Powered by Deep Web Technologies
Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

2

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

3

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

4

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

5

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

6

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

7

A toolkit for detecting technical surprise.  

SciTech Connect

The detection of a scientific or technological surprise within a secretive country or institute is very difficult. The ability to detect such surprises would allow analysts to identify the capabilities that could be a military or economic threat to national security. Sandia's current approach utilizing ThreatView has been successful in revealing potential technological surprises. However, as data sets become larger, it becomes critical to use algorithms as filters along with the visualization environments. Our two-year LDRD had two primary goals. First, we developed a tool, a Self-Organizing Map (SOM), to extend ThreatView and improve our understanding of the issues involved in working with textual data sets. Second, we developed a toolkit for detecting indicators of technical surprise in textual data sets. Our toolkit has been successfully used to perform technology assessments for the Science & Technology Intelligence (S&TI) program.

Trahan, Michael Wayne; Foehse, Mark C.

2010-10-01T23:59:59.000Z

8

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

9

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

10

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

11

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

12

Detecting unknown network attacks using language models  

Science Conference Proceedings (OSTI)

We propose a method for network intrusion detection based on language models such as n-grams and words. Our method proceeds by extracting these models from TCP connection payloads and applying unsupervised anomaly detection. The essential part ...

Konrad Rieck; Pavel Laskov

2006-07-01T23:59:59.000Z

13

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

14

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

15

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

16

MULTOPS: a data-structure for bandwidth attack detection  

Science Conference Proceedings (OSTI)

A denial-of-service bandwidth attack is an attempt to disrupt an online service by generating a traffic overload that clogs links or causes routers near the victim to crash. We propose a heuristic and a data-structure that network devices (such as routers) ...

Thomer M. Gil; Massimiliano Poletto

2001-08-01T23:59:59.000Z

17

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network (OSTI)

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses LRU cache filtering to capture the high bandwidth flows followed by computation of wavelet variance on the aggregate miss traffic. The introduction of attack traffic in the network would elicit changes in the wavelet variance. This is combined with thresholding methods to enable attack detection. Sampling techniques can be used to tailor the cost of our detection mechanism. The mechanism we suggest is independent of routing information, thereby making attack detection immune to IP address spoofing. Using simulations and quantitative measures, we find that our mechanism works successfully on several kinds of attacks. We also use statistical methods to validate the results obtained.

Ramanathan, Anu

2002-01-01T23:59:59.000Z

18

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

19

Alternative energy design toolkit  

E-Print Network (OSTI)

This thesis concerns the concepts, structure, and applications of the Alternative Energy Design Toolkit. The toolkit is aimed to provide a widely accessible, easy to use, flexible, yet powerful modeling environment for ...

Sukkasi, Sittha

2004-01-01T23:59:59.000Z

20

Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism  

E-Print Network (OSTI)

A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

DDoS attack detection method based on linear prediction model  

Science Conference Proceedings (OSTI)

Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. The IP Flow feature value (FFV) algorithm is proposed based on the essential features of DDoS attacks, such as the abrupt traffic change, flow dissymmetry, ... Keywords: ARMA model, attack features, distributed denial of service, linear prediction, network security

Jieren Cheng; Jianping Yin; Chengkun Wu; Boyun Zhang; Yun Liu

2009-09-01T23:59:59.000Z

22

Category:LEDS Toolkit | Open Energy Information  

Open Energy Info (EERE)

Toolkit Toolkit Jump to: navigation, search This page contains toolkits meant to support the creation and implementation of a Low Emission Development Strategy. Pages in category "LEDS Toolkit" The following 14 pages are in this category, out of 14 total. A Agriculture Work Space/Tools B Bioenergy Assessment Toolkit Bioenergy Toolkit E Energy System and Scenario Analysis Toolkit F Financing Initiatives Toolkit G Greenhouse Gas Inventory Development Toolkit I Impact Assessment Toolkit L Land Use Assessment Toolkit Land-use Policy and Program Design Toolkit Land-use Scenario Analysis Toolkit M Market Analysis Toolkit P Policy and Program Design Toolkit S Sustainable Land-use Impact Assessment Toolkit T Transportation Assessment Toolkit Retrieved from "http://en.openei.org/w/index.php?title=Category:LEDS_Toolkit&oldid=332209

23

TOOLKIT, Version 2. 0  

Science Conference Proceedings (OSTI)

The purpose of this User's Guide is to show by example many of the features of Toolkit II. Some examples will be copies of screens as they appear while running the Toolkit. Other examples will show what the user should enter in various situations; in these instances, what the computer asserts will be in boldface and what the user responds will be in regular type. The User's Guide is divided into four sections. The first section, FOCUS Databases'', will give a broad overview of the Focus administrative databases that are available on the VAX; easy-to-use reports are available for most of them in the Toolkit. The second section, Getting Started'', will cover the steps necessary to log onto the Computer Center VAX cluster and how to start Focus and the Toolkit. The third section, Using the Toolkit'', will discuss some of the features in the Toolkit -- the available reports and how to access them, as well as some utilities. The fourth section, Helpful Hints'', will cover some useful facts about the VAX and Focus as well as some of the more common problems that can occur. The Toolkit is not set in concrete but is continually being revised and improved. If you have any opinions as to changes that you would like to see made to the Toolkit or new features that you would like included, please let us know. Since we do try to respond to the needs of the user and make periodic improvement to the Toolkit, this User's Guide may not correspond exactly to what is available in the computer. In general, changes are made to provide new options or features; rarely is an existing feature deleted.

Schroeder, E.; Bagot, B.; McNeill, R.L.

1990-05-09T23:59:59.000Z

24

Compliant mechanism learning toolkit  

E-Print Network (OSTI)

This thesis concerns a toolkit designed to assist in learning the behavior of complaint mechanisms. In the design of complaint mechanisms, increasingly complicated designs behave in ways that are harder to intuitively ...

Allard, Nicholas (Nicholas A.)

2006-01-01T23:59:59.000Z

25

REEEP Toolkits | Open Energy Information  

Open Energy Info (EERE)

REEEP Toolkits REEEP Toolkits Jump to: navigation, search Tool Summary Name: REEEP Toolkit Agency/Company /Organization: Renewable Energy and Energy Efficiency Partnership Sector: Energy Focus Area: Energy Efficiency, Renewable Energy Topics: Implementation, Low emission development planning, Policies/deployment programs, Resource assessment, Pathways analysis, Background analysis Resource Type: Dataset References: REEEP Toolkit [1] This article is a stub. You can help OpenEI by expanding it. Latest Toolkits Failed to load RSS feed from http://toolkits.reeep.org/rss.php|short|max=5: There was a problem during the HTTP request: 404 Not Found Source: http://toolkits.reeep.org/rss.php References ↑ "REEEP Toolkit" Retrieved from "http://en.openei.org/w/index.php?title=REEEP_Toolkits&oldid=384160"

26

Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks  

Science Conference Proceedings (OSTI)

This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

2010-01-14T23:59:59.000Z

27

Performance Based Service Acquisition Toolkit | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit Aviation Management Green Leases Executive Secretariat Energy Reduction at...

28

Geospatial Toolkit Help October 2010  

E-Print Network (OSTI)

toolkit data in your own GIS, 36 File format reference, 37 Glossary, 37 © 2010 National Renewable the country Related Topics: About the Geospatial Toolkit Glossary About the Geospatial Toolkit The Geospatial http://www.homerenergy.com/. Related Topics: Getting Started Glossary Toolbar buttons As you hover over

29

Bioenergy Assessment Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioenergy Assessment Toolkit Bioenergy Assessment Toolkit Anelia Milbrandt and Caroline Uriarte Produced under direction of the United States Agency for International Development by the National Renewable Energy Laboratory (NREL) under Interagency Agreement AEG-P-00-00003-00; Work for Others Agreement number 3010543; Task Numbers WFE2.1012, WFE2.1013, and WFE2.1014. Technical Report NREL/TP-6A20-56456 October 2012 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Contract No. DE-AC36-08GO28308 National Renewable Energy Laboratory 15013 Denver West Parkway Golden, CO 80401 303-275-3000 * www.nrel.gov Bioenergy Assessment Toolkit Anelia Milbrandt and Caroline Uriarte

30

TIAA: A Visual Toolkit for Intrusion Alert Analysis  

Science Conference Proceedings (OSTI)

This paper presents the development of TIAA, a visual toolkit for intrusion alert analysis. TIAA is developed to provide an interactive platform for analyzing potentially large sets of intrusion alerts reported by heterogeneous intrusion detection systems ...

Ning, P

2003-03-01T23:59:59.000Z

31

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

32

Ray tracing visualization toolkit  

Science Conference Proceedings (OSTI)

The Ray Tracing Visualization Toolkit (rtVTK) is a collection of programming and visualization tools supporting visual analysis of ray-based rendering algorithms. rtVTK leverages layered visualization within the spatial domain of computation, enabling ... Keywords: ray tracing, ray-based rendering, visualization

Christiaan Gribble; Jeremy Fisher; Daniel Eby; Ed Quigley; Gideon Ludwig

2012-03-01T23:59:59.000Z

33

Geospatial Toolkit | OpenEI  

Open Energy Info (EERE)

Toolkit Toolkit Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. Source NREL Date Released Unknown Date Updated January 03rd, 2011 (4 years ago) Keywords Geospatial Toolkit GIS NREL Oaxaca Data Quality Metrics Level of Review Some Review Comment Temporal and Spatial Coverage Frequency Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL)

34

Demand Trading Toolkit  

Science Conference Proceedings (OSTI)

Download report 1006017 for FREE. The global movement toward competitive markets is paving the way for a variety of market mechanisms that promise to increase market efficiency and expand customer choice options. Demand trading offers customers, energy service providers, and other participants in power markets the opportunity to buy and sell demand-response resources, just as they now buy and sell blocks of power. EPRI's Demand Trading Toolkit (DTT) describes the principles and practice of demand trading...

2001-12-10T23:59:59.000Z

35

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

36

LEDSGP/tools/toolkits | Open Energy Information  

Open Energy Info (EERE)

world Home About Tools Expert Assistance Events Publications Join Us Tools Activities Inventory LEDS Toolkits Knowledge Portals Featured Tools LEDS-Related Toolkits LEDS in...

37

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit (Redirected from Geospatial Toolkits) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

38

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery  

Science Conference Proceedings (OSTI)

In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental ... Keywords: Fragile watermarking, Image authentication, Tamper detection

Chin-Chen Chang; Yi-Hsuan Fan; Wei-Liang Tai

2008-02-01T23:59:59.000Z

39

Application experiences with the Globus toolkit.  

SciTech Connect

The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

Brunett, S.

1998-06-09T23:59:59.000Z

40

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit (Redirected from GsT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

NLTK: the natural language toolkit  

Science Conference Proceedings (OSTI)

The Natural Language Toolkit is a suite of program modules, data sets and tutorials supporting research and teaching in computational linguistics and natural language processing. NLTK is written in Python and distributed under the GPL open source license. ...

Steven Bird

2006-07-01T23:59:59.000Z

42

NLTK: the Natural Language Toolkit  

Science Conference Proceedings (OSTI)

NLTK, the Natural Language Toolkit, is a suite of open source program modules, tutorials and problem sets, providing ready-to-use computational linguistics courseware. NLTK covers symbolic and statistical natural language processing, and is interfaced ...

Edward Loper; Steven Bird

2002-07-01T23:59:59.000Z

43

2013 SCRM Awareness Toolkit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013 SCRM Awareness Toolkit 2013 SCRM Awareness Toolkit Supply Chain Poster Phase 1.pdf SCRM Poster Phase 2.pdf DOE SCRM flyerphase1bupdated (2) - srf.docx DOE SCRM bluebox...

44

Toolkit Design for Interactive Structured Graphics  

E-Print Network (OSTI)

for listening to low-level events. Some toolkits such as Tcl/Tk [19] include a "structured canvas" component

Golbeck, Jennifer

45

Advanced Network Toolkit for Assessments  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network Toolkit for Assessments Network Toolkit for Assessments and Remote Mapping (ANTFARM) Uses existing information to passively map control systems networks and identify cyber security perimeters Control systems operators require a map of their energy control system network in order to identify its electronic security perimeter, critical to meeting the North American Electric Reliability Corporation's (NERC) Critical Infrastructure Protection (CIP) standards. However, purchasing active, online scanning tools specifically for network mapping can be costly, and these tools can disrupt control system function, causing system latency and possibly affecting power supply. The ANTFARM software tool enables system operators to remotely and

46

Market Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Market Analysis Toolkit Market Analysis Toolkit Jump to: navigation, search Search Resources Resource Type Training Materials Climate Technology Initiative Training Courses GHG Management Institute curriculum Supporting Small Forest Enterprises: A Facilitator's Toolkit Add Guides Accelerating Climate Technologies: Innovative Market Strategies to Overcome Barriers to Scale-up Supporting Small Forest Enterprises: A Facilitator's Toolkit The Climate Investment Funds-Business Guide UNEP-Bioenergy Decision Support Tool Add Lessons Learned and Best Practices Brazil LULUCF Modeling Supporting Small Forest Enterprises: A Facilitator's Toolkit Sustainable Land Management Through Market-Oriented Commodity Development: Case studies from Ethiopia Add Datasets Africa-Economic Development Report 2010

47

Sustainable Forest Finance Toolkit | Open Energy Information  

Open Energy Info (EERE)

Sustainable Forest Finance Toolkit Sustainable Forest Finance Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Sustainable Forest Finance Toolkit Agency/Company /Organization: World Business Council for Sustainable Development Sector: Land Focus Area: Forestry Topics: Finance Resource Type: Guide/manual Website: www.pwc.co.uk/pdf/forest_finance_toolkit.pdf Sustainable Forest Finance Toolkit Screenshot References: Sustainable Forest Finance Toolkit[1] Overview "This Toolkit has been developed jointly by PricewaterhouseCoopers (PwC) and the World Business Council for Sustainable Development (WBCSD). It is a globally applicable resource designed to help financial institutions support the management of forest resources through sustainable and legal timber production and processing, and markets for carbon and other

48

Bioenergy Toolkit | Open Energy Information  

Open Energy Info (EERE)

Bioenergy Toolkit Bioenergy Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

49

Guidelines and Toolkits for Urban Transport Development in Medium...  

Open Energy Info (EERE)

Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Jump to: navigation, search Tool Summary Name: Guidelines and Toolkits for Urban Transport...

50

Technical Analysis Toolkit 7.1 Introduction  

E-Print Network (OSTI)

management, data manipulation, auto data loading system, technical analysis and trading performance analysis.2 A typical user profile #12;126 7 Technical Analysis Toolkit 7.2.1.1 Create New Users To start usingChapter 7 Technical Analysis Toolkit 7.1 Introduction We present in this chapter some basic

Benmei, Chen

51

Turkey Geospatial Toolkit | OpenEI  

Open Energy Info (EERE)

Turkey Geospatial Toolkit Turkey Geospatial Toolkit Dataset Summary Description Developed by NREL and the U.S. Trade and Development Agency, this geographic toolkit that allows users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. The GsT was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. The revised version of the Geospatial Toolkit for Turkey is available using the following link: http://www.nrel.gov/international/downloads/gst_turkey.exe NOTE: Please use the provided link to access the most up to date software package and data. The Turkey GsT data were last updated in January 2011. The attached zip file below is an archive and contains the previous version of the geospatial toolkit executable that has been replaced.

52

LEDSGP/Transportation Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit < LEDSGP(Redirected from Transportation Toolkit) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Developing Strategies for Clean, Efficient Transportation The Transportation LEDS Toolkit supports development planners, technical experts, and decision makers at national and local levels to plan and implement low emission transportation systems that support economic growth. This toolkit website helps users navigate a variety of resources in order to identify the most effective tools necessary to build and implement low

53

TECA: A Parallel Toolkit for Extreme Climate Analysis  

SciTech Connect

We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

2012-03-12T23:59:59.000Z

54

Renewable Energy Toolkit (REToolkit) | Open Energy Information  

Open Energy Info (EERE)

Renewable Energy Toolkit (REToolkit) Renewable Energy Toolkit (REToolkit) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy Toolkit (REToolkit) Focus Area: Renewable Energy Topics: Market Analysis Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, Equivalent URI: cleanenergysolutions.org/content/renewable-energy-toolkit-retoolkit Language: English Policies: "Deployment Programs,Regulations,Financial Incentives" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Technical Assistance Regulations: "Net Metering & Interconnection,Utility/Electricity Service Costs" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

55

Low Emission Development Strategies toolkit search  

Open Energy Info (EERE)

Strategy (LEDS) Toolkit Strategy (LEDS) Toolkit Are we missing something? Add a Tool software models, databases, training materials, publications Add a Program climate-related activities or strategies How to use the LEDS toolkit The LEDS toolkit presented on this website provides information on available datasets, studies, tools, and other technical resources to support the LEDS process. The customized search boxes below allow a user to search tools and programs in relation to relevant questions, sector, geography, LEDS methodology stage, analytical needs, and other search terms. The country cloud to the right also allows a user to search easily for resources and programs in a specific country. The inventory of tools and programs is user-generated and we encourage users to upload and edit additional content using the "Are we missing something?" box to the right. ....[read more][show less]

56

Integrated: Geospatial Toolkit for Nicaragua from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

57

Integrated: Geospatial Toolkit for Bangladesh from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

58

Integrated: Geospatial Toolkit for Ghana from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

59

Integrated: Geospatial Toolkit for Brazil from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

60

Integrated: Geospatial Toolkit for Honduras from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Integrated: Geospatial Toolkit for Guatemala from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

62

LEDSGP/DIA-Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit < LEDSGP Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Building Climate-Resilient Low Emission Development Strategies The Development Impacts Assessment Toolkit helps country, regional, and local policymakers find tools and resources to assess the impacts of and links between national development priorities and low emission development strategies (LEDS). This toolkit equips decision makers with information to explore policy options and build consensus with stakeholders to achieve low-emission development that supports national development objectives.

63

LEDSGP/Transportation Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit < LEDSGP Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Developing Strategies for Clean, Efficient Transportation The Transportation Toolkit supports development planners, technical experts, and decision makers at national and local levels to plan and implement low-emission transportation systems that support economic growth. This toolkit helps users navigate a variety of resources to identify the most effective tools to build and implement low emission development strategies (LEDS) for the transport sector. Learn more in the report on

64

Building Energy Software Tools Directory: HVAC 1 Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

HVAC 1 Toolkit HVAC 1 Toolkit HVAC 1 Toolkit logo. The Toolkit for Primary HVAC System Energy Calculations is a collection of thirty-eight separate subroutines and corresponding documentation that describes algorithms for predicting the performance of HVAC components. The Toolkit documentation includes thorough descriptions of the component models and solution algorithms, detailed information on the structure of the individual FORTRAN 77 routines, as well as illustrative examples of system simulations with the Toolkit routines. The Toolkit serves two purposes: modules for large-scale simulation and stand-alone component performance prediction. The Toolkit components can also be used to calculate the energy performance of a component with a dedicated driver program to provide the necessary information flow to the Toolkit routines.

65

Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric | Open  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Agency/Company /Organization: United States Agency for International Development Sector: Energy Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_4/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric GCREhydro.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Hydroelectric&oldid=375082

66

TransportToolkit Prototype | Open Energy Information  

Open Energy Info (EERE)

TransportToolkit Prototype TransportToolkit Prototype Jump to: navigation, search Tool Summary Name: TransportToolkit Prototype Agency/Company /Organization: Nick Langle Complexity/Ease of Use: Not Available Cost: Free Related Tools Journal of Public Transportation Handbook for Handling, Storing, and Dispensing E85 Finalize Historic National Program to Reduce Greenhouse Gases and Improve Fuel Economy for Cars and Trucks ... further results Find Another Tool FIND TRANSPORTATION TOOLS This is a test tool to set values needed for Exhibit search results When to Use This Tool While building a low emission strategy for your country's transportation system, this tool is most useful during these key phases of the process: Evaluate System - Assessing the current transportation situation Create Baseline - Developing a business-as-usual scenario

67

MCT: Model Coupling Toolkit | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

MCT: Model Coupling Toolkit MCT: Model Coupling Toolkit MCT: Model Coupling Toolkit MCT is a set of open-source software tools for creating coupled models. MCT is fully parallel and can be used to couple message-passing parallel models to create a parallel coupled model. MCT is available as a small library and a set of Fortran90 modules. MCT provides model interoperability through a simple API. Two models that declare and use MCT datatypes can be coupled with a minimum of effort. MCT provides the following core coupling services: A component model registry Domain decomposition descriptors Communications schedulers for parallel MxN intercomponent data transfer and MxM intracomponent data redistribution A flexible and indexible (i.e., random-access) field data storage datatype A time averaging and accumulation buffer datatype

68

Category:Transportation Toolkits | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:Transportation Toolkits Jump to: navigation, search Add a new Transportation Toolkit Pages in category "Transportation Toolkits" The following 86 pages are in this category, out of 86 total. A A Report on Worldwide Hydrogen Bus Demonstrations, 2002-2007 A Review of HOV Lane Performance and Policy Options in the United States - Final Report A Roadmap to Funding Infrastructure Development Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Africa's Transport Infrastructure Mainstreaming Maintenance and Management

69

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

70

Probabilistic algebraic attacks  

Science Conference Proceedings (OSTI)

This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the ... Keywords: algebraic attack, algebraic immunity, annihilator, combination and filter generator, walsh spectrum

An Braeken; Bart Preneel

2005-12-01T23:59:59.000Z

71

Climate Change and Clean Energy Project (CEnergy) Toolkit | Open Energy  

Open Energy Info (EERE)

Climate Change and Clean Energy Project (CEnergy) Toolkit Climate Change and Clean Energy Project (CEnergy) Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Change and Clean Energy Project (CEnergy) Toolkit Agency/Company /Organization: Clean Air Asia, International Resources Group (IRG), United States Agency for International Development (USAID), Ministry of Planning Sector: Land Focus Area: Greenhouse Gas, People and Policy, Transportation Topics: Background analysis, Baseline projection, Co-benefits assessment, - Environmental and Biodiversity, GHG inventory, Low emission development planning, -LEDS, Pathways analysis, Policies/deployment programs Website: cleanairinitiative.org/portal/toolkitLGUs Country: Philippines UN Region: South-Eastern Asia References: CEnergy Toolkit[1]

72

LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Contact Us LEDSGP/Transportation Toolkit/Contact Us < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Contact Us) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Contacts for the LEDS GP Transport Working Group The Transportation Toolkit is provided by the Transport Working Group as part of the Low Emission Development Strategies (LEDS) Global Partnership. If you have questions or comments about this toolkit, . Remote Expert Assistance on LEDS The LEDS Global Partnership provides timely, high-quality, no-fee technical assistance on transportation issues as part of the Remote Expert Assistance on LEDS (REAL) service. Experts from institutions around the world are available to provide objective advice, conduct reviews and brief

73

Geospatial Toolkit (GsT) Webinar | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit (GsT) Webinar Geospatial Toolkit (GsT) Webinar Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Webinar Agency/Company /Organization: National Renewable Energy Laboratory, Centro de Energías Renovables (CER), United States Department of Energy Sector: Energy Topics: Resource assessment Resource Type: Maps, Software/modeling tools, Webinar, Training materials Website: en.openei.org/wiki/GsT Equivalent URI: cleanenergysolutions.org/content/geospatial-toolkit-gst Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance References: Geospatial Toolkit (GsT) Webinar[1] Logo: Geospatial Toolkit (GsT) Webinar This webinar provides an overview, and also demonstrates usage of the Geospatial Toolkit. Webinar Video

74

UNEP Toolkit for Clean Fleet Strategy Development | Open Energy Information  

Open Energy Info (EERE)

UNEP Toolkit for Clean Fleet Strategy Development UNEP Toolkit for Clean Fleet Strategy Development Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UNEP Toolkit for Clean Fleet Strategy Development Agency/Company /Organization: United Nations Environment Programme Sector: Energy Focus Area: Energy Efficiency, Renewable Energy, Transportation Topics: Implementation, Policies/deployment programs Website: www.unep.org/tnt-unep/toolkit/ UNEP Toolkit for Clean Fleet Strategy Development Screenshot References: UNEP Toolkit[1] Background "This Toolkit will help you develop a strategy for reducing the envrionmental impacts of your fleet. To develop your own fleet strategy you need to follow the steps below. Start with opening the Step by Step action plan on this homepage. The Tools will provide information and will allow

75

Seven Deadliest Network Attacks  

Science Conference Proceedings (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

2010-05-01T23:59:59.000Z

76

Waste Toolkit A-Z Battery recycling  

E-Print Network (OSTI)

Waste Toolkit A-Z Battery recycling How can I recycle batteries? The University Safety Office is responsible for arranging battery recycling for departments (see Contact at bottom of page). Colleges must make their own arrangements through a registered hazardous waste carrier. Batteries must not be put

Melham, Tom

77

Waste Toolkit A-Z Light bulbs  

E-Print Network (OSTI)

Waste Toolkit A-Z Light bulbs Can I recycle light bulbs? It depends what type of bulbs you have for the `hazardous' symbol on the packaging or on the light bulb (crossed out wheelie bin symbol). How can I recycle light bulbs? Standard filament bulbs Put in the waste bin (landfill waste) as these are not classified

Melham, Tom

78

ACE Learning Series - Adoption Toolkit | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

ACE Learning Series - Adoption Toolkit ACE Learning Series - Adoption Toolkit This toolkit was developed by the U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) for use by states, municipalities, energy code advocates, policymakers, stakeholders, and all other groups with a vested interest in energy code adoption. This toolkit provides information and resources to help guide adopting authorities through the adoption process and setting minimum requirements for new construction. This toolkit provides some insight into how the adoption process may influence the residential and commercial build communities. Publication Date: Saturday, September 1, 2012 AdoptionToolkit.pdf Document Details Document Number: PNNL-SA-89963 Prepared by: prepared by Pacific Northwest National Laboratory for the U.S. Department

79

WRI-The Governance of Forests Toolkit | Open Energy Information  

Open Energy Info (EERE)

WRI-The Governance of Forests Toolkit WRI-The Governance of Forests Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: WRI-The Governance of Forests Toolkit Agency/Company /Organization: World Resources Institute Sector: Land, Climate Focus Area: Forestry Resource Type: Publications Website: pdf.wri.org/working_papers/gfi_tenure_indicators_sep09.pdf Cost: Free WRI-The Governance of Forests Toolkit Screenshot References: WRI-The Governance of Forests Toolkit[1] "The Governance of Forests Initiative (GFI) seeks to bring widely accepted principles of good governance to bear on the challenges of sustaining forests in developing countries. GFI is a collaboration of the World Resources Institute, Imazon (Brazil) and the Instituto Centro de Vida (Brazil). This document presents the GFI Toolkit (Version 1) and outlines a process

80

MCT--The Model Coupling Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Model Coupling Toolkit Model Coupling Toolkit MCT is a set of open-source software tools for creating coupled models. MCT is fully parallel and can be used to couple message-passing parallel models to create a parallel coupled model. MCT is available as a small library and a set of Fortran90 modules. MCT provides model interoperability through a simple API. Two models that declare and use MCT datatypes can be coupled with a minimum of effort. MCT provides the following core coupling services: a component model registry domain decomposition descriptors communications schedulers for parallel MxN intercomponent data transfer and MxM intracomponent data redistribution a flexible and indexible (i.e., random-access) field data storage datatype a time averaging and accumulation buffer datatype

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Impact Assessment Toolkit Impact Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

82

Toolkit Definitions | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Compliance Regulations Resource Center Toolkit Definitions The following are definitions for common terms used within the adoption, compliance, and enforcement toolkits. Building code refers to a law or regulation used by state or local governments that establishes specifications for the design and construction of residential or commercial buildings. Building codes help ensure that new and existing residential and commercial structures meet minimum health, safety, and performance standards. In addition, building codes offer a baseline to which structures can be compared. Code adoption refers to the vehicle that establishes code requirements and their administration. Adoption can be mandatory, voluntary, or a combination of the two. The means of adoption vary with respect to the

83

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Impact Assessment Toolkit Impact Assessment Toolkit (Redirected from Gateway:International/Economic and Environmental Impacts) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

84

Land Use Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land Use Assessment Toolkit Land Use Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

85

Community Wind Toolkit | Open Energy Information  

Open Energy Info (EERE)

Wind Toolkit Wind Toolkit Jump to: navigation, search "Community wind" refers to a class of wind energy ownership structures. Projects are considered "community" projects when they are at least partially owned by individuals or businesses in the state and local area surrounding the wind power project. The community element of these projects can be defined narrowly so that ownership is concentrated in the county or region where the project is built, or it may be defined broadly so that project investors are from the state where the project is sited. Furthermore, the extent of local ownership may range from a small minority share to full ownership by persons in the immediate area surrounding the wind project site. Potential project owners include local farmers,

86

Bioenergy Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Bioenergy Assessment Toolkit Bioenergy Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

87

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

88

LEDSGP/Transportation Toolkit/Strategies | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Strategies) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low emissions transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand

89

Galvin Electricity Initiative Policy Toolkit | Open Energy Information  

Open Energy Info (EERE)

Initiative Policy Toolkit AgencyCompany Organization: The Galvin Project Inc. Sector: Energy Focus Area: People and Policy Phase: Determine Baseline, Evaluate Options, Develop...

90

NEAMS ToolKit: advanced computational tools for modeling & simulation...  

NLE Websites -- All DOE Office Websites (Extended Search)

NEAMS ToolKit: advanced computational tools for modeling & simulation of advanced reactor systems Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures &...

91

Integrated: Geospatial Toolkit GIS data for Bhutan from NREL...  

Open Energy Info (EERE)

that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

92

Integrated: Enhanced Geospatial Toolkit for Sri Lanka from NREL  

Open Energy Info (EERE)

to the GeoSpatial Toolkit (GsT) were funded by USAID's Southeast Asia Regional InitiativeEnergy (SARIE). These enhancements include additional functionality and data development...

93

Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL...  

Open Energy Info (EERE)

that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

94

Integrated: Geospatial Toolkit GIS data for India from NREL The...  

Open Energy Info (EERE)

that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

95

How ORISE is Making a Difference: Pandemic Flu Toolkits  

NLE Websites -- All DOE Office Websites (Extended Search)

to an influenza pandemic. The Pandemic Influenza Community Mitigation Measures and Business Continuity Planning Training toolkits support train-the-trainer workshops that...

96

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

Science Conference Proceedings (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

97

Introduction to side channel attacks and non invasive attacks  

Science Conference Proceedings (OSTI)

... FIPS conference side channel attacks and perturbation attacks 7 Pow er analysis Pow er leakage usec m A Instruction fetch Instruction processing ...

2007-09-21T23:59:59.000Z

98

Extending the resynchronization attack  

Science Conference Proceedings (OSTI)

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their ...

Frederik Armknecht; Joseph Lano; Bart Preneel

2004-08-01T23:59:59.000Z

99

Beware of BGP attacks  

Science Conference Proceedings (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

Ola Nordström; Constantinos Dovrolis

2004-04-01T23:59:59.000Z

100

Asian Co-benefits Partnership (ACP) Toolkit | Open Energy Information  

Open Energy Info (EERE)

Asian Co-benefits Partnership (ACP) Toolkit Asian Co-benefits Partnership (ACP) Toolkit Jump to: navigation, search Tool Summary Name: Asian Co-benefits Partnership (ACP) Toolkit Agency/Company /Organization: Asian Co-benefits Partnership (ACP) Topics: Low emission development planning, -LEDS Resource Type: Publications References: Asian Co-benefits Partnership (ACP)[1] ACP Rio+20[2] Logo: Asian Co-benefits Partnership (ACP) Toolkit Overview "The Asian Co-benefits Partnership (ACP) provides publications and information to help mainstream climate and developmental co-benefits into decision-making processes in Asia." The Tookit "offers recent publication from ACP member organizations on themes related to co-benefits and green growth." The most recent Toolkit, from ACP's participation in Rio+20, is available

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information  

Open Energy Info (EERE)

Hands-on Energy Adaptation Toolkit (HEAT) Hands-on Energy Adaptation Toolkit (HEAT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Hands-on Energy Adaptation Toolkit (HEAT) Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guide/manual Website: esmap.org/esmap/node/312 Hands-on Energy Adaptation Toolkit (HEAT) Screenshot References: HEAT[1] Background "HEAT- A Hands-on Energy Adaptation Toolkit is designed to lead you through as assessment of climate vulnerabilities and adaptation options in the energy sector of your country. HEAT can help you raise awareness among key stakeholders and initiate dialogue on energy sector adaptation.

102

Category:Wind Working Group Toolkit | Open Energy Information  

Open Energy Info (EERE)

Wind Working Group Toolkit Wind Working Group Toolkit Jump to: navigation, search In 1999, the U.S. Department of Energy (DOE) launched the Wind Powering America (WPA) initiative to educate, engage, and enable critical stakeholders to make informed decisions about how wind energy contributes to the U.S. electricity supply. State Wind Working Groups used Wind Powering America's State Wind Working Group Handbook to serve their states, in conjunction with their own methods and outreach materials. This updated wiki-based Wind Working Group Toolkit provides links to information, methods, and resources. This wiki is a work in progress, and we welcome your contributions. See the Wind Working Group Toolkit home page for an outline of topics. Pages in category "Wind Working Group Toolkit"

103

LEDSGP/DIA-Toolkit/Uses | Open Energy Information  

Open Energy Info (EERE)

Uses Uses < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Ways to Use the Development Impacts Assessment Toolkit The Development Impacts Assessment (DIA) Toolkit offers a structured way to consider the impact of proposed low emission development strategies (LEDS) on other national or local priorities, and provides links to resources for conducting development impacts analysis. DIA can help in identifying impacts (which may be positive or negative), the extent of the impact, who is impacted, and the timeframe of the impact. DIA supports country efforts to reach development goals articulated in LEDS and elsewhere. Explore the DIA Concept This toolkit provides information on what is meant by DIA and how to

104

NYSERDA-Wind Energy Toolkit | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » NYSERDA-Wind Energy Toolkit Jump to: navigation, search Tool Summary Name: NYSERDA-Wind Energy Toolkit Agency/Company /Organization: New York State Energy Research and Development Authority Sector: Energy Focus Area: Renewable Energy, Wind Topics: Resource assessment, Technology characterizations Website: www.powernaturally.org/Programs/Wind/Wind%20Energy%20Toolkit.pdf Cost: Free NYSERDA-Wind Energy Toolkit Screenshot References: NYSERDA[1] "The Wind Energy Toolkit was developed for the New York State Energy Research & Development Authority (NYSERDA) by AWS Truewind, LLC, to provide

105

Transportation Assessment Toolkit/Home | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Transportation Assessment Toolkit/Home < Transportation Assessment Toolkit Jump to: navigation, search Home Transport Topics Ask an Expert Training Contact us What are the key actions necessary to implementing a transportation system LEDS? Action 1: Evaluate the existing transport system Action 2: Develop BAU scenario Action 3: Assess opportunities Avoid-Shift-Improve framework of strategies Action 4: Develop alternative scenarios Action 5: Prioritize and plan Action 6: Implement and monitor Transportation Assessment Toolkit Train licensed.png Transportation Assessment Toolkit Information licensed.png Transportation Assessment Toolkit Learning licensed.png

106

ACE Learning Series - Enforcement Toolkit | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Toolkit Enforcement Toolkit The U.S. Department of Energy's (DOE's) Building Energy Codes Program (BECP) developed this toolkit to help the enforcement community achieve higher levels of compliance with building energy codes. Although this toolkit is not intended for use by designers, developers, home owners or renters, building owners, or building operators, it may provide those individuals some insight into the issues facing the enforcement community. Publication Date: Saturday, September 1, 2012 EnforcementToolkit.pdf Document Details Document Number: PNNL-SA-90467 Prepared by: prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy Building Energy Codes Program Focus: Enforcement Document type: Other Target Audience: Advocate Architect/Designer

107

Online Toolkit Fosters Bioenergy Innovation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Toolkit Fosters Bioenergy Innovation Toolkit Fosters Bioenergy Innovation Online Toolkit Fosters Bioenergy Innovation January 21, 2011 - 2:27pm Addthis Learn more about the Bioenergy Knowledge Discovery Framework, an online data sharing and mapping toolkit. Paul Bryan Biomass Program Manager, Office of Energy Efficiency & Renewable Energy What will the project do? The $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a facility that will nearly triple the amount of renewable diesel produced domestically. The online data sharing and mapping toolkit provides the extensive data, analysis, and visualization tools to monitor the bioenergy industry. Yesterday, Secretary Chu announced a $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a

108

LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy Information  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Strategies/Avoid LEDSGP/Transportation Toolkit/Strategies/Avoid < LEDSGP‎ | Transportation Toolkit‎ | Strategies(Redirected from Transportation Toolkit/Strategies/Avoid) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg Avoid trips taken and reduce travel demand by integrating land use planning, transport infrastructure planning, and transport demand

109

Graph algorithms in the titan toolkit.  

Science Conference Proceedings (OSTI)

Graph algorithms are a key component in a wide variety of intelligence analysis activities. The Graph-Based Informatics for Non-Proliferation and Counter-Terrorism project addresses the critical need of making these graph algorithms accessible to Sandia analysts in a manner that is both intuitive and effective. Specifically we describe the design and implementation of an open source toolkit for doing graph analysis, informatics, and visualization that provides Sandia with novel analysis capability for non-proliferation and counter-terrorism.

McLendon, William Clarence, III; Wylie, Brian Neil

2009-10-01T23:59:59.000Z

110

An Incident Management Preparedness and Coordination Toolkit  

Science Conference Proceedings (OSTI)

Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

Koch, Daniel B [ORNL; Payne, Patricia W [ORNL

2012-01-01T23:59:59.000Z

111

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

112

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

113

ParCAT: Parallel Climate Analysis Toolkit  

SciTech Connect

Climate science is employing increasingly complex models and simulations to analyze the past and predict the future of Earth s climate. This growth in complexity is creating a widening gap between the data being produced and the ability to analyze the datasets. Parallel computing tools are necessary to analyze, compare, and interpret the simulation data. The Parallel Climate Analysis Toolkit (ParCAT) provides basic tools to efficiently use parallel computing techniques to make analysis of these datasets manageable. The toolkit provides the ability to compute spatio-temporal means, differences between runs or differences between averages of runs, and histograms of the values in a data set. ParCAT is implemented as a command-line utility written in C. This allows for easy integration in other tools and allows for use in scripts. This also makes it possible to run ParCAT on many platforms from laptops to supercomputers. ParCAT outputs NetCDF files so it is compatible with existing utilities such as Panoply and UV-CDAT. This paper describes ParCAT and presents results from some example runs on the Titan system at ORNL.

Smith, Brian E [ORNL; Steed, Chad A [ORNL; Shipman, Galen M [ORNL; Ricciuto, Daniel M [ORNL; Thornton, Peter E [ORNL; Wehner, Michael [Lawrence Berkeley National Laboratory (LBNL); Williams, Dean N. [Lawrence Livermore National Laboratory (LLNL)

2013-01-01T23:59:59.000Z

114

Applications toolkit for accelerator control and analysis  

SciTech Connect

The Advanced Photon Source (APS) has taken a unique approach to creating high-level software applications for accelerator operation and analysis. The approach is based on self-describing data, modular program toolkits, and scripts. Self-describing data provide a communication standard that aids the creation of modular program toolkits by allowing compliant programs to be used in essentially arbitrary combinations. These modular programs can be used as part of an arbitrary number of high-level applications. At APS, a group of about 70 data analysis, manipulation, and display tools is used in concert with about 20 control-system-specific tools to implement applications for commissioning and operations. High-level applications are created using scripts, which are relatively simple interpreted programs. The Tcl/Tk script language is used, allowing creating of graphical user interfaces (GUIs) and a library of algorithms that are separate from the interface. This last factor allows greater automation of control by making it easy to take the human out of the loop. Applications of this methodology to operational tasks such as orbit correction, configuration management, and data review will be discussed.

Borland, M. [Argonne National Lab., IL (United States). Advanced Photon Source

1997-06-01T23:59:59.000Z

115

The Best Ever Alarm System Toolkit  

SciTech Connect

Learning from our experience with the standard Experimental Physics and Industrial Control System (EPICS) alarm handler (ALH) as well as a similar intermediate approach based on script-generated operator screens, we developed the Best Ever Alarm System Toolkit (BEAST). It is based on Java and Eclipse on the Control System Studio (CSS) platform, using a relational database (RDB) to store the configuration and log actions. It employs a Java Message Service (JMS) for communication between the modular pieces of the toolkit, which include an Alarm Server to maintain the current alarm state, an arbitrary number of Alarm Client user interfaces (GUI), and tools to annunciate alarms or log alarm related actions. Web reports allow us to monitor the alarm system performance and spot deficiencies in the alarm configuration. The Alarm Client GUI not only gives the end users various ways to view alarms in tree and table, but also makes it easy to access the guidance information, the related operator displays and other CSS tools. It also allows online configuration to be simply modified from the GUI. Coupled with a good "alarm philosophy" on how to provide useful alarms, we can finally improve the configuration to achieve an effective alarm system.

Kasemir, Kay [ORNL; Chen, Xihui [ORNL; Danilova, Katia [ORNL

2009-01-01T23:59:59.000Z

116

Transport Activity Measurement Toolkit (TAMT) | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Transport Activity Measurement Toolkit (TAMT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transport Activity Measurement Toolkit (TAMT) Agency/Company /Organization: World Bank Sector: Energy Focus Area: Transportation Topics: GHG inventory, Low emission development planning Resource Type: Dataset, Maps, Software/modeling tools, Video, Training materials User Interface: Website, Desktop Application Website: code.google.com/p/tamt/ Cost: Free Transport Activity Measurement Toolkit (TAMT) Screenshot References: TAMT Presentation[1] TAMT Google Site Page[2] TAMT Demonstration Videos[3] "The World Bank Latin America and the Caribbean Region Sustainable Development Department Transport Cluster in conjunction with the World

117

DOE Hydrogen Analysis Repository: Powertrain Systems Analysis Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Powertrain Systems Analysis Toolkit (PSAT) Powertrain Systems Analysis Toolkit (PSAT) Project Summary Full Title: Powertrain Systems Analysis Toolkit (PSAT) Project ID: 122 Principal Investigator: Aymeric Rousseau Brief Description: PSAT is a forward-looking model that simulates fuel economy and performance in a realistic manner -- taking into account transient behavior and control system characteristics. It can simulate an unrivaled number of predefined configurations (conventional, electric, fuel cell, series hybrid, parallel hybrid, and power split hybrid). Keywords: Hybrid electric vehicles (HEV); fuel cell vehicles (FCV); vehicle characteristics Purpose Simulate performance and fuel economy of advanced vehicles to support U.S. DOE R&D activities Performer Principal Investigator: Aymeric Rousseau

118

LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Improve < LEDSGP‎ | Transportation Toolkit‎ | Strategies(Redirected from Transportation Toolkit/Strategies/Improve) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and

119

LEDS Toolkit and Framework | Open Energy Information  

Open Energy Info (EERE)

LEDS Toolkit and Framework LEDS Toolkit and Framework Jump to: navigation, search Tool Summary LAUNCH TOOL Name: LEDS Toolkit and Methodology Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy, Land, Water, Climate Topics: Low emission development planning Resource Type: Dataset User Interface: Website, Desktop Application Website: en.openei.org/apps/LEDS/ Cost: Free UN Region: Central Asia, Eastern Asia, South-Eastern Asia, "Pacific" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Latin America and Caribbean" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western Asia & North Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., Northern America, "South Asia" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Sub-Saharan Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western & Eastern Europe" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

120

GPS software attacks  

Science Conference Proceedings (OSTI)

Since its creation, the Global Positioning System (GPS) has grown from a limited purpose positioning system to a ubiquitous trusted source for positioning, navigation, and timing data. To date, researchers have essentially taken a signal processing approach ... Keywords: gps, rf attacks, security

Tyler Nighswander; Brent Ledvina; Jonathan Diamond; Robert Brumley; David Brumley

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Impact Assessment Toolkit Jump to: navigation, search Economic Community of West African States (ECOWAS) Clean Energy Gateway Home | About | News | Links | Help | Countries Benin | Burkina Faso | Cape Verde | Gambia | Ghana | Guinea| Guinea-Bissau | Ivory Coast | Liberia | Mali | Niger | Nigeria | Senegal | Sierra Leone | Togo Countries ECREEE light.JPG FBenin.png FBurkinaFaso.png FCapeVerde.png FGambia.png FGhana.png FGuinea.png FGuinea-Bissau.png Benin Burkina Faso Cape Verde Gambia Ghana Guinea Guinea-Bissau FIvoryCoast.png FLiberia.png FMali.png FNiger.png FNigeria.png FSenegal.png FSierraLeone.png FTogo.png

122

Financing Initiatives Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Financing Initiatives Toolkit (Redirected from Gateway:International/Financing Options) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and

123

Building Energy Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Building Energy Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

124

A Cosmology Forecast Toolkit -- CosmoLib  

E-Print Network (OSTI)

The package CosmoLib is a combination of a cosmological Boltzmann code and a simulation toolkit to forecast the constraints on cosmological parameters from future observations. In this paper we describe the released linear-order part of the package. We discuss the stability and performance of the Boltzmann code. This is written in Newtonian gauge and including dark energy perturbations. In CosmoLib the integrator that computes the CMB angular power spectrum is optimized for a $\\ell$-by-$\\ell$ brute-force integration, which is useful for studying inflationary models predicting sharp features in the primordial power spectrum of metric fluctuations. The numerical code and its documentation are available at http://www.cita.utoronto.ca/~zqhuang/CosmoLib.

Zhiqi Huang

2012-01-28T23:59:59.000Z

125

Introduction to the Geant4 Simulation toolkit  

SciTech Connect

Geant4 is a Monte Carlo simulation Toolkit, describing the interactions of particles with matter. Geant4 is widely used in radiation physics research, from High Energy Physics, to medical physics and space science, thanks to its sophisticated physics component, coupled with advanced functionality in geometry description. Geant4 is widely used at the Centre for Medical Radiation Physics (CMRP), at the University of Wollongong, to characterise and optimise novel detector concepts, radiotherapy treatments, and imaging solutions. This lecture consists of an introduction to Monte Carlo method, and to Geant4. Particular attention will be devoted to the Geant4 physics component, and to the physics models describing electromagnetic and hadronic physics interactions. The second part of the lecture will be focused on the methodology to adopt to develop a Geant4 simulation application.

Guatelli, S.; Cutajar, D.; Rosenfeld, A. B. [Centre for Medical Radiation Physics (CMRP), University of Wollongong, Northfields Avenue, Wollongong, NSW, 2522 (Australia); Oborn, B. [Ilawarra Cancer Care Centre (ICCC), Wollongong Hospital, Crown Street, Wollongong, NSW, 2500 (Australia); Centre for Medical Radiation Physics (CMRP), University of Wollongong, Northfields Avenue, Wollongong, NSW, 2522 (Australia)

2011-05-05T23:59:59.000Z

126

RAPID toolkit/FAQ | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » RAPID toolkit/FAQ Jump to: navigation, search Rapid selected.png RAPIDtoolkit About FAQ Contact Us Presentations Outreach Get Involved Tools Frequently Asked Questions What does RAPID offer? The RAPID web site provides tools to aid in the permitting of renewable energy and bulk transmission projects. RAPID covers federal and state regulations for selected states. Additional states and technologies are continuously being added, so check back for new information. Does RAPID address bills that have not been enacted or regulations that have not been fully approved? No. How is RAPID maintained?

127

Transportation Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Transportation Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

128

Financing Initiatives Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Financing Initiatives Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

129

ACE Learning Series - Compliance Toolkit | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Toolkit Compliance Toolkit The compliance toolkit describes the steps that should be taken by the build community to make sure that their buildings meet the requirements of the energy codes in effect where the buildings are being built and that the building designs are well documented so that the enforcement community can quickly and easily determine if the building meets the requirement of the energy code. This toolkit describes the steps that should be taken by the build community to make sure that their buildings meet the requirements of the energy codes in effect where the buildings are being built and that the building designs are well documented so that the enforcement community can quickly and easily determine if the building meets the requirement of the

130

Clean Air-Cool Planet Community Toolkit | Open Energy Information  

Open Energy Info (EERE)

Clean Air-Cool Planet Community Toolkit Clean Air-Cool Planet Community Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Clean Air-Cool Planet Community Toolkit Agency/Company /Organization: Clean Air-Cool Planet Partner: Jeffrey H. Taylor and Associates Inc. Sector: Climate Focus Area: Energy Efficiency, Buildings, - Landfill Gas, - Waste to Energy, - Solar PV, Wind, Transportation, Agriculture, People and Policy, Food Supply, - Materials, Offsets and Certificates, Greenhouse Gas Phase: Bring the Right People Together, Determine Baseline, Get Feedback, Develop Finance and Implement Projects, Create Early Successes Resource Type: Guide/manual, Case studies/examples, Templates User Interface: Website Website: www.cleanair-coolplanet.org/for_communities/toolkit_home.php

131

LEDSGP/Transportation Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Tools < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Tools) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Tools for Low Emission Development Strategies in Transportation Use one of the search methods below to find tools for building sustainable, low emission development strategies (LEDS) for your country's transportation system. These resources focus on strategies to limit air pollutants and greenhouse gas emissions. Learn more in the report on LEDS for transportation. If you are aware of a relevant technical resource not

132

LEDSGP/Transportation Toolkit/Strategies | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

133

Integrated: Geospatial Toolkit for El Salvador from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

134

Integrated: Geospatial Toolkit for Sri Lanka from NREL  

Open Energy Info (EERE)

and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

135

The HAPTICTOUCH Toolkit: Enabling Exploration of Haptic Interactions  

E-Print Network (OSTI)

called the Haptic Tabletop Puck (or HTP) [14]. It uses inexpensive do-it-yourself (DIY) hardware and low downloadable toolkit that simplifies haptic programming on a DIY platform (the HTP platform); a series

Greenberg, Saul

136

Enterprise modeling and analysis: an enterprise modeling and analysis toolkit  

Science Conference Proceedings (OSTI)

A fully integrated modeling and analysis toolkit, which facilitates multi-perspective knowledge capturing, sharing and reusing, is necessary for today's enterprises to meet the challenges of the ever more competitive global marketplace. In this paper ...

Dursun Delen; Perakath C. Benjamin

2000-12-01T23:59:59.000Z

137

WPT: a toolkit for publishing a web-based lifelog  

Science Conference Proceedings (OSTI)

This paper describes a toolkit for implementing lifelog applications that automatically generate web-based reports about daily lives from sensor data such as GPS data, acceleration data, and camera images that capture our daily activities. To design ...

Takuya Maekawa; Yasue Kishino; Yutaka Yanagisawa; Yasushi Sakurai

2011-09-01T23:59:59.000Z

138

Afghanistan-NREL Resource Maps and Toolkits | Open Energy Information  

Open Energy Info (EERE)

Afghanistan-NREL Resource Maps and Toolkits Afghanistan-NREL Resource Maps and Toolkits Jump to: navigation, search Logo: Afghanistan Resources Maps and Toolkits Name Afghanistan Resources Maps and Toolkits Agency/Company /Organization National Renewable Energy Laboratory Sector Energy Focus Area Solar, Wind Topics Resource assessment, Background analysis Resource Type Dataset, Maps, Software/modeling tools Website http://www.nrel.gov/internatio Country Afghanistan Southern Asia References NREL International Activities Website [1] Abstract NREL partnered with Afghanistan to develop high-resolution wind and solar resource maps and data products for Afghanistan. NREL partnered with Afghanistan to develop high-resolution wind and solar resource maps and data products for Afghanistan. The data were output in

139

Guidelines and Toolkits for Urban Transport Development in Medium Sized  

Open Energy Info (EERE)

Guidelines and Toolkits for Urban Transport Development in Medium Sized Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Jump to: navigation, search Tool Summary Name: Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Agency/Company /Organization: Asian Development Bank Focus Area: Governance - Planning - Decision-Making Structure Topics: Best Practices Complexity/Ease of Use: Not Available Website: sti-india-uttoolkit.adb.org/ Transport Toolkit Region(s): Asia Related Tools Promoting Clean Cars: Case Study of Stockholm and Sweden MOtor Vehicle Emission Simulator (MOVES) The World Bank - Transport ... further results Find Another Tool FIND TRANSPORTATION TOOLS This resource is designed to help decision makers and practitioners in states and municipal governments who are concerned with urban transport

140

LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information  

Open Energy Info (EERE)

Contact Us Contact Us < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Contacts for the LEDS GP Transport Working Group If you have questions or comments about the Transportation Toolkit, . Powered by OpenEI ledsgp.org is built on the same platform as the popular Wikipedia site. Like Wikipedia, it is a "wiki" or website developed collaboratively by a community of users. Thanks to our unique relationship with OpenEI.org, you can add or edit most content on ledsgp.org. For more information about this unique collaboration, contact us. View or edit this page on OpenEI.org. Retrieved from "http://en.openei.org/w/index.php?title=LEDSGP/Transportation_Toolkit/Contact_Us&oldid=690462

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Property:TransportToolkit/Regions | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:TransportToolkit/Regions Jump to: navigation, search Property Name TransportToolkit/Regions Property Type String Description Transport Toolkit property to help filter pages Valid values are Africa & Middle East, Asia, Australia & North America, Europe, Latin America & Caribbean and Global Used in Form/Template Tool Allows Values Africa & Middle East;Asia;Australia & North America;Europe;Latin America & Caribbean;Global Pages using the property "TransportToolkit/Regions" Showing 6 pages using this property. A Africa's Transport Infrastructure Mainstreaming Maintenance and Management + Africa & Middle East + Assessment of the type of cycling infrastructure required to attract new cyclists + Australia & North America +

142

Partial Evaluation for Scientific Computing: The Supercomputer Toolkit Experience  

E-Print Network (OSTI)

We describe the key role played by partial evaluation in the Supercomputer Toolkit, a parallel computing system for scientific applications that effectively exploits the vast amount of parallelism exposed by partial ...

Berlin, Andrew

1994-05-01T23:59:59.000Z

143

Banshee: a scalable constraint-based analysis toolkit  

Science Conference Proceedings (OSTI)

We introduce Banshee, a toolkit for constructing constraint-based analyses. Banshee's novel features include a code generator for creating customized constraint resolution engines, incremental analysis based on backtracking, and fast persistence. ...

John Kodumal; Alex Aiken

2005-09-01T23:59:59.000Z

144

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

145

World Bank Renewable Energy Toolkit | Open Energy Information  

Open Energy Info (EERE)

World Bank Renewable Energy Toolkit World Bank Renewable Energy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: World Bank Renewable Energy Toolkit Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy, Solar, Wind Topics: Finance, Implementation, Market analysis, Policies/deployment programs, Resource assessment, Pathways analysis Resource Type: Publications, Guide/manual, Training materials, Lessons learned/best practices Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: World Bank RE Toolkit Homepage [1] The Word Bank's REToolKit is designed "to assist Bank staff and country counterparts to improve the design and implementation of renewable energy (RE) projects, incorporates best practices and lessons learned from RE

146

Distributed Renewable Energy Finance and Policy Toolkit | Open Energy  

Open Energy Info (EERE)

Distributed Renewable Energy Finance and Policy Toolkit Distributed Renewable Energy Finance and Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Renewable Energy Finance and Policy Toolkit Agency/Company /Organization: Clean Energy States Alliance (CESA) Partner: Charles Kubert and Mark Sinclair Sector: Energy Focus Area: People and Policy, Economic Development Phase: Evaluate Options, Develop Goals, Develop Finance and Implement Projects Topics: Best Practices Resource Type: Guide/manual User Interface: Other Website: www.cleanenergystates.org/Publications/cesa-financial_Toolkit_Dec2009. Cost: Free Equivalent URI: cleanenergysolutions.org/content/distributed-renewable-energy-finance- Language: English Policies: "Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

147

LEDSGP/Transportation Toolkit/Training | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Training < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Training) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Training for Low Emission Development Strategies in Transportation The LEDS GP Transport Working Group provides technical training and resources in the form of webinars, e-learning, live/recorded presentation videos, presentation files, and other knowledge exchange formats relevant to low emission development strategies in the transport sector. Below are

148

Clean Cities: IdleBox Toolkit for Idle-Reduction Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

IdleBox Toolkit for Idle-Reduction IdleBox Toolkit for Idle-Reduction Projects to someone by E-mail Share Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Facebook Tweet about Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Twitter Bookmark Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Google Bookmark Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Delicious Rank Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Digg Find More places to share Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on AddThis.com... Coordinator Basics Outreach Logos, Graphics, & Photographs Print Products & Templates Exhibit Booths Presentations Videos QR Codes Tips Education & Webinars Meetings Reporting Contacts IdleBox Toolkit for Idle-Reduction Projects

149

Integrating software specifications into intrusion detection  

Science Conference Proceedings (OSTI)

There exist a number of Intrusion Detection Systems (IDSs) that detect computer attacks based on some defined attack scenarios. The attack scenarios or security requirements in some of these IDSs are specified in attack specification languages that are ... Keywords: Attack scenarios, Intrusion detection, Software specification languages, State machines

Mohammad Zulkernine; Mathews Graves; Muhammad Umair Ahmed Khan

2007-08-01T23:59:59.000Z

150

Security Assessment Simulation Toolkit (SAST) Final Report  

Science Conference Proceedings (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

151

Beware of BGP Attacks  

E-Print Network (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.

Ola Nordström; Constantinos Dovrolis

2004-01-01T23:59:59.000Z

152

Grid-Connected Renewable Energy Generation Toolkit-Solar | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Solar Grid-Connected Renewable Energy Generation Toolkit-Solar Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Solar Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Solar Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_5/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Solar Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Solar[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Solar GCREsolar.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Solar" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Solar&oldid=375083

153

Grid-Connected Renewable Energy Generation Toolkit-Wind | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Wind Grid-Connected Renewable Energy Generation Toolkit-Wind Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Wind Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Wind Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_6/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Wind Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Wind[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Wind GCREwind.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Wind" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Wind&oldid=375084"

154

The self-describing data sets file protocol and Toolkit  

SciTech Connect

The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user`s preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI.

Borland, M.; Emery, L.

1995-12-31T23:59:59.000Z

155

LEDSGP/Transportation Toolkit/Training | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Training < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Training for Low Emission Development Strategies in Transportation The LEDS GP Transport Working Group provides technical training and resources in the form of webinars, e-learning, live/recorded presentation videos, presentation files, and other knowledge exchange formats relevant to low emission development strategies in the transport sector. Below are links to relevant online training/learning sites. To suggest additional

156

LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Improve < LEDSGP‎ | Transportation Toolkit‎ | Strategies Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low emissions transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

157

Integrated: Geospatial Toolkit for Bangladesh from NREL | OpenEI  

Open Energy Info (EERE)

Bangladesh from NREL Bangladesh from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

158

Cosmological toolkit project featured on DOE energy website | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Cosmological toolkit project featured on DOE energy website Cosmological toolkit project featured on DOE energy website October 2, 2013 Tweet EmailPrint Researchers from Argonne National Laboratory, in partnership with Fermilab and Lawrence Berkeley National Laboratory, are developing a state-of-the-art toolkit for analyzing cosmological simulation data. The work was recently featured on the DOE website Energy.gov. Leading the Argonne team are Salman Habib, senior physicist and computational scientist in Argonne's High Energy Physics and Mathematics and Computer Science Divisions, and Ravi Madduri, project manager in the MCS Division. The multilaboratory team seeks to create an open platform with a web-based front end that will allow scientists to transfer, search, and analyze the complex data being generated by galaxy-formation simulations. Key to this

159

Integrated: Geospatial Toolkit for Honduras from NREL | OpenEI  

Open Energy Info (EERE)

Honduras from NREL Honduras from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

160

LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Avoid < LEDSGP‎ | Transportation Toolkit‎ | Strategies Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Integrated: Geospatial Toolkit for Guatemala from NREL | OpenEI  

Open Energy Info (EERE)

Guatemala from NREL Guatemala from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

162

Building Energy Codes ENFORCEMENT TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

NLE Websites -- All DOE Office Websites (Extended Search)

ENFORCEMENT TOOLKIT ENFORCEMENT TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES i Building Energy Codes ENFORCEMENT TOOLKIT Prepared by: Building Energy Codes Program The U.S. Department of Energy's Building Energy Codes Program is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-90467 LEARNING SERIES OVERVIEW Building Energy Codes ACE

163

Service and product provider's marketing toolkit | ENERGY STAR Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Service and product provider's marketing toolkit Service and product provider's marketing toolkit Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section How can ENERGY STAR help your business? Get started Join ENERGY STAR as a partner ENERGY STAR service & product provider training series Service and product provider's marketing toolkit Industry initiatives ENERGY STAR sales tools for service and product providers

164

Building Energy Codes COMPLIANCE TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

NLE Websites -- All DOE Office Websites (Extended Search)

COMPLIANCE TOOLKIT COMPLIANCE TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES III Building Energy Codes COMPLIANCE TOOLKIT Prepared by: Building Energy Codes Program (BECP) The U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-90466 LEARNING SERIES OVERVIEW Building Energy Codes

165

Integrated: Geospatial Toolkit for Ghana from NREL | OpenEI  

Open Energy Info (EERE)

Ghana from NREL Ghana from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

166

Category:LEDSGP Development Impacts Assessment Toolkits | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:LEDSGP Development Impacts Assessment Toolkits Jump to: navigation, search Development Impacts Assessment Tools help country, regional, and local policymakers find tools and online resources to assess the impacts of low-emission development strategies (LEDS). These tools equip decision makers with information to explore policy options and build consensus with stakeholders to acheive low-emission development. LEDSGP/DIA-Toolkit Pages in category "LEDSGP Development Impacts Assessment Toolkits" The following 65 pages are in this category, out of 65 total.

167

Building Energy Codes ADOPTION TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

NLE Websites -- All DOE Office Websites (Extended Search)

ADOPTION TOOLKIT ADOPTION TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES I Building Energy Codes ADOPTION TOOLKIT Prepared by: Building Energy Codes Program (BECP) The U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-89963 LEARNING SERIES OVERVIEW Building Energy Codes

168

Integrated: Geospatial Toolkit for Nicaragua from NREL | OpenEI  

Open Energy Info (EERE)

Nicaragua from NREL Nicaragua from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

169

LEDSGP/DIA-Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit/Tools < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Tools for Assessing the Impacts of Low-Emission Development Use one of the search methods below to find tools for assessing the impacts of low emission development strategies (LEDS) on country development goals. These resources focus on strategies to reduce poverty, improve health and local environment quality, improve energy and water access, facilitate gender equity, and address other development priorities. If you are aware

170

LEDSGP/DIA-Toolkit/Factors | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit/Factors < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Development Impacts Assessment Dia goals actions.png Governments set national goals and priorities-social, economic, and environmental-that establish the context for government policies and programs. At the same time, many countries have defined low emission development strategies (LEDS) as a guiding framework for development. The purpose of development impacts assessment (DIA) is to identify and assess the impacts, including both positive impacts (e.g., improved air or

171

Integrated: Geospatial Toolkit for Brazil from NREL | OpenEI  

Open Energy Info (EERE)

Brazil from NREL Brazil from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

172

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

173

LEDSGP/Transportation Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

Tools Tools < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Tools for Low-Emission Development Strategies in Transportation Use one of the search methods below to find tools for building sustainable, low-emission development strategies (LEDS) for your country's transportation system. These resources focus on strategies to limit air pollutants and greenhouse gas emissions. Learn more in the report on LEDS for transportation. Search Method: Category Keyword Choose one or more items from the following categories. Key Actions Implement & Monitor Evaluate System Create Baseline Assess Opportunities Develop Alternatives Prioritize & plan Strategies Resource Types Topics Regions Powered by OpenEI

174

Vermont -- A Versatile Monitoring Toolkit for IPFIX and PSAMP  

E-Print Network (OSTI)

In this paper, we present Vermont, a flexible network monitoring toolkit for packet filtering and packet sampling, flow accounting, and flow aggregation. This toolkit supports the export and collection of IPFIX/PSAMP compliant monitoring data. Packet capturing is based on the well-known pcap library, which enables deployment on various hardware platforms and operating systems. Apart from an overview to Vermont's architecture, we present evaluation results with regard to performance, interoperability, and robustness. Furthermore, we compare Vermont to other open-source implementations of monitoring probes with respect to supported features and functionality.

Ronny T. Lampert; Christoph Sommer; Gerhard Münz; Falko Dressler

2006-01-01T23:59:59.000Z

175

Metrics for Assessment of Smart Grid Data Integrity Attacks  

Science Conference Proceedings (OSTI)

There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

176

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

177

Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL | OpenEI  

Open Energy Info (EERE)

Oaxaca from NREL Oaxaca from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

178

Integrated: Geospatial Toolkit GIS data for Bhutan from NREL | OpenEI  

Open Energy Info (EERE)

Bhutan from NREL Bhutan from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

179

Grid-Connected Renewable Energy Generation Toolkit-Biomass | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Biomass Grid-Connected Renewable Energy Generation Toolkit-Biomass Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Grid-Connected Renewable Energy Generation Toolkit-Biomass Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Biomass Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_2/index.shtml#update Grid-Connected Renewable Energy Generation Toolkit-Biomass Screenshot References: Grid-Connected Renewable Energy-Biomass[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Biomass Biomass Toolkit References ↑ "Grid-Connected Renewable Energy-Biomass" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Biomass&oldid=375080

180

Integrated: Geospatial Toolkit GIS data for India from NREL | OpenEI  

Open Energy Info (EERE)

India from NREL India from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Information Toolkit for post-2012 climate policies | Open Energy  

Open Energy Info (EERE)

Information Toolkit for post-2012 climate policies Information Toolkit for post-2012 climate policies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Information Toolkit for post-2012 climate policies Agency/Company /Organization: Energy Research Centre of the Netherlands Partner: Brinkman Climate Change Sector: Energy Topics: Co-benefits assessment, Policies/deployment programs, Pathways analysis Resource Type: Dataset, Software/modeling tools Website: www.brinkmanclimatechange.com/Toolkit.htm Coordinates: 31.9524799°, -102.1732882° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":31.9524799,"lon":-102.1732882,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

182

Capturing and Using Knowledge about the Use of Visualization Toolkits  

Science Conference Proceedings (OSTI)

When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

2012-11-02T23:59:59.000Z

183

GMH: A Message Passing Toolkit for GPU Clusters  

Science Conference Proceedings (OSTI)

Driven by the market demand for high-definition 3D graphics, commodity graphics processing units (GPUs) have evolved into highly parallel, multi-threaded, many-core processors, which are ideal for data parallel computing. Many applications have been ported to run on a single GPU with tremendous speedups using general C-style programming languages such as CUDA. However, large applications require multiple GPUs and demand explicit message passing. This paper presents a message passing toolkit, called GMH (GPU Message Handler), on NVIDIA GPUs. This toolkit utilizes a data-parallel thread group as a way to map multiple GPUs on a single host to an MPI rank, and introduces a notion of virtual GPUs as a way to bind a thread to a GPU automatically. This toolkit provides high performance MPI style point-to-point and collective communication, but more importantly, facilitates event-driven APIs to allow an application to be managed and executed by the toolkit at runtime.

Jie Chen, W. Watson, Weizhen Mao

2011-01-01T23:59:59.000Z

184

Toolkit for Public-Private Partnerships in Roads and Highways | Open Energy  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » Toolkit for Public-Private Partnerships in Roads and Highways Jump to: navigation, search Tool Summary Name: Toolkit for Public-Private Partnerships in Roads and Highways Agency/Company /Organization: World Bank Sector: Energy Focus Area: Transportation Resource Type: Guide/manual User Interface: Website Website: www.ppiaf.org/ppiaf/sites/ppiaf.org/files/documents/toolkits/highwayst Cost: Free Toolkit for Public-Private Partnerships in Roads and Highways Screenshot References: Toolkit for Public-Private Partnerships in Roads and Highways[1] "The Toolkit for Public-Private Partnership in Roads and Highways is to

185

Integrated: Enhanced Geospatial Toolkit for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Enhanced Geospatial Toolkit for Sri Lanka from NREL Enhanced Geospatial Toolkit for Sri Lanka from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): Enhancements to the GeoSpatial Toolkit (GsT) were funded by USAID's Southeast Asia Regional Initiative/Energy (SARI/E). These enhancements include additional functionality and data development not available with the standard GeoSpatial Toolkit.

186

Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Policy and Program Design Toolkit Policy and Program Design Toolkit (Redirected from Gateway:International/Policy and Program Design) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

187

Technology Cost and Performance Toolkit | Open Energy Information  

Open Energy Info (EERE)

Technology Cost and Performance Toolkit Technology Cost and Performance Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

188

Greenhouse Gas Inventory Development Toolkit | Open Energy Information  

Open Energy Info (EERE)

Greenhouse Gas Inventory Development Toolkit Greenhouse Gas Inventory Development Toolkit Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

189

Renewable Energy Technical Potential Toolkit | Open Energy Information  

Open Energy Info (EERE)

Renewable Energy Technical Potential Toolkit Renewable Energy Technical Potential Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

190

USAID Toolkit for Increasing Energy Access | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » USAID Toolkit for Increasing Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: USAID Toolkit for Increasing Energy Access Agency/Company /Organization: United States Agency for International Development (USAID) Partner: United Nations Framework Convention on Climate Change (UNFCCC), UNEP, United Nations Foundation Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, People and Policy Phase: Evaluate Options, Develop Goals, Prepare a Plan, Create Early Successes, Evaluate Effectiveness and Revise as Needed Topics: Co-benefits assessment, - Energy Access

191

Project Screening and Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Project Screening and Design Toolkit Project Screening and Design Toolkit Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

192

Land-use Scenario Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land-use Scenario Analysis Toolkit Land-use Scenario Analysis Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

193

Energy System and Scenario Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Energy System and Scenario Analysis Toolkit Energy System and Scenario Analysis Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

194

Performance Based Service Acquisition Toolkit | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Guidance » Contracting for Support Services » Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit Performance-based Service Acquisition (PBA) means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed. Performance-based Work Statement (PWS) means that a statement of work for performance-based acquisitions that describes the required results in clear, specific and objective terms with measurable outcomes. Statement of Objectives (SOO) means a Government-prepared document incorporated into the solicitation that states the overall performance objectives. It is used in solicitations when the Government intends to provide the maximum flexibility to each offeror to propose an innovative

195

LEDSGP/DIA-Toolkit/How To | Open Energy Information  

Open Energy Info (EERE)

How To How To < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance How to Assess Development Impacts Countries may assess the impacts of a proposed or implemented development policy, program, or project on social, economic, and environmental development goals through a five-step process: Identify the policy or program of interest: What policy or program am I considering? Define impacts to consider: What impacts am I interested in identifying and evaluating? Identify the options for examining impacts: What tools and methodologies, both quantitative and qualitative, are available for impact analysis? Conduct the analysis. Share the results. 1. What policy or program am I considering?

196

Renewable Energy Technical Potential Toolkit | Open Energy Information  

Open Energy Info (EERE)

Energy Technical Potential Toolkit Energy Technical Potential Toolkit (Redirected from Gateway:International/Renewable Energy and Energy Efficiency Potential) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives

197

Sustainable Land-use Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Sustainable Land-use Impact Assessment Toolkit Sustainable Land-use Impact Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

198

An X11 Toolkit Based on the Tcl Language  

E-Print Network (OSTI)

This paper describes a new toolkit for X11 called Tk. The overall functions provided by Tk are similar to those of the standard toolkit Xt. However, Tk is implemented using Tcl, a lightweight interpretive command language. This means that Tk's functions are available not just from C code compiled into the application but also via Tcl commands issued dynamically while the application runs. Tcl commands are used for binding keystrokes and other events to application-specific actions, for creating and configuring widgets, and for dealing with geometry managers and the selection. The use of an interpretive language means that any aspect of the user interface may be changed dynamically while an application executes. It also means that many interesting applications can be created without writing any new C code, simply by writing Tcl scripts for existing applications. Furthermore, Tk provides a special send command that allows any Tk-based application to invoke Tcl commands in any other Tk-b...

John Ousterhout Computer; John K. Ousterhout

1991-01-01T23:59:59.000Z

199

Project Screening and Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Screening and Design Toolkit Screening and Design Toolkit (Redirected from Gateway:International/Project Screening and Design) Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

200

TCPL: A Defense against wormhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Molecular Modeling Toolkit with Applications to Efficient Free Energy Computation.  

E-Print Network (OSTI)

??In this thesis we develop a molecular modeling toolkit that models the conformation space of proteins and allows easy prototyping of algorithms on the conformation… (more)

Tezcan, Hasan Gokhan

2010-01-01T23:59:59.000Z

202

Turkey Geospatial Toolkit Developed by NREL and the U.S. Trade...  

Open Energy Info (EERE)

geographic toolkit that allows users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc....

203

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

204

A Gamma-Ray Burst Trigger Toolkit  

E-Print Network (OSTI)

The detection rate of a gamma-ray burst detector can be increased by using a count rate trigger with many accumulation times ?t and energy bands ?E. Because a burst’s peak flux varies when averaged over different ?t and ?E, the nominal sensitivity (the numerical value of the peak flux) of a trigger system is less important than how much fainter a burst could be at the detection threshold as ?t and ?E are changed. The relative sensitivity of different triggers can be quantified by referencing the detection threshold back to the peak flux for a fiducial value of ?t and ?E. This mapping between peak flux values for different sets of ?t and ?E varies from burst to burst. Quantitative estimates of the burst detection rate for a given detector and trigger system can be based on the observed rate at a measured peak flux value in this fiducial trigger. Predictions of a proposed trigger’s burst detection rate depend on the assumed burst population, and these predictions can be wildly in error for triggers that differ significantly from previous missions. I base the fiducial rate on the BATSE observations: 550 bursts per sky above a peak flux of 0.3 ph cm ?2 s ?1 averaged over ?t=1.024 s and ?E=50–300 keV. Using a sample of 100 burst lightcurves I find that triggering on all possible values of ?t that are multiples of 0.064 s decreases the average threshold peak flux on the 1.024 s timescale by a factor of 0.6. Extending ?E to lower energies includes the large flux of the X-ray background, increasing the background count rate. Consequently a low energy ?E is advantageous only for very soft bursts. Whether a large fraction of the population of bright bursts is soft is disputed; the new population of X-ray Flashes is soft but relatively faint. Subject headings: gamma-rays: bursts

unknown authors

2002-01-01T23:59:59.000Z

205

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

206

A toolkit for groundwater mean residence time interpretation with gaseous tracers  

Science Conference Proceedings (OSTI)

An analytical Excel-based toolkit called Gas-Tracer-Interpretation (GTI) was developed for determining mean residence time (MRT) of groundwater samples and for validating conceptual model assumptions. This novel data interpretation toolkit improves data ... Keywords: Environmental tracer, Environmental tracers concentrations in water, Groundwater dating, Lumped-parameter modeling, Water age

Pablo Fernando Dávila, Christoph Külls, Markus Weiler

2013-12-01T23:59:59.000Z

207

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

208

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

209

Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)  

DOE Data Explorer (OSTI)

NREL also has developed high-resolution resource maps and data products for selected, individual countries using its Geospatial Toolkit. Countries with both a GsT product and related maps and data products are Afghanistan, Bhutan, Northwest India, and Pakistan. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

210

Integrated: Geospatial Toolkit GIS data for Nepal from NREL | OpenEI  

Open Energy Info (EERE)

Nepal from NREL Nepal from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners.To access the Geospatial toolkit, http://www.nrel.gov/international/geospatial_toolkits.html

211

The advanced computational testing and simulation toolkit (ACTS)  

DOE Green Energy (OSTI)

During the past decades there has been a continuous growth in the number of physical and societal problems that have been successfully studied and solved by means of computational modeling and simulation. Distinctively, a number of these are important scientific problems ranging in scale from the atomic to the cosmic. For example, ionization is a phenomenon as ubiquitous in modern society as the glow of fluorescent lights and the etching on silicon computer chips; but it was not until 1999 that researchers finally achieved a complete numerical solution to the simplest example of ionization, the collision of a hydrogen atom with an electron. On the opposite scale, cosmologists have long wondered whether the expansion of the Universe, which began with the Big Bang, would ever reverse itself, ending the Universe in a Big Crunch. In 2000, analysis of new measurements of the cosmic microwave background radiation showed that the geometry of the Universe is flat, and thus the Universe will continue expanding forever. Both of these discoveries depended on high performance computer simulations that utilized computational tools included in the Advanced Computational Testing and Simulation (ACTS) Toolkit. The ACTS Toolkit is an umbrella project that brought together a number of general purpose computational tool development projects funded and supported by the U.S. Department of Energy (DOE). These tools, which have been developed independently, mainly at DOE laboratories, make it easier for scientific code developers to write high performance applications for parallel computers. They tackle a number of computational issues that are common to a large number of scientific applications, mainly implementation of numerical algorithms, and support for code development, execution and optimization. The ACTS Toolkit Project enables the use of these tools by a much wider community of computational scientists, and promotes code portability, reusability, reduction of duplicate efforts, and tool maturity. This paper presents a brief introduction to the functionality available in ACTS.

Drummond, L.A.; Marques, O.

2002-05-21T23:59:59.000Z

212

Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes  

Science Conference Proceedings (OSTI)

Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasures, a number of secure architectures based on linear and nonlinear error detecting codes were proposed. Linear codes provide protection only against primitive ... Keywords: arithmetic codes, cryptography, multipliers, sidechannel attacks

Zhen Wang, Mark Karpovsky, Ajay Joshi

2012-06-01T23:59:59.000Z

213

Attacking Automatic Wireless Network Selection  

E-Print Network (OSTI)

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as Preferred or Trusted Networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker’s wireless network without user interaction or notification. This will occur even if the user has never connected to a wireless network before or they have an empty Preferred/Trusted Networks List. We describe these vulnerabilities as well as their implementation and impact. 1

Dino A. Dai Zovi; Shane A. Macaulay

2005-01-01T23:59:59.000Z

214

Serial model for attack tree computations  

Science Conference Proceedings (OSTI)

In this paper we extend the standard attack tree model by introducing temporal order to the attacker's decision making process. This will allow us to model the attacker's behaviour more accurately, since this way it is possible to study his actions related ...

Aivo Jürgenson; Jan Willemson

2009-12-01T23:59:59.000Z

215

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

216

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

217

Development of a Measurement and Verification (M&V) Costing Toolkit  

E-Print Network (OSTI)

This paper discusses the development of a M&V Costing Toolkit that has been developed to assist the U.S. Army with the standardization of costing procedures for measuring and verifying energy savings from Energy Service Performance Contracts (ESPC) at army bases. This M&V costing toolkit contains pricing for a wide-variety of sensors, data loggers, portable data loggers and transducers used to measure energy savings from energy conservation retrofits to buildings. The M&V costing toolkit also contains a framework for pricing the installation, maintaining the equipment, and the removal of instrumentation associated with the measurement of energy savings. The toolkit includes costing procedures for collecting the data from remote sites, archiving of the data, QC procedures, data analysis, savings reporting, and project closeout costing. This paper presents a general overview of the M&V costing process, various methods for monitoring and verifying savings, and a description of the M&V Costing Toolkit. Two examples of the use of the M&V Costing Toolkit are also presented. Twelve additional examples are provided with the toolkit, including the M&V of boilers, chillers, Energy Management and Control System (EMCS), and lighting retrofits (Haberl et al. 2003b).

Haberl, J. S.; Lewis, T.; Im, P.; Carlson, K. A.; Underwood, D.

2004-01-01T23:59:59.000Z

218

Afghanistan Geospatial Toolkit - Full Data | OpenEI  

Open Energy Info (EERE)

Full Data Full Data Dataset Summary Description (Abstract): This Geospatial Toolkit contains the full (with high resolution data) version of the GsT interfaced to HOMER for Afghanistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

219

Pakistan Geospatial Toolkit - Data Lite | OpenEI  

Open Energy Info (EERE)

Data Lite Data Lite Dataset Summary Description (Abstract): This Geospatial Toolkit contains the lite (with lower resolution data) version of the GsT interfaced to HOMER for Pakistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

220

Pakistan Geospatial Toolkit - Full Data | OpenEI  

Open Energy Info (EERE)

Full Data Full Data Dataset Summary Description (Abstract): This Geospatial Toolkit contains the full (with high resolution data) version of the GsT interfaced to HOMER for Pakistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Policy and Program Design Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

222

Technology Cost and Performance Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Technology Cost and Performance Toolkit (Redirected from Gateway:International/Technology Performance and Costs) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and

223

FIREMAN: a toolkit for FIREwall Modeling and ANalysis  

E-Print Network (OSTI)

Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are very common and significantly weaken the desired security. This paper introduces FIREMAN, a static analysis toolkit for firewall modeling and analysis. By treating firewall configurations as specialized programs, FIREMAN applies static analysis techniques to check misconfigurations, such as policy violations, inconsistencies, and inefficiencies, in individual firewalls as well as among distributed firewalls. FIREMAN performs symbolic model checking of the firewall configurations for all possible IP packets and along all possible data paths. It is both sound and complete because of the finite state nature of firewall configurations. FIREMAN is implemented by modeling firewall rules using binary decision diagrams (BDDs), which have been used successfully in hardware verification and model checking. We have experimented with FIREMAN and used it to uncover several real misconfigurations in enterprise networks, some of which have been subsequently confirmed and corrected by the administrators of these networks. 1.

Lihua Yuan; Hao Chen

2006-01-01T23:59:59.000Z

224

Afghanistan Geospatial Toolkit - Data Lite | OpenEI  

Open Energy Info (EERE)

Data Lite Data Lite Dataset Summary Description (Abstract): This Geospatial Toolkit contains the lite (with lower resolution data) version of the GsT interfaced to HOMER for Afghanistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

225

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

226

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

227

A collusion attack optimization strategy for digital fingerprinting  

Science Conference Proceedings (OSTI)

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of ... Keywords: Multimedia security, collusion attack, digital fingerprinting, optimization

Hui Feng; Hefei Ling; Fuhao Zou; Weiqi Yan; Zhengding Lu

2012-09-01T23:59:59.000Z

228

Multi-physics coupling of Einstein and hydrodynamics evolution: a case study of the Einstein toolkit  

Science Conference Proceedings (OSTI)

Cactus is a software framework for high-performance computing which sees widespread use in the numerical relativity community and other fields. The Einstein Toolkit is a set of Cactus components providing infrastructure and basic functionality for, and ...

Erik Schnetter

2008-10-01T23:59:59.000Z

229

Globus Toolkit TM 2.0 becomes the “de facto” standard for ...  

The R&D 100 Award signifies achievement by the Globus Project, whose open-source Globus Toolkit 2.0 software was recognized as one of the year’s top 100 technical ...

230

A COTS Wrapping Toolkit for Fault Tolerant Applications under Windows NT  

Science Conference Proceedings (OSTI)

This paper presents a software toolkit that allows enhancing the fault tolerant characteristics of a user application running under a Windows NT platform through sets of interchangeable and customizable Fault Tolerant Interposition Agents (FTI Agents). ...

Alfredo Benso; Silvia Chiusano; Paolo Prinetto

2000-07-01T23:59:59.000Z

231

Pybel: a Python wrapper for the OpenBabel cheminformatics toolkit  

E-Print Network (OSTI)

sum of fragment-based contributions and its application to the prediction of drug transport properties. J Med Chem 2000, 43:3714-3717. 7. Python [http://www.python.org] 8. OEChem: OpenEye Scientific Software: Santa Fe, NM. . 9. RDKit [http... ://www.rdkit.org] 10. Daylight Toolkit: Daylight Chemical Information Systems, Inc.: Aliso Viejo, CA. . 11. PyDaylight: Dalke Scientific Software, LLC: Santa Fe, NM. . 12. Cambios Molecular Toolkit: Cambios Computing, LLC: Palo Alto, CA. . 13. Frowns [http...

O'Boyle, Noel M; Morley, Chris; Hutchison, Geoffrey R

2008-03-09T23:59:59.000Z

232

www.i2e.com.es El framework Google Web Toolkit  

E-Print Network (OSTI)

www.i2e.com.es El framework Google Web Toolkit Emilio Bravo Garcia #12;www.i2e.com.es En esta presentación se va a realizar una introducción a Google Web Toolkit (en adelante GWT). GWT es una tecnología desarrollada por Google para acelerar el desarrollo de Aplicaciones Ricas de Internet (RIA) y mejorar la

Escolano, Francisco

233

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

234

Cybersecurity - Foiling attackers | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in...

235

Non-Invasive Attack Testing Workshop  

Science Conference Proceedings (OSTI)

Non-Invasive Attack Testing Workshop. Purpose: To encourage development of test methods, metrics and tools for evaluating the effectiveness of ...

2013-05-14T23:59:59.000Z

236

Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs  

Science Conference Proceedings (OSTI)

As computers have become ever more interconnected, the complexity of security configuration has exploded. Management tools have not kept pace, and we show that this has made identity snowball attacks into a critical danger. Identity snowball attacks ... Keywords: access control, attack graph, authentication, combinatorial optimization, identity snowball, machine learning, sparsest cut, support vector machine

John Dunagan; Alice X. Zheng; Daniel R. Simon

2009-10-01T23:59:59.000Z

237

Higher Order Differential Attack of Camellia (II)  

Science Conference Proceedings (OSTI)

Camellia is a 128-bit block cipher, proposed by NTT and Mitsubishi in 2000. It has been shown that 10 round variant without FL function under a 256-bit secret key is attackable by Higher Order Differential Attack and even if FL function is included, ...

Yasuo Hatano; Hiroki Sekine; Toshinobu Kaneko

2002-08-01T23:59:59.000Z

238

Renewable Energy and Energy Efficiency Toolkit Website | Open Energy  

Open Energy Info (EERE)

Renewable Energy and Energy Efficiency Toolkit Website Renewable Energy and Energy Efficiency Toolkit Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy and Energy Efficiency Toolkit Website Focus Area: Renewable Energy Topics: Policy Impacts Website: toolkits.reeep.org/ Equivalent URI: cleanenergysolutions.org/content/renewable-energy-and-energy-efficienc Language: "English,Chinese,French,Portuguese,Spanish" is not in the list of possible values (Abkhazian, Achinese, Acoli, Adangme, Adyghe; Adygei, Afar, Afrihili, Afrikaans, Afro-Asiatic languages, Ainu, Akan, Akkadian, Albanian, Aleut, Algonquian languages, Altaic languages, Amharic, Angika, Apache languages, Arabic, Aragonese, Arapaho, Arawak, Armenian, Aromanian; Arumanian; Macedo-Romanian, Artificial languages, Assamese, Asturian; Bable; Leonese; Asturleonese, Athapascan languages, Australian languages, Austronesian languages, Avaric, Avestan, Awadhi, Aymara, Azerbaijani, Balinese, Baltic languages, Baluchi, Bambara, Bamileke languages, Banda languages, Bantu (Other), Basa, Bashkir, Basque, Batak languages, Beja; Bedawiyet, Belarusian, Bemba, Bengali, Berber languages, Bhojpuri, Bihari languages, Bikol, Bini; Edo, Bislama, Blin; Bilin, Blissymbols; Blissymbolics; Bliss, Bosnian, Braj, Breton, Buginese, Bulgarian, Buriat, Burmese, Caddo, Catalan; Valencian, Caucasian languages, Cebuano, Celtic languages, Central American Indian languages, Central Khmer, Chagatai, Chamic languages, Chamorro, Chechen, Cherokee, Cheyenne, Chibcha, Chichewa; Chewa; Nyanja, Chinese, Chinook jargon, Chipewyan; Dene Suline, Choctaw, Chuukese, Chuvash, Classical Newari; Old Newari; Classical Nepal Bhasa, Classical Syriac, Coptic, Cornish, Corsican, Cree, Creek, Creoles and pidgins , Crimean Tatar; Crimean Turkish, Croatian, Cushitic languages, Czech, Dakota, Danish, Dargwa, Delaware, Dinka, Divehi; Dhivehi; Maldivian, Dogri, Dogrib, Dravidian languages, Duala, Dutch; Flemish, Dyula, Dzongkha, Eastern Frisian, Efik, Egyptian (Ancient), Ekajuk, Elamite, English, Erzya, Esperanto, Estonian, Ewe, Ewondo, Fang, Fanti, Faroese, Fijian, Filipino; Pilipino, Finnish, Finno-Ugrian languages, Fon, French, Friulian, Fulah, Ga, Gaelic; Scottish Gaelic, Galibi Carib, Galician, Ganda, Gayo, Gbaya, Geez, Georgian, German, Germanic languages, Gilbertese, Gondi, Gorontalo, Gothic, Grebo, Greek, Modern, Guarani, Gujarati, Gwich'in, Haida, Haitian; Haitian Creole, Hausa, Hawaiian, Hebrew, Herero, Hiligaynon, Himachali languages; Western Pahari languages, Hindi, Hiri Motu, Hittite, Hmong; Mong, Hungarian, Hupa, Iban, Icelandic, Ido, Igbo, Ijo languages, Iloko, Inari Sami, Indic languages, Indo-European languages, Indonesian, Ingush, Interlingue; Occidental, Inuktitut, Inupiaq, Iranian languages, Irish, Iroquoian languages, Italian, Japanese, Javanese, Judeo-Arabic, Judeo-Persian, Kabardian, Kabyle, Kachin; Jingpho, Kalaallisut; Greenlandic, Kalmyk; Oirat, Kamba, Kannada, Kanuri, Kara-Kalpak, Karachay-Balkar, Karelian, Karen languages, Kashmiri, Kashubian, Kawi, Kazakh, Khasi, Khoisan languages, Khotanese; Sakan, Kikuyu; Gikuyu, Kimbundu, Kinyarwanda, Kirghiz; Kyrgyz, Klingon; tlhIngan-Hol, Komi, Kongo, Konkani, Korean, Kosraean, Kpelle, Kru languages, Kuanyama; Kwanyama, Kumyk, Kurdish, Kurukh, Kutenai, Ladino, Lahnda, Lamba, Land Dayak languages, Lao, Latin, Latvian, Lezghian, Limburgan; Limburger; Limburgish, Lingala, Lithuanian, Lojban, Lower Sorbian, Lozi, Luba-Katanga, Luba-Lulua, Luiseno, Lule Sami, Lunda, Luo (Kenya and Tanzania), Lushai, Luxembourgish; Letzeburgesch, Macedonian, Madurese, Magahi, Maithili, Makasar, Malagasy, Malay, Malayalam, Maltese, Manchu, Mandar, Mandingo, Manipuri, Manobo languages, Manx, Maori, Mapudungun; Mapuche, Marathi, Mari, Marshallese, Marwari, Masai, Mayan languages, Mende, Mi'kmaq; Micmac, Minangkabau, Mirandese, Mohawk, Moksha, Mon-Khmer languages, Mongo, Mongolian, Mossi, Multiple languages, Munda languages, N'Ko, Nahuatl languages, Nauru, Navajo; Navaho, Ndebele, North; North Ndebele, Ndebele, South; South Ndebele, Ndonga, Neapolitan, Nepal Bhasa; Newari, Nepali, Nias, Niger-Kordofanian languages, Nilo-Saharan languages, Niuean, North American Indian languages, Northern Frisian, Northern Sami, Norwegian, Nubian languages, Nyamwezi, Nyankole, Nyoro, Nzima, Occitan (post 1500); Provençal, Ojibwa, Oriya, Oromo, Osage, Ossetian; Ossetic, Otomian languages, Pahlavi, Palauan, Pali, Pampanga; Kapampangan, Pangasinan, Panjabi; Punjabi, Papiamento, Papuan languages, Pedi; Sepedi; Northern Sotho, Persian, Philippine languages, Phoenician, Pohnpeian, Polish, Portuguese, Prakrit languages, Pushto; Pashto, Quechua, Rajasthani, Rapanui, Rarotongan; Cook Islands Maori, Romance languages, Romanian; Moldavian; Moldovan, Romansh, Romany, Rundi, Russian, Salishan languages, Samaritan Aramaic, Sami languages, Samoan, Sandawe, Sango, Sanskrit, Santali, Sardinian, Sasak, Scots, Selkup, Semitic languages, Serbian, Serer, Shan, Shona, Sichuan Yi; Nuosu, Sicilian, Sidamo, Sign Languages, Siksika, Sindhi, Sinhala; Sinhalese, Sino-Tibetan languages, Siouan languages, Skolt Sami, Slave (Athapascan), Slavic languages, Slovak, Slovenian, Sogdian, Somali, Songhai languages, Soninke, Sorbian languages, Sotho, Southern, South American Indian (Other), Southern Altai, Southern Sami, Spanish; Castilian, Sranan Tongo, Sukuma, Sumerian, Sundanese, Susu, Swahili, Swati, Swedish, Swiss German; Alemannic; Alsatian, Syriac, Tagalog, Tahitian, Tai languages, Tajik, Tamashek, Tamil, Tatar, Telugu, Tereno, Tetum, Thai, Tibetan, Tigre, Tigrinya, Timne, Tiv, Tlingit, Tok Pisin, Tokelau, Tonga (Nyasa), Tonga (Tonga Islands), Tsimshian, Tsonga, Tswana, Tumbuka, Tupi languages, Turkish, Turkmen, Tuvalu, Tuvinian, Twi, Udmurt, Ugaritic, Uighur; Uyghur, Ukrainian, Umbundu, Uncoded languages, Undetermined, Upper Sorbian, Urdu, Uzbek, Vai, Venda, Vietnamese, Volapük, Votic, Wakashan languages, Walamo, Walloon, Waray, Washo, Welsh, Western Frisian, Wolof, Xhosa, Yakut, Yao, Yapese, Yiddish, Yoruba, Yupik languages, Zande languages, Zapotec, Zaza; Dimili; Dimli; Kirdki; Kirmanjki; Zazaki, Zenaga, Zhuang; Chuang, Zulu, Zuni) for this property.

239

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

240

Integrated: Geospatial Toolkit GIS data for Brazil from NREL | OpenEI  

Open Energy Info (EERE)

Brazil from NREL Brazil from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Integrated: Geospatial Toolkit GIS data for Honduras from NREL | OpenEI  

Open Energy Info (EERE)

Honduras from NREL Honduras from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software.(Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

242

LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Prioritize and Plan) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

243

Integrated: Geospatial Toolkit for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Sri Lanka from NREL Sri Lanka from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

244

Integrated: Geospatial Toolkit GIS data for Ghana from NREL | OpenEI  

Open Energy Info (EERE)

Ghana from NREL Ghana from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

245

Integrated: Geospatial Toolkit GIS data for Guatemala from NREL | OpenEI  

Open Energy Info (EERE)

Guatemala from NREL Guatemala from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

246

Integrated: Geospatial Toolkit GIS data for China from NREL | OpenEI  

Open Energy Info (EERE)

China from NREL China from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

247

Integrated: Geospatial Toolkit GIS data for El Salvador from NREL | OpenEI  

Open Energy Info (EERE)

El Salvador from NREL El Salvador from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

248

Integrated: Geospatial Toolkit GIS data for Bangladesh from NREL | OpenEI  

Open Energy Info (EERE)

Bangladesh from NREL Bangladesh from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

249

Integrated: Geospatial Toolkit for El Salvador from NREL | OpenEI  

Open Energy Info (EERE)

El Salvador from NREL El Salvador from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

250

Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL | OpenEI  

Open Energy Info (EERE)

Nicaragua from NREL Nicaragua from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

251

Integrated: Geospatial Toolkit GIS data for Kenya from NREL | OpenEI  

Open Energy Info (EERE)

Kenya from NREL Kenya from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

252

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

253

LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Evaluate the System) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

254

Integrated: Geospatial Toolkit GIS data for Cuba from NREL | OpenEI  

Open Energy Info (EERE)

Cuba from NREL Cuba from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

255

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Create a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

256

Integrated: Geospatial Toolkit GIS data for Ethiopia from NREL | OpenEI  

Open Energy Info (EERE)

Ethiopia from NREL Ethiopia from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software.(Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

257

Integrated: Geospatial Toolkit GIS data for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Sri Lanka from NREL Sri Lanka from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

258

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Implement and Monitor) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

259

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

260

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network (OSTI)

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

262

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein  

Science Conference Proceedings (OSTI)

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein. For Immediate Release: November 3, 2009. ...

2012-10-02T23:59:59.000Z

263

Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study  

SciTech Connect

This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

Wang, Na

2013-03-13T23:59:59.000Z

264

Virtual venue management users manual : access grid toolkit documentation, version 2.3.  

SciTech Connect

An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

2007-10-24T23:59:59.000Z

265

MSAT-A new toolkit for the analysis of elastic and seismic anisotropy  

Science Conference Proceedings (OSTI)

The design and content of MSAT, a new Matlab toolkit for the study and analysis of seismic and elastic anisotropy, is described. Along with a brief introduction to the basic theory of anisotropic elasticity and a guide to the functions provided by the ... Keywords: Anisotropy, Elasticity, MATLAB, Seismology, Shear-wave splitting

Andrew M. Walker; James Wookey

2012-12-01T23:59:59.000Z

266

PyMT: a post-WIMP multi-touch user interface toolkit  

Science Conference Proceedings (OSTI)

Multi-touch and tabletop input paradigms open novel doors for post-WIMP (Windows, Icons, Menus, Pointer) user interfaces. Developing these novel interfaces and applications poses unique challenges for designers and programmers alike. We present PyMT ... Keywords: GUI, Python, UI toolkits, graphics, multi-touch, open source, post-WIMP, user interfaces

Thomas E. Hansen; Juan Pablo Hourcade; Mathieu Virbel; Sharath Patali; Tiago Serra

2009-11-01T23:59:59.000Z

267

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

268

When Utility Bills Attack! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

269

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

270

Extending gibson's attacks on the GPT cryptosystem  

Science Conference Proceedings (OSTI)

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibson's attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank ...

Raphael Overbeck

2005-03-01T23:59:59.000Z

271

Detecting intrusions in encrypted control traffic  

Science Conference Proceedings (OSTI)

Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found ... Keywords: industrial control systems, intrusion detection, smart grids

Maarten Hoeve

2013-11-01T23:59:59.000Z

272

Detection and Analysis of Threatsto the Energy Sector (DATES), March 2010 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, , March 2010 Detection and Analysis of Threatsto the Energy Sector (DATES), March 2010 A security monitoring capability featuring multiple detection algorithms and cross-domain event correlation for defense against cyber attacks on energy control systems. DATES is a detection and security information/event management (SIEM) solution enabling asset owners to protect their energy control systems at the network, host, and device level from cyber attacks. DATES complements traditional, signature-based detection with multiple detection algorithms, including modelbased and flow anomaly detection and cross-site attack correlation. The DATES detection and SIEM solution gives operators succinct and intuitive attack visualization, with attacks prioritized as to their

273

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain  

E-Print Network (OSTI)

In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and flow measure. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time. NS-2 network simulator on Linux platform is used as simulation testbed. Simulation results show that our proposed solution gives a drastic improvement in terms of detection rate and false positive rate. However, the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads as far as monitoring and analysis of traffic at single point connecting victim is concerned. To address this problem, a distributed...

Gupta, B B; Misra, Manoj; 10.1145/1523103.1523203

2012-01-01T23:59:59.000Z

274

Land-use Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land-use Policy and Program Design Toolkit Land-use Policy and Program Design Toolkit Jump to: navigation, search Stage 4 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

275

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

276

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

Develop Alternative Scenarios Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Develop Alternative Scenarios) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

277

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

278

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

Assess Opportunities Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Assess Opportunities) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

279

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

280

Defending against side-channel attacks : DynamoREA  

E-Print Network (OSTI)

Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

282

Countering DoS attacks with stateless multipath overlays  

Science Conference Proceedings (OSTI)

Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that attackers will attack a fixed and bounded set of overlay nodes causing service ... Keywords: key agreement, spread-spectrum communications

Angelos Stavrou; Angelos D. Keromytis

2005-11-01T23:59:59.000Z

283

On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers  

E-Print Network (OSTI)

the vulnerabilities of DNS and SIP message handling in the Vonage phone, stealthily become the remote MITM and launch flaw in handling a malformed INVITE message, which allows the remote attacker to remotely crashOn the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers Ruishan

Wang, Xinyuan "Frank"

284

WebWiseTclTk: A Safe-Tcl/Tk-based Toolkit Enhanced for the World Wide Web  

E-Print Network (OSTI)

The WebWiseTclTk toolkit is an enhancement of the existing feature set of Safe-Tcl and Safe-Tk that does not compromise security. The toolkit re-defines the functionality of the auto load mechanism in Tcl such that it works for packages located anywhere on the World Wide Web. It also re-introduces several commands not available in Safe-Tk such as toplevel and menu to provide a much richer feature set of Tk commands. The toolkit is written entirely in Safe-Tcl/Tk and uses the home policy for running applications as Tcl-plugins. The toolkit supports (1) creation of new Web-based Tcl applications with greatly enhanced functionality, and (2) migration of existing Tcl applications to the Web by merely writing an encapsulation script. We demonstrate the capabilities of the WebWiseTclTk toolkit by readily creating an encapsulation script for Web-based execution of the Tk Widget Demonstrations, distributed with the core Tcl/Tk.

Hemang Lavana; Franc Brglez

1998-01-01T23:59:59.000Z

285

Analysis of Automated Model against DDoS Attacks  

E-Print Network (OSTI)

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with the overall DDoS problem. With a new packet marking technique and agent design, our approach has many advanced features to minimize the DDoS attacks within a single ISP domain. In this paper we discuss different types of attacks that are possible on our model and propose techniques to counteract the identified attacks. We will also discuss security protocols for communication between different entities in our model.

Udaya Kiran Tupakula

2003-01-01T23:59:59.000Z

286

Effects-based feature identification for network intrusion detection  

Science Conference Proceedings (OSTI)

Intrusion detection systems (IDS) are an important element in a network's defences to help protect against increasingly sophisticated cyber attacks. IDS that rely solely on a database of stored known attacks are no longer sufficient for effectively detecting ... Keywords: Classification, Clustering, Decision trees, Feature selection, Intrusion detection

Panos Louvieris, Natalie Clewley, Xiaohui Liu

2013-12-01T23:59:59.000Z

287

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

288

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

289

Precision air data support for chem/bio attack response .  

E-Print Network (OSTI)

??The defense response against chemical and biological (Chem/bio) weapons has gained a renewed focus in light of the 11 Sept 2001 terrorist attack. A successful… (more)

Tan, Kwang Liang

2003-01-01T23:59:59.000Z

290

Hydrogen Attack in Creeping Polycrystals Due to Cavitation on ...  

Science Conference Proceedings (OSTI)

Sep 1, 1994 ... Hydrogen Attack (HA) is the development at elevated temperatures of grain boundary cavitation by internal methane gas, which is generated by ...

291

Rapid cooling technology could aid surgery patients, heart attack...  

NLE Websites -- All DOE Office Websites (Extended Search)

cooling technology could aid surgery patients, heart attack victims Diagram shows how ice slurry cools blood INTERNAL COOLING - An ice slurry, delivered through an endotracheal...

292

Thermal Barrier Coatings for Resistance Against Attack by Molten ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested ...

293

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

secure software providing independent testing, monitoring, and control of energy control system component operation Trust Anchor Lifecycle Attack Protection More Documents...

294

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... to disrupt the energy distribution of smart ... attacks against distributed energy routing in smart grid. ... on Cyber Technology in Automation, Control, and ...

2012-04-12T23:59:59.000Z

295

An expanded framework for the advanced computational testing and simulation toolkit  

Science Conference Proceedings (OSTI)

The Advanced Computational Testing and Simulation (ACTS) Toolkit is a set of computational tools developed primarily at DOE laboratories and is aimed at simplifying the solution of common and important computational problems. The use of the tools reduces the development time for new codes and the tools provide functionality that might not otherwise be available. This document outlines an agenda for expanding the scope of the ACTS Project based on lessons learned from current activities. Highlights of this agenda include peer-reviewed certification of new tools; finding tools to solve problems that are not currently addressed by the Toolkit; working in collaboration with other software initiatives and DOE computer facilities; expanding outreach efforts; promoting interoperability, further development of the tools; and improving functionality of the ACTS Information Center, among other tasks. The ultimate goal is to make the ACTS tools more widely used and more effective in solving DOE's and the nation's scientific problems through the creation of a reliable software infrastructure for scientific computing.

Marques, Osni A.; Drummond, Leroy A.

2003-11-09T23:59:59.000Z

296

Attacking the IPsec Standards in Encryption-only Configurations  

Science Conference Proceedings (OSTI)

We describe new attacks which break any RFCcompliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted ...

Jean Paul Degabriele; Kenneth G. Paterson

2007-05-01T23:59:59.000Z

297

Selective Attack of Welds by Flow-Accelerated Corrosion  

Science Conference Proceedings (OSTI)

Flow-accelerated corrosion (FAC), a degradation mechanism that attacks carbon steel material, has been a significant issue for nuclear plants for some time. Until recently, though, welds were thought to be largely immune to this mechanism. This work demonstrates that significant weld attacks have been occurring at a number of nuclear plants throughout the world.

2002-07-26T23:59:59.000Z

298

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

299

Survey and Simulation on Malicious Data Attack on Power Market  

E-Print Network (OSTI)

It is expected that the next generation of power grid will be more intelligent in power distribution, grid data attack. A cyber-spy may inject malicious data to make power grid in danger. In this report the financial risk of data attack, a bunch of notions with respect to power grid are studies. Observability

Lavaei, Javad

300

Heart Attack Survival Plan Information To Share With  

E-Print Network (OSTI)

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure  

SciTech Connect

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

2006-08-28T23:59:59.000Z

302

Funding Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Additional Funding Additional Funding QuarkNet Home - Information - Calendar - Contacts - Projects - Forms: EoI - Teachers Many additional sources of funding are available above and beyond the QuarkNet funds. They can be in the form of money, supplies, matching funds and in-kind contributions. The sources run from National Science Foundation (NSF) grants to local stores in your area. Some of those sources are listed below. If you know of others, please send them in. Sources of Funds Name Source Deadline Amount Availability Research Experience for Teachers (RET) National Science Foundation (NSF) Anytime Can fund multiple teachers for 8 weeks Annually Venture Fund American Association of Physics Teachers (AAPT) None Up to $25,000 to promote the development and marketing of innovative teaching products and services One project at a time

303

Funding Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Toyota tapestry Grant Organization: National Science Teachers Associaiton Deadline: January 28, 2008 Limitations: Awardee must be employed by same school district for the duration...

304

Funding Toolkit  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Experience for Teachers (RET) Research Experience for Teachers (RET) Organization: National Science Foundation (NSF) Deadline: NA Limitations: Institution must have a REU grant or be applying for one Amount varies depending on needs. An institution can apply for up to 2 months of a teacher's annualized salary for as many teachers as necessary. Available annually The institution MUST have a Research Experience for Undergraduates (REU) grant or must be applying for an REU grant along with the RET grant. The RET request (as supplement or as part of the proposal) should address the following points. The request should describe the plan for teacher activities and the nature of involvement with the REU site program. One special goal of this involvement should be to incorporate the outcome of

305

News Release: Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No-Cost ANTFARM Tool Maps Control System Networks to Help Implement No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in meeting the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards. The Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM) helps utilities meet NERC CIP-005, which requires that they identify their electronic security perimeter (ESP), inside which all critical cyber assets and external access points reside. By using a utility's existing network information and

306

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

Actions/Implement and Monitor Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

307

Fine-grained authorization for job and resource management usingakenti and the globus toolkit(R)  

SciTech Connect

As the Grid paradigm is adopted as a standard way of sharing remote resources across organizational domains, the need for fine-grained access control to these resources increases. This paper presents an authorization solution for job submission and control, developed as part of the National Fusion Collaboratory, that uses the Globus Toolkit 2 and the Akenti authorization service in order to perform fine-grained authorization of job and resource management requests in a Gridenvironment. At job startup, it allows the system to evaluate a user's Resource Specification Language request against authorization policies on resource usage determining how many CPUs or memory a user can use on a given resource or which executables the user can run based on authorization policies, it allows other virtual organization members to manage the user's job.

Thompson, Mary R.; Essiari, Abdelilah; Keahey, Kate; Welch, Von; Lang, S.; Liu, Bo

2003-07-01T23:59:59.000Z

308

Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint  

DOE Green Energy (OSTI)

Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

2013-10-01T23:59:59.000Z

309

Healing heart attack victims, one cell at a time  

NLE Websites -- All DOE Office Websites (Extended Search)

E-mail: stark8@llnl.gov FOR IMMEDIATE RELEASE April 2, 2009 NR-09-04-02 Healing heart attack victims, one cell at a time LIVERMORE, Calif. -- By using the amount of carbon...

310

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

311

Risk-Based models of attacker behavior in cybersecurity  

Science Conference Proceedings (OSTI)

Even as reliance on information and communication technology networks continues to grow, and their potential security vulnerabilities become a greater threat, very little is known about the humans who perpetrate cyber attacks--what are their strategies, ...

Si Li; Ryan Rickert; Amy Sliva

2013-04-01T23:59:59.000Z

312

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

313

Argonne applied mathematicians use INCITE awards to attack energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for...

314

Fake iris detection by using purkinje image  

Science Conference Proceedings (OSTI)

Fake iris detection is to detect and defeat a fake (forgery) iris image input. To solve the problems of previous researches on fake iris detection, we propose the new method of detecting fake iris attack based on the Purkinje image. Especially, we calculated ...

Eui Chul Lee; Kang Ryoung Park; Jaihie Kim

2006-01-01T23:59:59.000Z

315

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network (OSTI)

The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through con- trolled switching sequence. Such switching is facilitated by cyber-attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to effectively model the cyber-physical aspects of a smart grid and determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the different power system test cases including the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system frame- work. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of co-ordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.

Liu, Shan

2013-05-01T23:59:59.000Z

316

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

317

Asset Management Toolkit Modules: An Approach for Risk-Informed Performance-Focused Asset Management in the Power Delivery Industry  

Science Conference Proceedings (OSTI)

With the growing emphasis on risk management, decision makers need both quantified estimates of the risk/uncertainty and actionable results for capital and operation and maintenance (O&M) investments in power delivery projects. This report describes the concepts and modular automation framework for an asset management toolkit that embodies the methods and processes of risk-informed, performance-focused asset management in the power delivery industry.

2005-06-30T23:59:59.000Z

318

ADWICE – anomaly detection with real-time incremental clustering  

Science Conference Proceedings (OSTI)

Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in real-time places hard requirements on the algorithms used, making many proposed ... Keywords: adaptability, anomaly detection, clustering, intrusion detection, realtime

Kalle Burbeck; Simin Nadjm-Tehrani

2004-12-01T23:59:59.000Z

319

Alert correlation in collaborative intelligent intrusion detection systems-A survey  

Science Conference Proceedings (OSTI)

As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. ... Keywords: Alert correlation, Collaborative intrusion detection, Computational intelligence approaches, False positive analysis

Huwaida Tagelsir Elshoush; Izzeldin Mohamed Osman

2011-10-01T23:59:59.000Z

320

A random M-ary method based countermeasure against side channel attacks  

Science Conference Proceedings (OSTI)

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ... Keywords: DPA, SPA, elliptic curve cryptosystems, power analysis attacks, random m-ary recoding algorithm, side channel attacks

MahnKi Ahn; JaeCheol Ha; HoonJae Lee; SangJae Moon

2003-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

YT: A Multi-Code Analysis Toolkit for Astrophysical Simulation Data  

SciTech Connect

The analysis of complex multiphysics astrophysical simulations presents a unique and rapidly growing set of challenges: reproducibility, parallelization, and vast increases in data size and complexity chief among them. In order to meet these challenges, and in order to open up new avenues for collaboration between users of multiple simulation platforms, we present yt (available at http://yt.enzotools.org/) an open source, community-developed astrophysical analysis and visualization toolkit. Analysis and visualization with yt are oriented around physically relevant quantities rather than quantities native to astrophysical simulation codes. While originally designed for handling Enzo's structure adaptive mesh refinement data, yt has been extended to work with several different simulation methods and simulation codes including Orion, RAMSES, and FLASH. We report on its methods for reading, handling, and visualizing data, including projections, multivariate volume rendering, multi-dimensional histograms, halo finding, light cone generation, and topologically connected isocontour identification. Furthermore, we discuss the underlying algorithms yt uses for processing and visualizing data, and its mechanisms for parallelization of analysis tasks.

Turk, Matthew J.; /San Diego, CASS; Smith, Britton D.; /Michigan State U.; Oishi, Jeffrey S.; /KIPAC, Menlo Park /Stanford U., Phys. Dept.; Skory, Stephen; Skillman, Samuel W.; /Colorado U., CASA; Abel, Tom; /KIPAC, Menlo Park /Stanford U., Phys. Dept.; Norman, Michael L.; /aff San Diego, CASS

2011-06-23T23:59:59.000Z

322

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

323

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

324

Kipnis-shamir attack on unbalanced oil-vinegar scheme  

Science Conference Proceedings (OSTI)

The public key of the Oil-Vinegar scheme consists of a set of m quadratic equations in m+n variables over a finite field Fq. Kipnis and Shamir broke the balanced Oil-Vinegar scheme where d = n-m = 0 by finding equivalent ... Keywords: Kipnis-Shamir attack, Oil-Vinegar scheme, multivariate public key cryptosystem, signature scheme

Weiwei Cao; Lei Hu; Jintai Ding; Zhijun Yin

2011-05-01T23:59:59.000Z

325

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields  

E-Print Network (OSTI)

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields Electrical Engineering that the challenges software optimizers and microarchitects face every day boil down to a single problem: bottleneck cache miss or window stall. Tasks such as tuning processors for energy efficiency and finding the right

Hill, Mark D.

326

An Object-Oriented Tcl/Tk Binding for Interpreted Control of the NIST Express Toolkit in the NIST STEP Application Protocol Development Environment  

E-Print Network (OSTI)

The National Institute of Standards and Technology (NIST) has built numerous software toolkits and applications for manipulating STEP and EXPRESS data. These toolkits are traditionally used as compiled libraries which are linked to other compiled modules. This paper describes a binding allowing the toolkit interfaces to be called from interpreted scripts. This significantly reduces the time required to construct and compile new applications. An X11 extension allows the construction of graphic elements, providing easy creation and integration of existing applications into X graphic user interfaces. We describe how the combination of bindings has been used to construct a STEP Application Protocol Development Environment. Keywords: Tcl; Tk; EXPRESS; Object Oriented; National PDES Testbed; PDES; STEP; APDE; Development Environment Reprinted from Proceedings of the EXPRESS User Group Workshop (EUG `95), Grenoble, France, October 21-22, 1995. An Object-Oriented Tcl/Tk Binding for Interpr...

An Object-oriented; Don Libes; Stephen N. Clark

1995-01-01T23:59:59.000Z

327

SQLIA detection and prevention approach for RFID systems  

Science Conference Proceedings (OSTI)

While SQL injection attacks have been plaguing web application systems for years, the possibility of them affecting RFID systems was only identified very recently. However, very little work exists to mitigate this serious security threat to RFID-enabled ... Keywords: Detection and prevention, RFID, SQL injection attack, Security, Tag-born malware

Jemal Abawajy

2013-03-01T23:59:59.000Z

328

State-based network intrusion detection systems for SCADA protocols: a proof of concept  

Science Conference Proceedings (OSTI)

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere ... Keywords: IDS, SCADA systems, critical infrastructures, security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-09-01T23:59:59.000Z

329

A proposal of extension of FMS-Based mechanism to find attack paths  

Science Conference Proceedings (OSTI)

With the increase of internet service providers(companies) for the rapidly growing numbers of internet users in recent years, malicious attackers has been growing too. Due to these attacks, corporate image can be impaired significantly by such damages ...

Byung-Ryong Kim; Ki-Chang Kim

2006-05-01T23:59:59.000Z

330

Argonne applied mathematicians use INCITE awards to attack energy problems  

NLE Websites -- All DOE Office Websites (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

331

Ice slurry technology can save heart attack victims, surgery patients  

NLE Websites -- All DOE Office Websites (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

332

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

333

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

334

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

335

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks  

Science Conference Proceedings (OSTI)

SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, ... Keywords: SQL injection attacks, dynamic monitoring, retrofitting code, symbolic evaluation

Prithvi Bisht; P. Madhusudan; V. N. Venkatakrishnan

2010-02-01T23:59:59.000Z

336

Countermeasures against fault attacks on software implemented AES: effectiveness and cost  

Science Conference Proceedings (OSTI)

In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm and analyze the efficiency of these countermeasures. We propose ... Keywords: countermeasures, fault attacks, side-channel attacks

Alessandro Barenghi; Luca Breveglieri; Israel Koren; Gerardo Pelosi; Francesco Regazzoni

2010-10-01T23:59:59.000Z

337

Progress Towards Optimizing the PETSc Numerical Toolkit on the Richard Tran Mills, Eduardo F. D'Azevedo, and Mark R. Fahey  

E-Print Network (OSTI)

Progress Towards Optimizing the PETSc Numerical Toolkit on the Cray X1 Richard Tran Mills, Eduardo-implicit code for multiphase groundwater (Darcy) flow and reactive transport coauthored by Richard Mills performance tests. About the authors Richard Tran Mills is a Computational Scientist at the Center

338

Towards optimal event detection and localization in acyclic flow networks  

Science Conference Proceedings (OSTI)

Acyclic flow networks, present in many infrastructures of national importance (e.g., oil & gas and water distribution systems), have been attracting immense research interest. Existing solutions for detecting and locating attacks against these infrastructures, ...

Mahima Agumbe Suresh; Radu Stoleru; Ron Denton; Emily Zechman; Basem Shihada

2012-01-01T23:59:59.000Z

339

Denial-of-service attacks on battery-powered mobile computers  

E-Print Network (OSTI)

Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures. 1.

Thomas Martin; Michael Hsiao; Dong Ha; Jayan Krishnaswami

2004-01-01T23:59:59.000Z

340

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network (OSTI)

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

342

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol  

Science Conference Proceedings (OSTI)

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion ... Keywords: Bro, DNP3, SCADA, specification-based intrusion detection system

Hui Lin; Adam Slagell; Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer

2013-01-01T23:59:59.000Z

343

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 28540 of 31,917 results. 31 - 28540 of 31,917 results. Download Questions and Answers for the Smart Grid Investment Grant Program: Accounting Systems http://energy.gov/oe/downloads/questions-and-answers-smart-grid-investment-grant-program-accounting-systems Download Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers http://energy.gov/oe/downloads/cyber-security-audit-and-attack-detection-toolkit-national-scada-test-bed-may-2008 Download Inspection Report: INS-L-10-03 Allegations of Retaliation at a Department of Energy Site http://energy.gov/ig/downloads/inspection-report-ins-l-10-03

344

Iran's Response to a U.S. Attack  

E-Print Network (OSTI)

Click to skip to the comments section. Editor's Note: Readers, you can click the PDF button on the menu above to make this article into a PDF suitable for printing or e-reading. Michael Rienzi lays out a detailed analysis of Iran's potential reactions to a strike and finds the following thesis to be likely. Iran’s reaction to an attack by the US would be to use all means at its disposal including their large arsenal of missiles, asymmetric warfare, regular forces, and economic/political disruption methods that would cause large amounts of devastation, casualties, economic disruption, and fear; in the hopes that the enemy would lose the support of its citizens and allies, thus forcing them to end the confrontation; Iran would use all means at its disposal to accomplish this goal rather quickly as they would try to avoid an extended conflict. “Iran would not hesitate to retaliate if attacked. If enemies intend to endanger our welfare and security, we will adopt measures which will make them regret their actions."Islamic Revolutionary Guards Corps

V. Rienzi; Brig Gen; Mohammad Hejazi

2012-01-01T23:59:59.000Z

345

Sketch-based change detection: methods, evaluation, and applications  

Science Conference Proceedings (OSTI)

Traffic anomalies such as failures and attacks are commonplace in today's network, and identifying them rapidly and accurately is critical for large network operators. The detection typically treats the traffic as a collection of flows that need to be ... Keywords: change detection, data stream computation, forecasting, network anomaly detection, sketch, time series analysis

Balachander Krishnamurthy; Subhabrata Sen; Yin Zhang; Yan Chen

2003-10-01T23:59:59.000Z

346

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

347

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network (OSTI)

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

348

Development of a Toolkit for Calculating Linear, Change-Point Linear and Multiple-Linear Inverse Building Energy Analysis Models, ASHRAE Research Project 1050-RP, Final Report  

E-Print Network (OSTI)

This report summarizes the results of ASHRAE Research Project 1050: Development of a Toolkit for Calculating Linear, Change-Point Linear and Multiple Linear Inverse Building Energy Analysis Models. The Inverse Modeling Toolkit (WIT) is a FORTRAN 90 application for developing regression models of building energy use. IMT can identify single and multi-variable least-squares regression models. It can also identify variable-base degree-day and single and multi-variable change-point models, which have been shown to be especially useful for modeling building energy use. This report includes background information about IMT and the models, instructions for its installation and operation, and the results of accuracy and robustness testing.

Kissock, J. K.; Haberl, J. S.; Claridge, D. E.

2002-11-01T23:59:59.000Z

349

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

350

Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in Integrated Gas Combined Cycle Turbine Engines. Author(s), Andrew D.

351

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network (OSTI)

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

352

Real-time wind estimation and display for chem/bio attack response using UAV data .  

E-Print Network (OSTI)

??The defense response to a Chemical and Biological attack would be importantly based on predicting the dispersion of a toxic cloud. Considering that an Unmanned… (more)

Sir, CristiaÌ

2003-01-01T23:59:59.000Z

353

A simple and low cost platform to perform Power Analysis Attacks.  

E-Print Network (OSTI)

??Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it… (more)

Carmona, Manuel

2012-01-01T23:59:59.000Z

354

Wild-Inspired Intrusion Detection System Framework for High Speed Networks f|p IDS Framework  

Science Conference Proceedings (OSTI)

While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and ... Keywords: Cybernetic Attacks, Framework, High Speed Network, Intrusion Detection, Monitoring

Hassen Sallay; Mohsen Rouached; Adel Ammar; Ouissem Ben Fredj; Khalid Al-Shalfan; Majdi Ben Saad

2011-10-01T23:59:59.000Z

355

Evading stepping-stone detection under the cloak of streaming media with SNEAK  

Science Conference Proceedings (OSTI)

Network-based intrusions have become a serious threat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing ... Keywords: Stepping-stone detection, Time-based watermarking, Traffic analysis

Jaideep D. Padhye; Kush Kothari; Madhu Venkateshaiah; Matthew Wright

2010-09-01T23:59:59.000Z

356

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may… (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

357

Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention  

Science Conference Proceedings (OSTI)

A chlorine tank truck attack could cause thousands of fatalities. As a means of preventing chlorine truck attacks, I consider the on-site generation of chlorine or hypochlorite at all U.S. facilities currently receiving chlorine by truck. I develop and ... Keywords: applications, cost-effectiveness, public policy, risk analysis, terrorism, uncertainty

Anthony M. Barrett

2010-12-01T23:59:59.000Z

358

A defence scheme against Identity Theft Attack based on multiple social networks  

Science Conference Proceedings (OSTI)

Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind ... Keywords: Identity Theft Attack, Multi-dimensional social network, Social networks

Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun

2014-04-01T23:59:59.000Z

359

Program on Technology Innovation: Chloride Attack-Induced Aging of Concrete Structures in the Energy Industry  

Science Conference Proceedings (OSTI)

Corrosion of embedded steel elements (reinforcement, liner, pre- or post-tensioning device) is a major cause of structure dysfunction resulting in large maintenance and repair costs worldwide. This report focuses on chloride attack–induced aging of concrete structures in the energy industry. Chloride attack is a common aging issue caused by marine environment, the extensive ...

2012-11-30T23:59:59.000Z

360

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks  

Science Conference Proceedings (OSTI)

This paper proposes a novel approach for cryptanalysis of keystream generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis ... Keywords: LFSRs, algebraic attacks, decimation, fast correlation attack, nonlinear combination keystream generator, state transition matrix, stream ciphers

Miodrag J. Mihaljevi?; Marc P. C. Fossorier; Hideki Imai

2005-12-01T23:59:59.000Z

362

Power and EM Attacks on Passive $13.56\\,\\textrm{MHz}$ RFID Devices  

Science Conference Proceedings (OSTI)

During the last years, more and more security applications have been developed that are based on passive 13.56 MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the ... Keywords: AES, DEMA, DPA, EM Attacks, Power Analysis, RFID, Side-Channel Attacks

Michael Hutter; Stefan Mangard; Martin Feldhofer

2007-09-01T23:59:59.000Z

363

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

364

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

365

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network (OSTI)

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

366

Secure localization with phantom node detection  

Science Conference Proceedings (OSTI)

In an adversarial environment, various kinds of attacks become possible if malicious nodes could claim fake locations that are different from their physical locations. In this paper, we propose a secure localization mechanism that detects existence of ... Keywords: Decentralized algorithm, Localization, Location verification, Secure localization, Sensor networks, Speculative algorithm

Joengmin Hwang; Tian He; Yongdae Kim

2008-09-01T23:59:59.000Z

367

Literature Review of Uncertainty of Analysis Methods (Inverse Model Toolkit), Report to the Texas Commission on Environmental Quality  

E-Print Network (OSTI)

This report reviews the reported uncertainty of ASHRAE’s Inverse Model Toolkit (IMT) analysis method and the linear, and change-point linear algorithms that it uses by reviewing the published literature on the related accuracy of IMT and its algorithms versus other well-accepted statistical analysis tools, such as SAS. This report begins with a review of the history of the IMT, and the linear and change-point linear models. Then it reviews the published comparisons of the IMT and other analysis software, relying heavily on the accuracy testing that was performed as part of ASHRAE’s Research Project 1050-RP. It also includes a detailed description of the basic algorithms and an example of the IMT weather-normalization analysis. In summary, from the literature it was found that the algorithms in the IMT almost exactly reproduce the same regression analysis one would get by running any one of the programs that it was compared against (i.e., usually to several significant digits). Therefore, it can be concluded that the IMT is accurate, when it is called upon to perform weather normalized regressions for modeling building energy use.

Haberl, J. S.; Cho, S.

2004-01-01T23:59:59.000Z

368

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

369

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

370

Free energies for acid attack reactions of lithium cobaltate.  

Science Conference Proceedings (OSTI)

The attack of lithium-ion battery cathodes by stray aqueous HF, with resultant dissolution, protonation, and possibly other unintended reactions, can be a significant source of capacity fade. We explore the calculation of reaction free energies of lithium cobaltate in acid by a 'hybrid' method, in which solid-phase free energies are calculated from first principles at the generalized gradient approximation + intrasite coulomb interaction (GGA+U) level and tabulated values of ionization potentials and hydration energies are employed for the aqueous species. Analysis of the dissolution of the binary oxides Li{sub 2}O and CoO suggests that the atomic energies for Co and Li should be shifted from values calculated by first principles to yield accurate reaction free energies within the hybrid method. With the shifted atomic energies, the hybrid method was applied to analyze proton-promoted dissolution and protonation reactions of LiCoO{sub 2} in aqueous acid. Reaction free energies for the dissolution reaction, the reaction to form Co{sub 3}O{sub 4} spinel, and the proton-for-lithium exchange reaction are obtained and compared to empirical values. An extension of the present treatment to consider partial reactions is proposed, with a view to investigating interfacial and environmental effects on the dissolution reaction.

Benedek, R.; van de Walle, A.; Chemical Sciences and Engineering Division; California Inst. of Tech.

2008-01-01T23:59:59.000Z

371

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

372

Energy & Society Toolkit Appendices Toolkit Appendices  

E-Print Network (OSTI)

Bituminous Coal 25.8 25.8 24.4 27.2 Sub-bituminous Coal 26.2 26.2 25.3 27.3 Lignite 27.6 27.6 24.8 31.3 Oil Shale (& Tar Sandsc ) 29.1 29.1 24.6 34 Peat 28.9 28.9 28.4 29.5 Secondary Fuels / Products BKB & Patent

Kammen, Daniel M.

373

Machine Learning for Host-based Anomaly Detection by  

E-Print Network (OSTI)

Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences to detect novel attacks. This dissertation makes four key contributions to detect host anomalies. First, we present an unsupervised approach to clean training data using novel representations for system call sequences. Second, supervised learning with system call arguments and other attributes is proposed for enriched modeling. Third, techniques to increase model coverage for improved accuracy are presented. Fourth, we propose spatio-temporal modeling to detect suspicious behavior for mobile hosts. Experimental results on various data sets indicate that our techniques are more effective than traditional methods in capturing attack-based host anomalies. Additionally, our supervised methods create succint models and the computational overhead incurred is reasonable for an online anomaly detection system. iii Acknowledgements An ancient saying in Sanskrit: Matri devo bhava (revere your mother), pitri devo

Gaurav Tandon; Gaurav Tandon; Philip K. Chan, Ph.D.; Marius C. Silaghi, Ph.D.; Georgios C. Anagnostopoulos, Ph.D.; Gaurav Tandon; Dissertation Advisor; Philip K. Chan, Ph.D.

2008-01-01T23:59:59.000Z

374

Network anomaly detection with the restricted Boltzmann machine  

Science Conference Proceedings (OSTI)

With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and ... Keywords: Anomaly detection, Energy-based models, Intrusion detection, Restricted Boltzmann machine, Semi-supervised learning

Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santis

2013-12-01T23:59:59.000Z

375

Intrusion detection in sensor networks using clustering and immune systems  

Science Conference Proceedings (OSTI)

Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. Encryption and authentication are useless if an attacker has entered the system. Thus, a second line of defense known as Intrusion Detection must ... Keywords: genetic algorithms, immune systems, intrusion detection, self-organizing maps, wireless sensor networks

Zorana Bankovi?; José M. Moya; Álvaro Araujo; Juan-Mariano De Goyeneche

2009-09-01T23:59:59.000Z

376

Proposing a multi-touch interface for intrusion detection environments  

Science Conference Proceedings (OSTI)

Network Intrusion Detection is a critical task in today's environment, where network attacks and intrusions are everyday occurrences and state-level cyber warfare is a major concern. At the same time, it is a very difficult task, in part due to the large ... Keywords: activity theory, cognitive task analysis, data exploration, natural user interfaces, network intrusion detection visualization

Jeffrey Guenther; Fred Volk; Mark Shaneck

2010-09-01T23:59:59.000Z

377

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

378

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

379

A study on visual attack to BPCS-Steganography and countermeasure  

Science Conference Proceedings (OSTI)

This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS replaces noisy blocks with the binary patterns mapped from secret data. The logical operation called conjugate ...

Michiharu Niimi; Hideki Noda; Bruce Segee

2005-09-01T23:59:59.000Z

380

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

382

Digital Bond Fact Sheet.cdr  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

cost-shared effort between industry and cost-shared effort between industry and Cyber Security Audit and Attack Detection Toolkit Cyber Security Audit and Attack Detection Toolkit Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Digital Bond Partners: OSIsoft Tenable Network Security PacifiCorp Tennessee Valley Authority Other Participating Vendors: ABB AREVA Emerson Matrikon SNC Telvent Bandolier and Portaledge The Concept Bandolier-The Approach By building configuration audit and attack detection capabilities into tools already

383

Observing industrial control system attacks launched via metasploit framework  

Science Conference Proceedings (OSTI)

Industrial Control Systems (ICS) are present across many industries ranging from automotive to utilities. These systems have been found to be connected to corporate enterprise servers and can communicate over unencrypted communication channels. Interconnections ... Keywords: SCADA, industrial control systems, intrusion detection

Nathan Wallace, Travis Atkison

2013-04-01T23:59:59.000Z

384

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses  

E-Print Network (OSTI)

Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

Sen, Jaydip

2011-01-01T23:59:59.000Z

385

Weighting versus pruning in rule validation for detecting network and host anomalies  

Science Conference Proceedings (OSTI)

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause ... Keywords: anomaly detection, machine learning, rule pruning, rule weighting

Gaurav Tandon; Philip K. Chan

2007-08-01T23:59:59.000Z

386

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

387

APDS: Autonomous Pathogen Detection System  

SciTech Connect

An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

2002-02-14T23:59:59.000Z

388

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

389

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

390

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

391

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

392

Intrusion Detection System for Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

The deployment of Advanced Metering Infrastructure (AMI) technology significantly increases the attack surface that utilities have to protect. As a result, there is a critical need for efficient monitoring solutions to supplement protective measures and keep the infrastructure secure. This document investigates current industrial and academic efforts to address the challenge of detecting security events across the range of AMI networks and devices. The goal of this study is to help utilities and ...

2012-12-31T23:59:59.000Z

393

Practice 2006: toolkit 2020  

Science Conference Proceedings (OSTI)

This paper discusses advances in computing applications as they affect the design of the built environment. It presents emergent applications selected from Arup's current projects, examines the changing nature of the profession, and concludes with ...

Chris Luebkeman; Alvise Simondetti

2006-06-01T23:59:59.000Z

394

Tutorial : the Zoltan toolkit.  

Science Conference Proceedings (OSTI)

The outline of this presentation is: (1) High-level view of Zoltan; (2) Requirements, data models, and interface; (3) Load Balancing and Partitioning; (4) Matrix Ordering, Graph Coloring; (5) Utilities; (6) Isorropia; and (7) Zoltan2.

Boman, Erik Gunnar; Bozdag, Doruk (Ohio State University); Chevalier, Cedric; Rajamanickam, Sivasankaran; Devine, Karen Dragon; Leung, Vitus Joseph; Catalyurek, Umit (Ohio State University); Riesen, Lee Ann; Wolf, Michael Maclean

2010-08-01T23:59:59.000Z

395

toolkit expmath - CECM  

E-Print Network (OSTI)

The package is available at: http://www.nersc.gov/~dhbailey/mpdist/arprec.tar.gz Unpack this by typing: gzunip arprec.tar.gz tar xfv arprec.tar Then follow ...

396

technical committee toolkit  

Science Conference Proceedings (OSTI)

Jul 12, 2013 ... A resource which includes information guidelines and templates for committee meetings and other ... Committee Bylaws & Policies. ? Technical ... The following documents outline the procedure for proposing and selecting a ...

397

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

398

A malware detector placement game for intrusion detection  

Science Conference Proceedings (OSTI)

We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop optimal detector algorithms taking into account attacker strategies and actions. ... Keywords: game theory, monitor placement, network-based intrusion detection

Stephan Schmidt; Tansu Alpcan; ?ahin Albayrak; Tamer Ba?ar; Achim Mueller

2007-10-01T23:59:59.000Z

399

Energy Balancing Intrusion Detection System in Wireless Sensor Network  

Science Conference Proceedings (OSTI)

wireless sensor network (WSN) is vulnerable to a wide range of attacks due to deployment in the hostile ervironment and having limited resources. The security of WSN becomes a very important issue with the rapid development of WSN. Instrusion detection ... Keywords: WSN, Energy-effiency, Clustering, IDS

Chunyan Peng; Bing Liu

2012-10-01T23:59:59.000Z

400

Applying a data mining method for intrusion detection  

Science Conference Proceedings (OSTI)

Widespread use of networked computers has made computer security a serious issue. Every networked computer, to varying degrees, is vulnerable to malicious computer attacks that can result in a range of security violations, such as, unauthorized user ... Keywords: classification tree, data mining, misuse detection

Vera Marinova-Boncheva

2007-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network (OSTI)

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

402

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

403

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

404

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Chien, Andrew A.

405

[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches  

Science Conference Proceedings (OSTI)

In this paper, we suggest handling security in embedded systems by introducing a small architectural change. We propose the use of a non-deterministic branch instruction to generate non-determinism in the execution of encryption algorithms. Non-determinism ... Keywords: embedded system security, side-channel attacks, hiding countermeasure

Pedro Malagon, Juan-Mariano de Goyeneche, Marina Zapater, Jose M. Moya

2010-01-01T23:59:59.000Z

406

False data injection attacks against state estimation in electric power grids  

Science Conference Proceedings (OSTI)

A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, ... Keywords: Power grids, attack, state estimation

Yao Liu; Peng Ning; Michael K. Reiter

2011-05-01T23:59:59.000Z

407

Not-a-Bot: improving service availability in the face of botnet attacks  

Science Conference Proceedings (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic ...

Ramakrishna Gummadi; Hari Balakrishnan; Petros Maniatis; Sylvia Ratnasamy

2009-04-01T23:59:59.000Z

408

Contactless electromagnetic active attack on ring oscillator based true random number generator  

Science Conference Proceedings (OSTI)

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some ... Keywords: EM injections, IEMI, TRNGs, active attacks, ring oscillators

Pierre Bayon; Lilian Bossuet; Alain Aubert; Viktor Fischer; François Poucheret; Bruno Robisson; Philippe Maurine

2012-05-01T23:59:59.000Z

409

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid is a new type of energy-based cyber physical system (CPS) that will provide reliable, secure, and efficient energy transmission and distribution. The way to secure the distributed energy routing process that efficiently utilizes the distributed ... Keywords: Smart grid, Distributed energy routing, False data injection attacks, Energy distribution

Jie Lin; Wei Yu; Xinyu Yang; Guobin Xu; Wei Zhao

2012-04-01T23:59:59.000Z

410

A Look In the Mirror: Attacks on Package Managers Author Names Removed for Anonymous Submission  

E-Print Network (OSTI)

for security. There is no protection of package metadata or the root metadata. Package Metadata An attacker can of the package in the package meta- data protects the package from tampering. Packages Resistance to metadata, the package metadata is protected from tam- pering. Packages The signature on the root metadata prevents

Hartman, John H.

411

Iago attacks: why the system call API is a bad untrusted RPC interface  

Science Conference Proceedings (OSTI)

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted application's state. Under such ... Keywords: iago attacks, overshadow, system call

Stephen Checkoway; Hovav Shacham

2013-04-01T23:59:59.000Z

412

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

413

The Small and Silent Force Multiplier: A Swarm UAV--Electronic Attack  

Science Conference Proceedings (OSTI)

At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) ... Keywords: Electronic attack, Electronic warfare, Swarm UAV, UAS, UAV, Unmanned Aircraft Systems, Unmanned aerial vehicle

Polat Cevik; Ibrahim Kocaman; Abdullah S. Akgul; Barbaros Akca

2013-04-01T23:59:59.000Z

414

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

415

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation  

E-Print Network (OSTI)

Frequency and intensity of Internet attacks are rising with an alarming pace. Several technologies and concepts were proposed for fighting distributed denial of service (DDoS) attacks: traceback, pushback, i3, SOS and Mayday. This paper shows that in the case of DDoS reflector attacks they are either ineffective or even counterproductive. We then propose a novel concept and system that extends the control over network traffic by network users to the Internet using adaptive traffic processing devices. We safely delegate partial network management capabilities from network operators to network users. All network packets with a source or destination address owned by a network user can now also be controlled within the Internet instead of only at the network user's Internet uplink. By limiting the traffic control features and by restricting the realm of control to the "owner" of the traffic, we can rule out misuse of this system. Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, new ways of collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.

Thomas Dübendorfer; Matthias Bossardt; Bernhard Plattner

2005-01-01T23:59:59.000Z

416

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

417

Regulating Greenhouse Gas 'Leakage': How California Can Evade the Impending Constitutional Attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation. (author)

Potts, Brian H.

2006-06-15T23:59:59.000Z

418

Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

Brian H. Potts

2006-06-15T23:59:59.000Z

419

Increasing coverage to improve detection of network and host anomalies  

E-Print Network (OSTI)

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause false alarms. However, removing rules with possible high coverage can lead to missed detections. We propose three techniques for increasing coverage- Weighting, Replacement and Hybrid. Weighting retains previously pruned rules and associate weights to them. Replacement, on the other hand, substitutes pruned rules with other candidate rules to ensure high coverage. We also present a Hybrid approach that selects between the two techniques based on training data coverage. Empirical results from seven data sets indicate that, for LERAD, increasing coverage by Weighting, Replacement and Hybrid detects more attacks than Pruning with minimal computational overhead.

Gaurav Tandon; Philip K. Chan

2007-01-01T23:59:59.000Z

420

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps  

Science Conference Proceedings (OSTI)

The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific ... Keywords: Smart Grid Communications, Anomaly Detection, Self-Organizing Maps, Intrusion Detection

Zubair Ahmed Baig, Saif Ahmad, Sadiq Mohammed Sait

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Radioactive Contraband Detection: A Bayesian Approach  

SciTech Connect

Radionuclide emissions from nuclear contraband challenge both detection and measurement technologies to capture and record each event. The development of a sequential Bayesian processor incorporating both the physics of gamma-ray emissions and the measurement of photon energies offers a physics-based approach to attack this challenging problem. It is shown that a 'physics-based' structure can be used to develop an effective detection technique, but also motivates the implementation of this approach using or particle filters to enhance and extract the required information.

Candy, J; Breitfeller, E; Guidry, B; Manatt, D; Sale, K; Chambers, D; Axelrod, M; Meyer, A

2009-03-16T23:59:59.000Z

422

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks  

E-Print Network (OSTI)

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Padmavathi, Dr G

2009-01-01T23:59:59.000Z

423

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)  

E-Print Network (OSTI)

Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

CERN. Geneva

2012-01-01T23:59:59.000Z

424

The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis  

SciTech Connect

This paper develops a bottom-up approach that focuses on behavioral responses in estimating the total economic impacts of the September 11, 2001, World Trade Center (WTC) attacks. The estimation includes several new features. First, is the collection of data on the relocation of firms displaced by the attack, the major source of resilience in muting the direct impacts of the event. Second, is a new estimate of the major source of impacts off-site -- the ensuing decline of air travel and related tourism in the U.S. due to the social amplification of the fear of terrorism. Third, the estimation is performed for the first time using Computable General Equilibrium (CGE) analysis, including a new approach to reflecting the direct effects of external shocks. This modeling framework has many advantages in this application, such as the ability to include behavioral responses of individual businesses and households, to incorporate features of inherent and adaptive resilience at the level of the individual decision maker and the market, and to gauge quantity and price interaction effects across sectors of the regional and national economies. We find that the total business interruption losses from the WTC attacks on the U.S. economy were only slightly over $100 billion, or less than 1.0% of Gross Domestic Product. The impacts were only a loss of $14 billion of Gross Regional Product for the New York Metropolitan Area.

Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois; Asay, Gary [University of Southern California

2009-01-01T23:59:59.000Z

425

Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.  

SciTech Connect

ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

D.R. Coyle; D.C. Booth: M.S. Wallace

2005-12-01T23:59:59.000Z

426

Comparison of chiller models for use in model-based fault detection  

Science Conference Proceedings (OSTI)

Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Factors that are considered in evaluating a model include accuracy, training data requirements, calibration effort, generality, and computational requirements. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression chillers. Three different models were studied: the Gordon and Ng Universal Chiller model (2nd generation) and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles, and the DOE-2 chiller model, as implemented in CoolTools{trademark}, which is empirical. The models were compared in terms of their ability to reproduce the observed performance of an older, centrifugal chiller operating in a commercial office building and a newer centrifugal chiller in a laboratory. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

Sreedharan, Priya; Haves, Philip

2001-06-07T23:59:59.000Z

427

Comparison of Chiller Models for Use in Model-Based Fault Detection  

E-Print Network (OSTI)

Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Factors that are considered in evaluating a model include accuracy, training data requirements, calibration effort, generality, and computational requirements. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression chillers. Three different models were studied: the Gordon and Ng Universal Chiller model (2nd generation) and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles, and the DOE-2 chiller model, as implemented in CoolToolsTM, which is empirical. The models were compared in terms of their ability to reproduce the observed performance of an older, centrifugal chiller operating in a commercial office building and a newer centrifugal chiller in a laboratory. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

Sreedhara, P.; Haves, P.

2001-01-01T23:59:59.000Z

428

Protecting Buildings From a Biological or Chemical Attack: actions to take  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

429

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network (OSTI)

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

430

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune,  

E-Print Network (OSTI)

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune 55455 {pwang,tyra,dchantin,malchow,foo,hopper,kyd}@cs.umn.edu ABSTRACT The Kad network

Kim, Dae-Shik

431

Using GIS technology to manage information following a bio-terrorism attack.  

Science Conference Proceedings (OSTI)

The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

2005-05-01T23:59:59.000Z

432

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

433

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

SciTech Connect

This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

2009-11-15T23:59:59.000Z

434

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

435

Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments  

DOE Green Energy (OSTI)

Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

1993-09-01T23:59:59.000Z

436

Semantic security analysis of SCADA networks to detect malicious control commands in power grids  

Science Conference Proceedings (OSTI)

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes ... Keywords: contingency analysis, intrusion detection system, scada, semantic analysis

Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer

2013-11-01T23:59:59.000Z

437

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection  

Science Conference Proceedings (OSTI)

Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols ...

Guofei Gu; Roberto Perdisci; Junjie Zhang; Wenke Lee

2008-07-01T23:59:59.000Z

438

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

801 - 15810 of 31,917 results. 801 - 15810 of 31,917 results. Download Fuzhou Sunlight: Noncompliance Determination (2010-SE-1402) DOE issued a Notice of Noncompliance Determination to Fuzhou Sunlight Lighting Electrical Appliance Co., Ltd. finding that a variety of models of incandescent reflector lamps do not comport with the energy conservation standards. http://energy.gov/gc/downloads/fuzhou-sunlight-noncompliance-determination-2010-se-1402 Download Conflict of Interest and Nondisclosure Acknowledgement http://energy.gov/management/downloads/conflict-interest-and-nondisclosure-acknowledgement-0 Download Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the

439

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 24740 of 26,764 results. 31 - 24740 of 26,764 results. Download http://energy.gov/management/downloads-11 Download AttachmentFlash_2011-20.pdf http://energy.gov/management/downloads/attachmentflash2011-20pdf Download E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory http://energy.gov/management/downloads/e-idr-inventory-disclosure-record-pia-idaho-national-laboratory Download Objections to the Nov. 2006 Special Environmental Analysis (SEA) by the Department of Energy from Elizabeth C. Chimento http://energy.gov/oe/downloads/objections-nov-2006-special-environmental-analysis-sea-department-energy-elizabeth-c Download Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will

440

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

NLE Websites -- All DOE Office Websites (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

On wormhole attacks in underwater sensor networks: A two-tier localization approach  

E-Print Network (OSTI)

Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper we show that underwater denial-of-service attack imposes great threats to any UWSN. Without proper countermeasures, underwater sensor networking is a mission impossible. We propose a localization based approach to answer the challenge. In our design, DUB and DDB, a pair of efficient single-round distance measuring schemes, are critical building blocks to realize our approach inspite of constrained node capability and floating node mobility. In addition, to cope with low/medium node mobiltiy, we propose a two-tier localization scheme to identify short-range wormholes instantly, and long-haul wormholes within a limited latency. Our simulation and implementation confirm the effectiveness of our design. I.

Jiejun Kong; Zhengrong Ji; Weichao Wang; Mario Gerla; Rajive Bagrodia

2004-01-01T23:59:59.000Z

442

WeaselBoard : zero-day exploit detection for programmable logic controllers.  

SciTech Connect

Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

2013-10-01T23:59:59.000Z

443

A dose point kernel database using GATE Monte Carlo simulation toolkit for nuclear medicine applications: Comparison with other Monte Carlo codes  

Science Conference Proceedings (OSTI)

Purpose: GATE is a Monte Carlo simulation toolkit based on the Geant4 package, widely used for many medical physics applications, including SPECT and PET image simulation and more recently CT image simulation and patient dosimetry. The purpose of the current study was to calculate dose point kernels (DPKs) using GATE, compare them against reference data, and finally produce a complete dataset of the total DPKs for the most commonly used radionuclides in nuclear medicine. Methods: Patient-specific absorbed dose calculations can be carried out using Monte Carlo simulations. The latest version of GATE extends its applications to Radiotherapy and Dosimetry. Comparison of the proposed method for the generation of DPKs was performed for (a) monoenergetic electron sources, with energies ranging from 10 keV to 10 MeV, (b) beta emitting isotopes, e.g., {sup 177}Lu, {sup 90}Y, and {sup 32}P, and (c) gamma emitting isotopes, e.g., {sup 111}In, {sup 131}I, {sup 125}I, and {sup 99m}Tc. Point isotropic sources were simulated at the center of a sphere phantom, and the absorbed dose was stored in concentric spherical shells around the source. Evaluation was performed with already published studies for different Monte Carlo codes namely MCNP, EGS, FLUKA, ETRAN, GEPTS, and PENELOPE. A complete dataset of total DPKs was generated for water (equivalent to soft tissue), bone, and lung. This dataset takes into account all the major components of radiation interactions for the selected isotopes, including the absorbed dose from emitted electrons, photons, and all secondary particles generated from the electromagnetic interactions. Results: GATE comparison provided reliable results in all cases (monoenergetic electrons, beta emitting isotopes, and photon emitting isotopes). The observed differences between GATE and other codes are less than 10% and comparable to the discrepancies observed among other packages. The produced DPKs are in very good agreement with the already published data, which allowed us to produce a unique DPKs dataset using GATE. The dataset contains the total DPKs for {sup 67}Ga, {sup 68}Ga, {sup 90}Y, {sup 99m}Tc, {sup 111}In, {sup 123}I, {sup 124}I, {sup 125}I, {sup 131}I, {sup 153}Sm, {sup 177}Lu {sup 186}Re, and {sup 188}Re generated in water, bone, and lung. Conclusions: In this study, the authors have checked GATE's reliability for absorbed dose calculation when transporting different kind of particles, which indicates its robustness for dosimetry applications. A novel dataset of DPKs is provided, which can be applied in patient-specific dosimetry using analytical point kernel convolution algorithms.

Papadimitroulas, Panagiotis; Loudos, George; Nikiforidis, George C.; Kagadis, George C. [Department of Medical Physics, School of Medicine, University of Patras, Rion, GR 265 04 (Greece) and Department of Medical Instruments Technology, Technological Educational institute of Athens, Ag. Spyridonos Street, Egaleo GR 122 10, Athens (Greece); Department of Medical Instruments Technology, Technological Educational institute of Athens, Ag. Spyridonos Street, Egaleo GR 122 10, Athens (Greece); Department of Medical Physics, School of Medicine, University of Patras, Rion, GR 265 04 (Greece)

2012-08-15T23:59:59.000Z

444

Detection and Analysis of Threats to the Energy Sector: DATES  

Science Conference Proceedings (OSTI)

This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

Alfonso Valdes

2010-03-31T23:59:59.000Z

445

Evaluation of chiller modeling approaches and their usability for fault detection  

Science Conference Proceedings (OSTI)

Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Several factors must be considered in model evaluation, including accuracy, training data requirements, calibration effort, generality, and computational requirements. All modeling approaches fall somewhere between pure first-principles models, and empirical models. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression air conditioning units, which are commonly known as chillers. Three different models were studied: two are based on first-principles and the third is empirical in nature. The first-principles models are the Gordon and Ng Universal Chiller model (2nd generation), and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles. The DOE-2 chiller model as implemented in CoolTools{trademark} was selected for the empirical category. The models were compared in terms of their ability to reproduce the observed performance of an older chiller operating in a commercial building, and a newer chiller in a laboratory. The DOE-2 and Gordon-Ng models were calibrated by linear regression, while a direct-search method was used to calibrate the Toolkit model. The ''CoolTools'' package contains a library of calibrated DOE-2 curves for a variety of different chillers, and was used to calibrate the building chiller to the DOE-2 model. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

Sreedharan, Priya

2001-05-01T23:59:59.000Z

446

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

447

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

Science Conference Proceedings (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

448

On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs  

Science Conference Proceedings (OSTI)

Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to protect the intellectual property and to prevent fraud, ... Keywords: FPGA, bitstream encryption, side-channel attacks, triple des

Amir Moradi; Alessandro Barenghi; Timo Kasper; Christof Paar

2011-10-01T23:59:59.000Z

449

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

450

Detection device  

DOE Patents (OSTI)

The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

Smith, J.E.

1981-02-27T23:59:59.000Z

451

Detection Apparatus  

DOE Patents (OSTI)

This invention concerns a sensitive apparatus for detecting and counting neutrons, particularly neutrons liberated in an alpha, neutron reaction. The apparatus includes an improved ionization chamber structure together with an improved combination alpha-particle source and holder for the material under test.

Anderson, H.L.

1950-07-31T23:59:59.000Z

452

Fire initiation and spread in urban areas due to nuclear attack  

SciTech Connect

Calculation of fire development in urban areas is a critical step in estimating the global effects of nuclear warfare with regard to smoke production and transport. As part of the first phase of a program to improve our ability to calculate fire starts and spread in urban areas, we have performed a parameter sensitivity analysis using the three codes originally developed for civil defense planning by the IIT Research Institute. We have added graphics and made slight improvements to the codes and applied them to the representation of the San Jose urban area used in the Five-City Study of the late 1960s. For a chosen reference attack scenario, we have varied parameters and compared the results to those of a representative baseline case. The parameters varied included: atmospheric visibility, lowest of the various critical ignition energies of window coverings, shading of windows by trees and awnings, extent of blast extinguishment of fires, secondary ignitions, window glass transmittance, specific firebrand generation rate, firebrand distribution range, windspeed, building densities, specific fuel loadings, and window sizes. 13 references, 10 figures, 5 tables.

Reitter, T.A.; Takata, A.N.; Kang, S.W.

1984-09-01T23:59:59.000Z

453

OECD Sustainable Manufacturing Metrics Toolkit  

Science Conference Proceedings (OSTI)

... Responding to industry demand with the goal of creating a ... project, many costs fall, but energy costs increase ... start with a cash flow projection to help ...

2012-05-30T23:59:59.000Z

454

Tcl and the Tk Toolkit  

E-Print Network (OSTI)

This book is about two packages called Tcl and Tk. Together they provide a programming system for developing and using graphical user interface (GUI) applications. Tcl stands for "tool command language" and is pronounced "tickle"; is a simple scripting language for controlling and extending applications. It provides generic programming facilities that are useful for a variety of applications, such as variables and loops and procedures. Fur-thermore, Tcl is embeddable: its interpreter is implemented as a library of C procedures that can easily be incorporated into applications, and each application can extend the core Tcl features with additional commands specific to that application.

John K. Ousterhout

1994-01-01T23:59:59.000Z

455

NREL: International Activities - Geospatial Toolkits  

NLE Websites -- All DOE Office Websites (Extended Search)

(EXE 96.8 MB) October 2013 UNEP India (EXE 131.0 MB) October 2013 USDOE, USDOS Indonesia (EXE 564.1 MB) October 2013 USAID Malaysia (EXE 186.4 MB) October 2013 USAID Nepal...

456

Pakistan Geospatial Toolkit - Data Lite  

Open Energy Info (EERE)

data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing...

457

Afghanistan Geospatial Toolkit - Full Data  

Open Energy Info (EERE)

data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing...

458

Afghanistan Geospatial Toolkit - Data Lite  

Open Energy Info (EERE)

data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing...

459

Pakistan Geospatial Toolkit - Full Data  

Open Energy Info (EERE)

data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing...

460

DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks  

Science Conference Proceedings (OSTI)

Wireless Mesh Networks (WMN) are particularly vulnerable to attacks, since they feature constraint nodes, multi-hop communication, and an open wireless communication channel. These features limit the feasibility of the deployment of contemporary Intrusion ... Keywords: intrusion detection, security, wireless mesh networks

Rodrigo do Carmo; Matthias Hollick

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

TMTI Task 1.6 Genetic Engineering Methods and Detection  

Science Conference Proceedings (OSTI)

A large number of GE techniques can be adapted from other microorganisms to biothreat bacteria and viruses. Detection of GE in a microorganism increases in difficulty as the size of the genetic change decreases. In addition to the size of the engineered change, the consensus genomic sequence of the microorganism can impact the difficulty of detecting an engineered change in genomes that are highly variable from strain to strain. This problem will require comprehensive databases of whole genome sequences for more genetically variable biothreat bacteria and viruses. Preliminary work with microarrays for detecting synthetic elements or virulence genes and analytic bioinformatic approaches for whole genome sequence comparison to detect genetic engineering show promise for attacking this difficult problem but a large amount of future work remains.

Slezak, T; Lenhoff, R; Allen, J; Borucki, M; Vitalis, E; Gardner, S

2009-12-04T23:59:59.000Z

462

Spectroscopic detection  

DOE Patents (OSTI)

In embodiments, spectroscopic monitor monitors modulated light signals to detect low levels of contaminants and other compounds in the presence of background interference. The monitor uses a spectrometer that includes a transmissive modulator capable of causing different frequency ranges to move onto and off of the detector. The different ranges can include those with the desired signal and those selected to subtract background contributions from those with the desired signal. Embodiments of the system are particularly useful for monitoring metal concentrations in combustion effluent.

Woskov, Paul P. (Bedford, MA); Hadidi, Kamal (Cambridge, MA)

2003-01-01T23:59:59.000Z

463

PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY  

Science Conference Proceedings (OSTI)

Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

Flach, G.

2009-12-11T23:59:59.000Z

464

Coordinated Cyber-Physical Attacks, High-Impact Low-Frequency (HILF) Events, and Risk Management in the Electric Sector  

Science Conference Proceedings (OSTI)

Although the North American electricity grid is one of the most reliable power systems in the world, the high-impact low-frequency (HILF) class of rare but potentially catastrophically damaging events is of growing concern in the industry. This white paper summarizes key activities under two EPRI initiatives that address a HILF cyber-physical attack as well as risk assessment approaches and management tools relevant to a HILF event.EPRI’s Cyber Security and Privacy Program ...

2012-12-12T23:59:59.000Z

465

Summary of Analytical Electron Microscopy Observation of Intergranular Attack and Stress Corrosion Cracks in Alloy 600 Steam Generator Tubing  

Science Conference Proceedings (OSTI)

High-resolution analytical transmission electron microscopy (ATEM) can identify structures and compositions of corrosion products in attacked boundaries, cracks, and crack tips to help assess impurities that promote intergranular degradation. ATEM analyses has recently been performed on samples from Watts Bar 1 and Diablo Canyon 2 steam generator (SG) tubing and has revealed that lead (Pb) was involved in intergranular stress corrosion cracking (IGSCC). These new results in combination with previous resu...

2005-04-29T23:59:59.000Z

466

Radon detection  

DOE Patents (OSTI)

A detector for atmospheric radon using a long range alpha detector as its sensing element is described. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding. 3 figures.

MacArthur, D.W.; Allander, K.S.; Bounds, J.A.

1994-01-25T23:59:59.000Z

467

Radon detection  

DOE Patents (OSTI)

A detector for atmospheric radon using a long range alpha detector as its sensing element. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding.

MacArthur, Duncan W. (Los Alamos, NM); Allander, Krag S. (Ojo Caliente, NM); Bounds, John A. (Los Alamos, NM)

1994-01-01T23:59:59.000Z

468

Fuel washout detection system  

DOE Patents (OSTI)

A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

469

Automatic Detection of Unsafe Component Loadings  

E-Print Network (OSTI)

Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is critical for reliable and secure software execution, however, programming mistakes may lead to unintended or even malicious components to be resolved and loaded. In particular, dynamic loading can be hijacked by placing an arbitrary file with the specified name in a directory searched before resolving the target component. Although this issue has been known for quite some time, it was not considered serious because exploiting it requires access to the local file system on the vulnerable host. Recently such vulnerabilities started to receive considerable attention as their remote exploitation became realistic; it is now important to detect and fix these vulnerabilities. In this paper, we present the first automated technique to detect vulnerable and unsafe dynamic component loadings. Our analysis has two phases: 1) apply dynamic binary instrumentation to collect runtime information on component loading (online phase); and 2) analyze the collected information to detect vulnerable component loadings (offline phase). For evaluation, we implemented our technique to detect vulnerable and unsafe DLL loadings in popular Microsoft Windows software. Our results show that unsafe DLL loading is prevalent and can lead to serious security threats. Our tool detected more than 1,700 unsafe DLL loadings in 28 widely used software and discovered serious attack vectors for remote code execution. Microsoft has opened a Microsoft Security Response Center (MSRC) case on our reported issues and is working with us and other affected software vendors to develop necessary patches.

Taeho Kwon; Zhendong Su

2010-01-01T23:59:59.000Z

470

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

471

Fieldable Fourier Transform Spectrometer: System Construction, Background Variability Measurements, and Chemical Attack Warning Experiments  

SciTech Connect

The infrared sensors task at the Pacific Northwest National Laboratory (PNNL) is focused on the science and technology of remote and in-situ chemical sensors for detecting proliferation and countering terrorism. Missions to be addressed by remote chemical sensor development will include detecting proliferation of nuclear or chemical weapons, and providing warning of terrorist use of chemical weapons. Missions to be addressed by in-situ chemical sensor development include countering terrorism by screening luggage, personnel, and shipping containers for explosives, firearms, narcotics, chemical weapons, or chemical weapons residues, and mapping contaminated areas. The science and technology relevant to these primary missions is also likely to be useful for battlefield chemical weapons defense, air operations support, monitoring emissions from chemical weapons destruction facilities or industrial chemical plants, and law enforcement applications. PNNL will seek to serve organizations with direct interest in these missions through collaborative research and development efforts approved by NA-22. During FY02, PNNL began assembling a remote IR detection capability that would allow field experiments to be conducted. The capability consists of a commercially available FTIR (Fourier Transform Infrared) emission spectrometer and a frequency-modulation differential-absorption LIDAR (FM-DIAL) system being developed at PNNL. To provide environmental protection for these systems, a large, well insulated, temperature controlled trailer was specified and procured. While the FTIR system was field-ready, the FM-DIAL system required many modifications to prepare for field deployment. This document provides an overview of the FTIR system, summarizes the modifications made to the FM-DIAL system, and describes the salient features of the remote systems trailer.

Hatchell, Brian K.; Harper, Warren W.; Batishko, Charles R.; Johnson, Timothy J.; Sheen, David M.; Stewart, Timothy L.; Schultz, John F.

2002-10-01T23:59:59.000Z

472

Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations  

E-Print Network (OSTI)

activities based on communication technology choices: early-of what their communications technology choices may revealall avail- able communications technology use records over

Drozdova, Katya; Samoilov, Michael

2010-01-01T23:59:59.000Z

473

How to Detect Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Detect Radiation How to Survey Measurement Safety Around Radiation Sources Types of Radiation Exposure Managing Radiation Emergencies Procedure Demonstration Detection How...

474

Portable modular detection system  

Science Conference Proceedings (OSTI)

Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

2009-10-13T23:59:59.000Z

475

Radiation Detection Instruments  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Radiation Detection Instruments. In 2005, the Department of Homeland Security requested ...

2013-09-06T23:59:59.000Z

476

Development of prototype guidelines for risk management against terror attack in the tourism industry: a Delphi study  

E-Print Network (OSTI)

The purpose of the study was to gather strategies and factors from tourism security professionals from which terrorism risk management policies can be developed. This study utilized the Delphi method in order to provide structure for the group process. Twelve tourism security experts made up the panel completing three rounds of questionnaires via the email based Delphi technique. This research identified fifty-four strategies to reduce the propensity of terror attack at a tourism venue. Those strategies were divided into four levels of priority based on criticality and feasibility. The fifty-four strategies were grouped into nine subordinate categories. The subordinate categories were related to Training, Communications/ Liaison, Planning/ Assessment, Background Checks, ID Badges/ Secure Entrance, Specialty Security Units, Architectural Design, Media Cooperation, and Technology Based strategies. Alongside the strategies are a collection of comments by the experts regarding strengths, weaknesses, and any barriers to implementation pertaining to the individual strategy. Tourism risk managers, security personnel, and insurance underwriters can all use the results in reducing the opportunity for a terrorist attack at a tourism venue. Major research findings from this study included: 1. The strategy receiving the highest criticality ranking over all other strategies involves training first responders on their role in circumventing the success of terrorists. 2. The subordinate category Communication/ Liaison contains the largest number of strategies indicating the significance of this category among experts. 3. The subordinate category of Specialty Security Units contains the second highest number of strategies indicating the importance of the topic among experts. 4. All of the technology based strategies fell into the lowest priority level. Based on the findings of this study, researcher recommendations include: 1. The guidelines developed in this study should be used by operators of tourism venues to make the best use of limited resources. 2. National or international conferences should be established to further discuss these issues. 3. A greater number of communications mediums should be established to facilitate the exchange of ideas and experiences between affected professionals. 4. Insurance providers should use this information to establish validated guidelines so that, if prospective clients adhered to the recommendations, a reduction in premiums could be offered. 5. Other entities may benefit from this study, such as public school systems, the energy production industry, hospital systems, and pipeline systems.

Smith, Clifford Keith

2003-05-01T23:59:59.000Z

477

Intrusion Detection: Characterising intrusion detection sensors  

Science Conference Proceedings (OSTI)

An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience ...

Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen

2008-09-01T23:59:59.000Z

478

Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate  

SciTech Connect

Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

2002-05-03T23:59:59.000Z

479

Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances  

E-Print Network (OSTI)

When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a file server virtual machine running on the same physical host and export it to other virtual machines running on the same host. We implement this private file server virtual machine using a modified version of an NFS server installed in a virtual machine under various virtualization environments such as Xen and VMware. We also demonstrate that by placing the user’s applications in a virtual machine rather than directly on the base machine we can provide near instant recovery of system configuration information. We quantify the costs of this architecture by comparing benchmarks running directly on a base operating system and accessing data in a local filesystem to those running in a guest operating system and accessing data in an NFS partition mounted from a file server virtual machine. We find that for Xen the overhead of read intensive workloads is at most 5 % and for write intensive workloads the overhead is at most 24%. For system benchmarks that stress CPU and memory performance, we see no noticeable degradation.

Jeanna N. Matthews; Jason J. Herne; Todd M. Deshane; Patty A. Jablonski; Leslie R. Cherian; Mike T. Mccabe

2005-01-01T23:59:59.000Z

480

Parallelizing data race detection  

Science Conference Proceedings (OSTI)

Detecting data races in multithreaded programs is a crucial part of debugging such programs, but traditional data race detectors are too slow to use routinely. This paper shows how to speed up race detection by spreading the work across multiple cores. ... Keywords: data race detection, uniparallelism

Benjamin Wester; David Devecsery; Peter M. Chen; Jason Flinn; Satish Narayanasamy

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Patterns of heart attacks  

E-Print Network (OSTI)

Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

Shenk, Kimberly N

2010-01-01T23:59:59.000Z

482

Control systems under attack?  

E-Print Network (OSTI)

The enormous growth of the Internet during the last decade offers new means to share and distribute both information and data. In Industry, this results in a rapprochement of the production facilities, i.e. their Process Control and Automation Systems, and the data warehouses. At CERN, the Internet opens the possibility to monitor and even control (parts of) the LHC and its four experiments remotely from anywhere in the world. However, the adoption of standard IT technologies to Distributed Process Control and Automation Systems exposes inherent vulnerabilities to the world. The Teststand On Control System Security at CERN (TOCSSiC) is dedicated to explore the vulnerabilities of arbitrary Commercial-Of-The-Shelf hardware devices connected to standard Ethernet. As such, TOCSSiC should discover their vulnerabilities, point out areas of lack of security, and address areas of improvement which can then be confidentially communicated to manufacturers. This paper points out risks of accessing the Control and Automa...

Lüders, Stefan

2005-01-01T23:59:59.000Z

483

Inhibiting card sharing attacks  

Science Conference Proceedings (OSTI)

The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number ...

Michael Tunstall; Konstantinos Markantonakis; Keith Mayes

2006-10-01T23:59:59.000Z

484

Attacks on Emerging Architectures  

E-Print Network (OSTI)

Application Academia AJAXIm FaceBook Chat ParseUri PlaxoTo support this interaction, Facebook provides a JavaScriptwhich in turn communicate with Facebook. The cross-origin

Hanna, Steven Craig

2012-01-01T23:59:59.000Z

485

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

486

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z