- Surfactants and Colloidal Systems
- Analytical Chemistry and Chromatography
- Network Security and Intrusion Detection
- Environmental Chemistry and Analysis
- Software System Performance and Reliability
- Chemical Reaction Mechanisms
- Advanced Polymer Synthesis and Characterization
- Inorganic and Organometallic Chemistry
- Molecular Sensors and Ion Detection
- Porphyrin and Phthalocyanine Chemistry
- Asymmetric Synthesis and Catalysis
- Advanced Malware Detection Techniques
- Chemical Synthesis and Reactions
- Chemical Synthesis and Analysis
- Anomaly Detection Techniques and Applications
- Molecular spectroscopy and chirality
- Electrochemical Analysis and Applications
- Crystallography and molecular interactions
- Mass Spectrometry Techniques and Applications
- Protein Interaction Studies and Fluorescence Analysis
- Mesoporous Materials and Catalysis
- Metal complexes synthesis and properties
- Molecular Junctions and Nanostructures
- Supramolecular Chemistry and Complexes
- Photochemistry and Electron Transfer Studies
Florida Gulf Coast University
2022
Hasso Plattner Institute
2013-2019
University of Potsdam
2013-2017
State University of New York at Potsdam
2017
IZA - Institute of Labor Economics
2012
National Bureau of Economic Research
2012
University College London
2012
Ifo Institute for Economic Research
2012
Centre for Economic Policy Research
2012
University of St Andrews
2012
Advanced persistent threats (APTs) pose a significant risk to nearly every infrastructure. Due the sophistication of these attacks, they are able bypass existing security systems and largely infiltrate target network. The prevention detection APT campaigns is also challenging, because fact that attackers constantly change evolve their advanced techniques methods stay undetected. In this paper we analyze 22 different reports give an overview used methods. analysis focused on three main phases...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTResolution and configuration of .alpha.-substituted phenylacetic acidsColin Aaron, David L. Dull, Joel Schmiegel, Jaeger, Yoko Ohashi, Harry S. MosherCite this: J. Org. Chem. 1967, 32, 9, 2797–2803Publication Date (Print):September 1, 1967Publication History Published online1 May 2002Published inissue 1 September 1967https://pubs.acs.org/doi/10.1021/jo01284a035https://doi.org/10.1021/jo01284a035research-articleACS PublicationsRequest reuse...
Cleavable surfactants 1 (2-(2-[1-[2-carboxylatoethyl]alkylidene])hydrazino-N-alkyl-N,N-dimethyl-2-oxoethanaminium bromide: a, alkyl = dodecyl; alkylidene tridecylidene; b, tetradecyl; pentadecylidene), which contain two chains and head groups, have been prepared by the reaction of 2 (2-hydrazino-N-alkyl-N,N-dimethyl-2-oxoethanaminium tetradecyl) with keto acids 3 (a, 4-oxohexadecanoic acid; 4-oxooctadecanoic acid). Surfactants form vesicles, including giant vesicles observed optical...
This paper describes the theoretical underpinnings and provides empirical evidence for a model that predicts positive impact of immigration on entrepreneurial activity. Immigrants, we hypothesize, facilitate innovation entrepreneurship by being willing able to invest in new skills. At heart this prediction is observation human capital not immediately valued U.S. labor market useful learning Because immigrants face lower opportunity cost investing skills or methods, "transfer" source-specific...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTPreparation and characterization of glycerol-based cleavable surfactants derived vesiclesDavid A. Jaeger, Janusz Jamrozik, Timothy G. Golich, Malgorzata Wegrzyn Clennan, Jamshid MohebalianCite this: J. Am. Chem. Soc. 1989, 111, 8, 3001–3006Publication Date (Print):April 1, 1989Publication History Published online1 May 2002Published inissue 1 April 1989https://doi.org/10.1021/ja00190a038RIGHTS & PERMISSIONSArticle Views409Altmetric-Citations43LEARN...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTPreparation and characterization of destructible surfactantsDavid A. Jaeger Moira R. FreyCite this: J. Org. Chem. 1982, 47, 2, 311–315Publication Date (Print):January 1, 1982Publication History Published online1 May 2002Published inissue 1 January 1982https://pubs.acs.org/doi/10.1021/jo00341a026https://doi.org/10.1021/jo00341a026research-articleACS PublicationsRequest reuse permissionsArticle Views237Altmetric-Citations42LEARN ABOUT THESE...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTElectrophilic substitution at saturated carbon. 52. A model for the proton transfer steps of biological transamination and effect a 4-pyridyl group on base-catalyzed racemization carbon acidDavid A. Jaeger, Michael D. Broadhurst, Donald J. CramCite this: Am. Chem. Soc. 1979, 101, 3, 717–732Publication Date (Print):January 1, 1979Publication History Published online1 May 2002Published inissue 1 January...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTElectron impact induced fragmentation of macrocyclic polyethers (crown ethers)David A. Jaeger and Richard R. WhitneyCite this: J. Org. Chem. 1975, 40, 1, 92–97Publication Date (Print):January 1975Publication History Published online1 May 2002Published inissue 1 January 1975https://pubs.acs.org/doi/10.1021/jo00889a020https://doi.org/10.1021/jo00889a020research-articleACS PublicationsRequest reuse permissionsArticle Views219Altmetric-Citations25LEARN...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTElectrophilic substitution at saturated carbon. XLIX. Stereospecific transaminationDavid A. Jaeger and Donald J. CramCite this: Am. Chem. Soc. 1971, 93, 20, 5153–5161Publication Date (Print):October 1, 1971Publication History Published online1 May 2002Published inissue 1 October 1971https://pubs.acs.org/doi/10.1021/ja00749a031https://doi.org/10.1021/ja00749a031research-articleACS PublicationsRequest reuse permissionsArticle...
The differences in log file formats employed a variety of services and applications remain to be problem for security analysts developers intrusion detection systems. proposed solution, i.e. the usage common formats, has limited utilization within existing solutions management. In our paper, we reveal reasons this limitation. We show disadvantages normalisation events. To deal with it have created new format that fits purposes can extended easily. Taking previous work into account, would...
Abstract A brief review of cleavable surfactants, synthesized and characterized by the author his co-workers, is presented. Two types surfactants have been reported; each contains a labile functional group. Both single double-chain first generation are cleaved to give nonsurfactant fragments: water-insoluble organic compound water-soluble ionic compound. Single-chain second another surfactant compound; two single-chain surfactants. Cleavable allow elimination problems associated with...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTSynthesis and characterization of single-chain second generation cleavable surfactantsDavid A. Jaeger Yasmin M. SayedCite this: J. Org. Chem. 1993, 58, 9, 2619–2627Publication Date (Print):April 1, 1993Publication History Published online1 May 2002Published inissue 1 April 1993https://pubs.acs.org/doi/10.1021/jo00061a044https://doi.org/10.1021/jo00061a044research-articleACS PublicationsRequest reuse permissionsArticle...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTAcid-catalyzed hydrolysis and monolayer properties of ketal-based cleavable surfactantsDavid A. Jaeger, Jamshid Mohebalian, Philip L. RoseCite this: Langmuir 1990, 6, 3, 547–554Publication Date (Print):March 1, 1990Publication History Published online1 May 2002Published inissue 1 March 1990https://pubs.acs.org/doi/10.1021/la00093a005https://doi.org/10.1021/la00093a005research-articleACS PublicationsRequest reuse permissionsArticle...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTElectrophilic substitution at saturated carbon. XLVIII. High stereospecificity in a transamination reactionGuthrie Robert D., David A. Jaeger, Willi Meister, and Donald J. CramCite this: Am. Chem. Soc. 1971, 93, 20, 5137–5153Publication Date (Print):October 1, 1971Publication History Published online1 May 2002Published inissue 1 October 1971https://doi.org/10.1021/ja00749a030Request reuse permissionsArticle Views204Altmetric-Citations23LEARN ABOUT...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTHypoglycemic Activity in a Series of 1-Aryl-3-arylsulphonylureasGerald F. Holland, D. A. Jaeger, R. L. Wagner, G. Laubach, W. M. McLamore, and S. Y. P'anCite this: J. Med. Chem. 1960, 3, 1, 99–110Publication Date (Print):January 1961Publication History Published online1 May 2002Published inissue 1 January 1961https://pubs.acs.org/doi/10.1021/jm50014a006https://doi.org/10.1021/jm50014a006research-articleACS PublicationsRequest reuse...
Looking at current IDS and SIEM systems, we observe heavy processing power dedicated solely to answering a simple question, What is the format of log line that (or SIEM) system should process next? Due apparent difficulties uniquely identifying run-time, most systems today do little or no normalisation events they receive. Indeed these often rely on popular search engine applications for analysing event information receive, which results in slower far less accurate correlations. In this...
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many these attacks are performed multiple steps to reach core targeted network. Existing signature detection solutions focused on single step an attack, but they do not see big picture. Furthermore, current languages cannot integrate valuable external threat intelligence, which would simplify creation complex signatures enables malicious activities seen by other targets....
The number of attacks that use sophisticated and complex methods increased lately. main objective these is to largely infiltrate the target network stay undetected. Therefore, attackers often valid credentials standard administrative tools hide between legitimate user actions hinder detection. Most existing security systems, which signature-based or anomaly-based approaches, are not able identify this type malicious activities. Furthermore, it also most feasible analyze behavior manually,...
Double-chain surfactant octahedral Co(III) complexes 1 and 2 (X = ClO4) (a, R C6H13; b, C8H17; c, C10H21; d, C12H25; e, C14H29; f, C16H33) were synthesized in H2O 20:1 (v/v) EtOH−H2O by the reaction of RNHCH2CH2NH2 (5) with Na3Co(NO2)6, followed addition NaClO4. The cisoid 1/transoid diastereomer ratio increased upon going from to H2O, particular a factor ≈5 for octyl dodecyl systems ≈8 hexadecyl system. increase relative amount was attributed hydrophobic effect associated aggregation ligand...
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTMicellar effects on the monohalogenation of n-pentyl phenyl etherDavid A. Jaeger and Raymond E. RobertsonCite this: J. Org. Chem. 1977, 42, 20, 3298–3301Publication Date (Print):September 1, 1977Publication History Published online1 May 2002Published inissue 1 September 1977https://pubs.acs.org/doi/10.1021/jo00440a022https://doi.org/10.1021/jo00440a022research-articleACS PublicationsRequest reuse permissionsArticle...