factor beta receptor type 3, MMP-2 and N-terminal pro-B-type natriuretic peptide (NT-proBNP) were negatively associated. In multivariable models, only MMP-2 and NT-proBNP were significantly and inversely associated with PWV/GLS in the whole population and in the parent generation. Higher levels of NT-proBNP were also negatively associated with E a/E es in the whole cohort but this association did not persist in the parent subgroup. CONCLUSION: Elevated MMP-2 and NT-proBNP levels correlate with better VAC (lower PWV/GLS), possibly indicating a compensatory cardiovascular response to regulate left ventricular pressure amidst cardiac remodelling and overload.
  •  
24.
  • Holm, Hannes, et al. (författare)
  • Automatic data collection for enterprise architecture models
  • 2014
  • Ingår i: Software and Systems Modeling. - : Springer Science and Business Media LLC. - 1619-1366 .- 1619-1374. ; 13:2, s. 825-841
  • Tidskriftsartikel (refereegranskat)abstract
    • Enterprise Architecture (EA) is an approach used to provide decision support based on organization-wide models. The creation of such models is, however, cumbersome as multiple aspects of an organization need to be considered, making manual efforts time-consuming, and error prone. Thus, the EA approach would be significantly more promising if the data used when creating the models could be collected automatically-a topic not yet properly addressed by either academia or industry. This paper proposes network scanning for automatic data collection and uses an existing software tool for generating EA models (ArchiMate is employed as an example) based on the IT infrastructure of enterprises. While some manual effort is required to make the models fully useful to many practical scenarios (e.g., to detail the actual services provided by IT components), empirical results show that the methodology is accurate and (in its default state) require little effort to carry out.
  •  
25.
  • Holm, Hannes (författare)
  • Baltic Cyber Shield : Research from a Red Team versus Blue Team Exercise
  • 2012
  • Ingår i: PenTest Magazine. - : Software press. - 2084-1116. ; 9, s. 80-86
  • Tidskriftsartikel (populärvet., debatt m.m.)abstract
    • This article describes one of the few red team versus blue team exercises to date that focused on producing research, namely, the Baltic Cyber Shield (BCS). Various research have been conducted based on the data gathered during this exercise – this article describes two of these studies.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-25 av 85
Typ av publikation
tidskriftsartikel (57)
konferensbidrag (18)
rapport (3)
forskningsöversikt (3)
doktorsavhandling (2)
annan publikation (1)
visa fler...
bokkapitel (1)
visa färre...
Typ av innehåll
refereegranskat (75)
övrigt vetenskapligt/konstnärligt (8)
populärvet., debatt m.m. (2)
Författare/redaktör
Holm, Hannes (74)
Ekstedt, Mathias (30)
Magnusson, Martin (19)
Jujic, Amra (18)
Bachus, Erasmus (15)
Molvin, John (12)
visa fler...
Fedorowski, Artur (11)
Melander, Olle (8)
Honeth, Nicholas (5)
Nilsson, Peter M (4)
Franke, Ulrik (4)
Ricci, Fabrizio (4)
Nilsson, Peter (3)
Ericsson, Göran (3)
Närman, Per (3)
Thorsteinsdottir, Un ... (3)
Stefansson, Kari (3)
Tasevska-Dinevska, G ... (3)
Leosdottir, Margret (3)
Minthon, Lennart (2)
Nohlberg, Marcus (2)
Andreassen, Ole A (2)
Grubb, Anders (2)
Weckwerth, Wolfram (2)
Hansson, Oskar (2)
Ding, Wei (2)
Johnson, Pontus (2)
Jonsdottir, Ingileif (2)
Wang, George (2)
Haavik, Jan (2)
Banasik, Karina (2)
Brunak, Søren (2)
Djurovic, Srdjan (2)
Alonso-Blanco, Carlo ... (2)
Andrade, Jorge (2)
Becker, Claude (2)
Bemm, Felix (2)
Bergelson, Joy (2)
Chae, Eunyoung (2)
Ecker, Joseph R. (2)
Exposito-Alonso, Moi ... (2)
Farlow, Ashley (2)
Fitz, Joffrey (2)
Gan, Xiangchao (2)
Grimm, Dominik G. (2)
Henz, Stefan R. (2)
Holm, Svante (2)
Horton, Matthew (2)
Jarsulic, Mike (2)
Kerstetter, Randall ... (2)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (46)
Lunds universitet (30)
Malmö universitet (5)
Linköpings universitet (4)
Göteborgs universitet (2)
Umeå universitet (2)
visa fler...
Uppsala universitet (2)
Mittuniversitetet (2)
Högskolan i Skövde (2)
Stockholms universitet (1)
Karlstads universitet (1)
Karolinska Institutet (1)
visa färre...
Språk
Engelska (83)
Svenska (2)
Forskningsämne (UKÄ/SCB)
Medicin och hälsovetenskap (34)
Naturvetenskap (28)
Teknik (22)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy