Powered by Deep Web Technologies
Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

2

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

3

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

4

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

5

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

6

An Energy-Harvesting Sensor Architecture and Toolkit for Building Monitoring and Event Detection  

E-Print Network [OSTI]

An Energy-Harvesting Sensor Architecture and Toolkit for Building Monitoring and Event Detection of Michigan Ann Arbor, MI 48109 {bradjc,prabal}@umich.edu Abstract Understanding building usage patterns a new architecture for design- ing building-monitoring focused energy-harvesting sensors. The key

Dutta, Prabal

7

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

8

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

9

Framework for using grocery data for early detection of bio-terrorism attacks  

E-Print Network [OSTI]

Framework for using grocery data for early detection of bio-terrorism attacks #3; Anna Goldenberg 15213 anya@cmu.edu October 16, 2001 Abstract Early detection of epidemics and bio-terrorism attacks. The main goal of this project is to investigate the possibility of detecting epidemics and bio-terrorism

Goldenberg, Anna

10

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table... are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table...

Ramanathan, Anu

2012-06-07T23:59:59.000Z

11

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

12

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

13

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

14

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

15

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks*  

E-Print Network [OSTI]

can work cooperatively to raise early warning to avoid catastrophic damages. This paper proposes) mechanism to enable early detection of DDoS attacks on community networks. We want to detect flooding. * Manuscript submitted on March 10, 2006 to the IEEE International Symposium on Collaborative Technologies

Chen, Yu

16

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

17

Automated Detection of Persistent Kernel Control-Flow Attacks  

E-Print Network [OSTI]

enforcement as part of the Xen and VMware vir- tual machine monitors. Our implementation detected all directly, e.g., by using a virtual machine monitor or a separate card to examine kernel memory [14, 38, 23's main goal is to add surreptitious functionality to the system, then either this functionality

Hicks, Michael

18

Automated Detection of Persistent Kernel Control-Flow Attacks  

E-Print Network [OSTI]

machine monitors. Our implementation detected all the control-flow modifying rootkits we could install.g., by using a virtual machine monitor or a separate card to examine kernel memory [14, 37, 23], or may's main goal is to add surreptitious functionality to the system, then either this functionality

Hicks, Michael

19

Signs of a Heart Attack - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletter & Updates > Safety Meeting Toolkits > Signs of a Heart Attack Newsletter & Updates Health News & InsideOut Newsletter Pandemic Preparedness Diabetes Ergonomic Awareness...

20

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed  

E-Print Network [OSTI]

detection is an essential to minimize the damage of distributed denial of services (DDoS) attacks. However of the flooding traffic [13, 20]. Unfortunately, damages have already been caused when consequences are observed Experimentation and Test, in conjunction with USENIX Security Symposium, Boston, MA. August 6-7, 2007

Chen, Yu

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Alternative energy design toolkit  

E-Print Network [OSTI]

This thesis concerns the concepts, structure, and applications of the Alternative Energy Design Toolkit. The toolkit is aimed to provide a widely accessible, easy to use, flexible, yet powerful modeling environment for ...

Sukkasi, Sittha

2004-01-01T23:59:59.000Z

22

Residential Marketing Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Showerheads Residential Weatherization Performance Tested Comfort Systems Ductless Heat Pumps New Construction Residential Marketing Toolkit Retail Sales Allocation Tool...

23

Energy & Society Toolkit Appendices Toolkit Appendices  

E-Print Network [OSTI]

Table of Contents 1. Orders of Magnitude 3 2. Units and Conversion Factors 4 2.1. Distance 4 2.2. Area 4.3. Renewable Energy Resources 11 5.4. Emissions Factors 11 6. References 15 #12;Energy & Society Toolkit Toolkit Appendices 4 2. UNITS AND CONVERSION FACTORS 2.1. Distance 1 meter (m) = 3.281 feet (ft) = 39

Kammen, Daniel M.

24

Commercial Marketing Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Commercial-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors Technology...

25

Agricultural Marketing Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agricultural-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors...

26

Category:LEDS Toolkit | Open Energy Information  

Open Energy Info (EERE)

Toolkit Toolkit Jump to: navigation, search This page contains toolkits meant to support the creation and implementation of a Low Emission Development Strategy. Pages in category "LEDS Toolkit" The following 14 pages are in this category, out of 14 total. A Agriculture Work Space/Tools B Bioenergy Assessment Toolkit Bioenergy Toolkit E Energy System and Scenario Analysis Toolkit F Financing Initiatives Toolkit G Greenhouse Gas Inventory Development Toolkit I Impact Assessment Toolkit L Land Use Assessment Toolkit Land-use Policy and Program Design Toolkit Land-use Scenario Analysis Toolkit M Market Analysis Toolkit P Policy and Program Design Toolkit S Sustainable Land-use Impact Assessment Toolkit T Transportation Assessment Toolkit Retrieved from "http://en.openei.org/w/index.php?title=Category:LEDS_Toolkit&oldid=332209

27

A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks  

SciTech Connect (OSTI)

The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

2008-02-01T23:59:59.000Z

28

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of… (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

29

Compliant mechanism learning toolkit  

E-Print Network [OSTI]

This thesis concerns a toolkit designed to assist in learning the behavior of complaint mechanisms. In the design of complaint mechanisms, increasingly complicated designs behave in ways that are harder to intuitively ...

Allard, Nicholas (Nicholas A.)

2006-01-01T23:59:59.000Z

30

REEEP Toolkits | Open Energy Information  

Open Energy Info (EERE)

REEEP Toolkits REEEP Toolkits Jump to: navigation, search Tool Summary Name: REEEP Toolkit Agency/Company /Organization: Renewable Energy and Energy Efficiency Partnership Sector: Energy Focus Area: Energy Efficiency, Renewable Energy Topics: Implementation, Low emission development planning, Policies/deployment programs, Resource assessment, Pathways analysis, Background analysis Resource Type: Dataset References: REEEP Toolkit [1] This article is a stub. You can help OpenEI by expanding it. Latest Toolkits Failed to load RSS feed from http://toolkits.reeep.org/rss.php|short|max=5: There was a problem during the HTTP request: 404 Not Found Source: http://toolkits.reeep.org/rss.php References ↑ "REEEP Toolkit" Retrieved from "http://en.openei.org/w/index.php?title=REEEP_Toolkits&oldid=384160"

31

Performance Based Service Acquisition Toolkit | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Procurement and Acquisition Guidance Contracting for Support Services Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit...

32

A Stateful Web Augmentation Toolkit  

E-Print Network [OSTI]

This thesis introduces the Stateful Web Augmentation Toolkit (SWAT), a toolkit that gives users control over the presentation and functionality of web content. SWAT extends Chickenfoot, a Firefox browser scripting environment ...

Webber, Matthew J. (Matthew James)

2010-01-01T23:59:59.000Z

33

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

34

Bioenergy Assessment Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bioenergy Assessment Toolkit Bioenergy Assessment Toolkit Anelia Milbrandt and Caroline Uriarte Produced under direction of the United States Agency for International Development by the National Renewable Energy Laboratory (NREL) under Interagency Agreement AEG-P-00-00003-00; Work for Others Agreement number 3010543; Task Numbers WFE2.1012, WFE2.1013, and WFE2.1014. Technical Report NREL/TP-6A20-56456 October 2012 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Contract No. DE-AC36-08GO28308 National Renewable Energy Laboratory 15013 Denver West Parkway Golden, CO 80401 303-275-3000 * www.nrel.gov Bioenergy Assessment Toolkit Anelia Milbrandt and Caroline Uriarte

35

The model coupling toolkit.  

SciTech Connect (OSTI)

The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

2001-04-13T23:59:59.000Z

36

Geospatial Toolkit | OpenEI  

Open Energy Info (EERE)

Toolkit Toolkit Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. Source NREL Date Released Unknown Date Updated January 03rd, 2011 (4 years ago) Keywords Geospatial Toolkit GIS NREL Oaxaca Data Quality Metrics Level of Review Some Review Comment Temporal and Spatial Coverage Frequency Time Period License License Open Data Commons Public Domain Dedication and Licence (PDDL)

37

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

38

Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates a variety of internal cybersecurity awareness...

39

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit (Redirected from Geospatial Toolkits) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

40

Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach  

E-Print Network [OSTI]

-physical security is a topic of primary concern in the envisioned smart power grid [1]­[3]. Besides failures the smart grid vision. Related work. While the security of the electricity network has always been-physical security in smart power grids. Traditionally, state estimation and detection procedures have been designed

Bullo, Francesco

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Geospatial Toolkit | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit Geospatial Toolkit (Redirected from GsT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide/manual, Software/modeling tools User Interface: Desktop Application Website: www.nrel.gov/applying_technologies/geospatial_toolkits.html Country: Afghanistan, Bangladesh, Bhutan, Brazil, China, El Salvador, Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia, Central America, Western Africa, Central America, Central America, Southern Asia, Southern Asia, Central America, , Southern Asia, Southern Asia, Western Asia

42

Tiburon: a weighted tree automata toolkit  

Science Journals Connector (OSTI)

The availability of weighted finite-state string automata toolkits made possible great advances in natural language processing. However, recent advances in syntax-based NLP model design are unsuitable for these toolkits. To combat this problem, we introduce ...

Jonathan May; Kevin Knight

2006-08-01T23:59:59.000Z

43

2013 SCRM Awareness Toolkit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

More Documents & Publications Supply Chain Risk Management (SCRM) Awareness Toolkit Cybersecurity Awareness Electronic Messaging Cybersecurity Awareness MarketingPromotional...

44

Advanced Network Toolkit for Assessments  

Broader source: Energy.gov (indexed) [DOE]

Network Toolkit for Assessments Network Toolkit for Assessments and Remote Mapping (ANTFARM) Uses existing information to passively map control systems networks and identify cyber security perimeters Control systems operators require a map of their energy control system network in order to identify its electronic security perimeter, critical to meeting the North American Electric Reliability Corporation's (NERC) Critical Infrastructure Protection (CIP) standards. However, purchasing active, online scanning tools specifically for network mapping can be costly, and these tools can disrupt control system function, causing system latency and possibly affecting power supply. The ANTFARM software tool enables system operators to remotely and

45

Market Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Market Analysis Toolkit Market Analysis Toolkit Jump to: navigation, search Search Resources Resource Type Training Materials Climate Technology Initiative Training Courses GHG Management Institute curriculum Supporting Small Forest Enterprises: A Facilitator's Toolkit Add Guides Accelerating Climate Technologies: Innovative Market Strategies to Overcome Barriers to Scale-up Supporting Small Forest Enterprises: A Facilitator's Toolkit The Climate Investment Funds-Business Guide UNEP-Bioenergy Decision Support Tool Add Lessons Learned and Best Practices Brazil LULUCF Modeling Supporting Small Forest Enterprises: A Facilitator's Toolkit Sustainable Land Management Through Market-Oriented Commodity Development: Case studies from Ethiopia Add Datasets Africa-Economic Development Report 2010

46

Sustainable Forest Finance Toolkit | Open Energy Information  

Open Energy Info (EERE)

Sustainable Forest Finance Toolkit Sustainable Forest Finance Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Sustainable Forest Finance Toolkit Agency/Company /Organization: World Business Council for Sustainable Development Sector: Land Focus Area: Forestry Topics: Finance Resource Type: Guide/manual Website: www.pwc.co.uk/pdf/forest_finance_toolkit.pdf Sustainable Forest Finance Toolkit Screenshot References: Sustainable Forest Finance Toolkit[1] Overview "This Toolkit has been developed jointly by PricewaterhouseCoopers (PwC) and the World Business Council for Sustainable Development (WBCSD). It is a globally applicable resource designed to help financial institutions support the management of forest resources through sustainable and legal timber production and processing, and markets for carbon and other

47

Windows Forensic Analysis DVD Toolkit  

Science Journals Connector (OSTI)

The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing ... Keywords: Computer Science, Security

Harlan Carvey

2007-04-01T23:59:59.000Z

48

Bioenergy Toolkit | Open Energy Information  

Open Energy Info (EERE)

Bioenergy Toolkit Bioenergy Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

49

Galvin Electricity Initiative Policy Toolkit | Open Energy Information  

Open Energy Info (EERE)

Galvin Electricity Initiative Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Galvin Electricity Initiative Policy Toolkit AgencyCompany Organization:...

50

Waste Toolkit A-Z Plastic Grundon  

E-Print Network [OSTI]

Waste Toolkit A-Z Plastic ­ Grundon Also see `Swap Shop' and `Office Recycling ­ Grundon' in the Waste Toolkit A-Z How can I recycle plastic? There are lots of different types of plastic. Typically, waste contractors can only recycle PETE plastic and HDPE plastic. The University's preferred waste

Melham, Tom

51

Toolkit support for interactive projected displays  

Science Journals Connector (OSTI)

This paper presents a software toolkit designed to enable the rapid development of multimedia-rich, multi-touch enabled, and interactive projection-based displays. For instance: door displays, floor displays, wall displays, and interactive tables. Despite ... Keywords: deployments, experimentation, interaction, interactive surface, multi-touch, projection mapping, toolkit, ubiquitous displays

John Hardy; Jason Alexander

2012-12-01T23:59:59.000Z

52

Turkey Geospatial Toolkit | OpenEI  

Open Energy Info (EERE)

Turkey Geospatial Toolkit Turkey Geospatial Toolkit Dataset Summary Description Developed by NREL and the U.S. Trade and Development Agency, this geographic toolkit that allows users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. The GsT was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. The revised version of the Geospatial Toolkit for Turkey is available using the following link: http://www.nrel.gov/international/downloads/gst_turkey.exe NOTE: Please use the provided link to access the most up to date software package and data. The Turkey GsT data were last updated in January 2011. The attached zip file below is an archive and contains the previous version of the geospatial toolkit executable that has been replaced.

53

LEDSGP/Transportation Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit < LEDSGP(Redirected from Transportation Toolkit) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Developing Strategies for Clean, Efficient Transportation The Transportation LEDS Toolkit supports development planners, technical experts, and decision makers at national and local levels to plan and implement low emission transportation systems that support economic growth. This toolkit website helps users navigate a variety of resources in order to identify the most effective tools necessary to build and implement low

54

The Extremes Toolkit (extRemes) Weather and Climate Applications  

E-Print Network [OSTI]

The Extremes Toolkit (extRemes) Weather and Climate Applications of Extreme Value Statistics Eric;The Extremes Toolkit (extRemes) Web Page http://www.assessment.ucar.edu/toolkit Acknowledgements 1. The Extremes Toolkit is funded by the National Science Foundation (NSF) through the NCAR Weather and Cli- mate

Gilleland, Eric

55

TECA: A Parallel Toolkit for Extreme Climate Analysis  

SciTech Connect (OSTI)

We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

2012-03-12T23:59:59.000Z

56

TOOLKIT  

E-Print Network [OSTI]

Job Order Ledger (Detai People/Person Property Man PurchaseJob Order Ledger (Detail or General) People/Personnel Property Management PurchaseJob Order Please select desiredoption Ledger(Detail or Ge People/Personnel Employees & Guests by Division Property Managem Phonebook Search Purchase

Schroeder, E.

2010-01-01T23:59:59.000Z

57

LEDSGP/DIA-Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit < LEDSGP Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Building Climate-Resilient Low Emission Development Strategies The Development Impacts Assessment Toolkit helps country, regional, and local policymakers find tools and resources to assess the impacts of and links between national development priorities and low emission development strategies (LEDS). This toolkit equips decision makers with information to explore policy options and build consensus with stakeholders to achieve low-emission development that supports national development objectives.

58

LEDSGP/Transportation Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit < LEDSGP Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Developing Strategies for Clean, Efficient Transportation The Transportation Toolkit supports development planners, technical experts, and decision makers at national and local levels to plan and implement low-emission transportation systems that support economic growth. This toolkit helps users navigate a variety of resources to identify the most effective tools to build and implement low emission development strategies (LEDS) for the transport sector. Learn more in the report on

59

Renewable Energy Toolkit (REToolkit) | Open Energy Information  

Open Energy Info (EERE)

Renewable Energy Toolkit (REToolkit) Renewable Energy Toolkit (REToolkit) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy Toolkit (REToolkit) Focus Area: Renewable Energy Topics: Market Analysis Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, Equivalent URI: cleanenergysolutions.org/content/renewable-energy-toolkit-retoolkit Language: English Policies: "Deployment Programs,Regulations,Financial Incentives" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Technical Assistance Regulations: "Net Metering & Interconnection,Utility/Electricity Service Costs" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

60

Low Emission Development Strategies toolkit search  

Open Energy Info (EERE)

Strategy (LEDS) Toolkit Strategy (LEDS) Toolkit Are we missing something? Add a Tool software models, databases, training materials, publications Add a Program climate-related activities or strategies How to use the LEDS toolkit The LEDS toolkit presented on this website provides information on available datasets, studies, tools, and other technical resources to support the LEDS process. The customized search boxes below allow a user to search tools and programs in relation to relevant questions, sector, geography, LEDS methodology stage, analytical needs, and other search terms. The country cloud to the right also allows a user to search easily for resources and programs in a specific country. The inventory of tools and programs is user-generated and we encourage users to upload and edit additional content using the "Are we missing something?" box to the right. ....[read more][show less]

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A Toolkit for Building Sustainability at Dartmouth  

E-Print Network [OSTI]

1 A Toolkit for Building Sustainability at Dartmouth Environmental Studies 50, Spring 2011 College Sustainability Strategic Planning Process. Dartmouth College has a strong legacy of sustainability, are racing forward with new sustainability initiatives, sustainable building designs, and new, innovative

62

Building Energy Software Tools Directory: HVAC 1 Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HVAC 1 Toolkit HVAC 1 Toolkit HVAC 1 Toolkit logo. The Toolkit for Primary HVAC System Energy Calculations is a collection of thirty-eight separate subroutines and corresponding documentation that describes algorithms for predicting the performance of HVAC components. The Toolkit documentation includes thorough descriptions of the component models and solution algorithms, detailed information on the structure of the individual FORTRAN 77 routines, as well as illustrative examples of system simulations with the Toolkit routines. The Toolkit serves two purposes: modules for large-scale simulation and stand-alone component performance prediction. The Toolkit components can also be used to calculate the energy performance of a component with a dedicated driver program to provide the necessary information flow to the Toolkit routines.

63

Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric | Open  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Agency/Company /Organization: United States Agency for International Development Sector: Energy Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_4/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric GCREhydro.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Hydroelectric&oldid=375082

64

TransportToolkit Prototype | Open Energy Information  

Open Energy Info (EERE)

TransportToolkit Prototype TransportToolkit Prototype Jump to: navigation, search Tool Summary Name: TransportToolkit Prototype Agency/Company /Organization: Nick Langle Complexity/Ease of Use: Not Available Cost: Free Related Tools Journal of Public Transportation Handbook for Handling, Storing, and Dispensing E85 Finalize Historic National Program to Reduce Greenhouse Gases and Improve Fuel Economy for Cars and Trucks ... further results Find Another Tool FIND TRANSPORTATION TOOLS This is a test tool to set values needed for Exhibit search results When to Use This Tool While building a low emission strategy for your country's transportation system, this tool is most useful during these key phases of the process: Evaluate System - Assessing the current transportation situation Create Baseline - Developing a business-as-usual scenario

65

MCT: Model Coupling Toolkit | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MCT: Model Coupling Toolkit MCT: Model Coupling Toolkit MCT: Model Coupling Toolkit MCT is a set of open-source software tools for creating coupled models. MCT is fully parallel and can be used to couple message-passing parallel models to create a parallel coupled model. MCT is available as a small library and a set of Fortran90 modules. MCT provides model interoperability through a simple API. Two models that declare and use MCT datatypes can be coupled with a minimum of effort. MCT provides the following core coupling services: A component model registry Domain decomposition descriptors Communications schedulers for parallel MxN intercomponent data transfer and MxM intracomponent data redistribution A flexible and indexible (i.e., random-access) field data storage datatype A time averaging and accumulation buffer datatype

66

Category:Transportation Toolkits | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:Transportation Toolkits Jump to: navigation, search Add a new Transportation Toolkit Pages in category "Transportation Toolkits" The following 86 pages are in this category, out of 86 total. A A Report on Worldwide Hydrogen Bus Demonstrations, 2002-2007 A Review of HOV Lane Performance and Policy Options in the United States - Final Report A Roadmap to Funding Infrastructure Development Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Africa's Transport Infrastructure Mainstreaming Maintenance and Management

67

Climate Change and Clean Energy Project (CEnergy) Toolkit | Open Energy  

Open Energy Info (EERE)

Climate Change and Clean Energy Project (CEnergy) Toolkit Climate Change and Clean Energy Project (CEnergy) Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Change and Clean Energy Project (CEnergy) Toolkit Agency/Company /Organization: Clean Air Asia, International Resources Group (IRG), United States Agency for International Development (USAID), Ministry of Planning Sector: Land Focus Area: Greenhouse Gas, People and Policy, Transportation Topics: Background analysis, Baseline projection, Co-benefits assessment, - Environmental and Biodiversity, GHG inventory, Low emission development planning, -LEDS, Pathways analysis, Policies/deployment programs Website: cleanairinitiative.org/portal/toolkitLGUs Country: Philippines UN Region: South-Eastern Asia References: CEnergy Toolkit[1]

68

Geospatial Toolkit (GsT) Webinar | Open Energy Information  

Open Energy Info (EERE)

Geospatial Toolkit (GsT) Webinar Geospatial Toolkit (GsT) Webinar Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Geospatial Toolkit (GsT) Webinar Agency/Company /Organization: National Renewable Energy Laboratory, Centro de EnergĂ­as Renovables (CER), United States Department of Energy Sector: Energy Topics: Resource assessment Resource Type: Maps, Software/modeling tools, Webinar, Training materials Website: en.openei.org/wiki/GsT Equivalent URI: cleanenergysolutions.org/content/geospatial-toolkit-gst Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance References: Geospatial Toolkit (GsT) Webinar[1] Logo: Geospatial Toolkit (GsT) Webinar This webinar provides an overview, and also demonstrates usage of the Geospatial Toolkit. Webinar Video

69

UNEP Toolkit for Clean Fleet Strategy Development | Open Energy Information  

Open Energy Info (EERE)

UNEP Toolkit for Clean Fleet Strategy Development UNEP Toolkit for Clean Fleet Strategy Development Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UNEP Toolkit for Clean Fleet Strategy Development Agency/Company /Organization: United Nations Environment Programme Sector: Energy Focus Area: Energy Efficiency, Renewable Energy, Transportation Topics: Implementation, Policies/deployment programs Website: www.unep.org/tnt-unep/toolkit/ UNEP Toolkit for Clean Fleet Strategy Development Screenshot References: UNEP Toolkit[1] Background "This Toolkit will help you develop a strategy for reducing the envrionmental impacts of your fleet. To develop your own fleet strategy you need to follow the steps below. Start with opening the Step by Step action plan on this homepage. The Tools will provide information and will allow

70

LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Contact Us LEDSGP/Transportation Toolkit/Contact Us < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Contact Us) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Contacts for the LEDS GP Transport Working Group The Transportation Toolkit is provided by the Transport Working Group as part of the Low Emission Development Strategies (LEDS) Global Partnership. If you have questions or comments about this toolkit, . Remote Expert Assistance on LEDS The LEDS Global Partnership provides timely, high-quality, no-fee technical assistance on transportation issues as part of the Remote Expert Assistance on LEDS (REAL) service. Experts from institutions around the world are available to provide objective advice, conduct reviews and brief

71

Waste Toolkit A-Z Plastic bags  

E-Print Network [OSTI]

Waste Toolkit A-Z Plastic bags Can I recycle plastic bags? No. At the moment you can't recycle plastic bags in the University recycling. Instead, choose alternatives to plastic bags when shopping have to use a cotton bag 131 times to ensure it has lower global warming potential than a plastic

Melham, Tom

72

Supply Chain Risk Management (SCRM) Awareness Toolkit  

Broader source: Energy.gov [DOE]

DOE-developed toolkit contains SCRM awareness material that informs the general DOE user of basic SCRM terms and concepts. Supply chain is how organizations, people, technology, activities, information and resources are involved in developing, producing, or delivering a product or service.

73

A toolkit for building earth system models  

SciTech Connect (OSTI)

An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

Foster, I.

1993-03-01T23:59:59.000Z

74

A toolkit for building earth system models  

SciTech Connect (OSTI)

An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

Foster, I.

1993-03-01T23:59:59.000Z

75

ACE Learning Series - Adoption Toolkit | Building Energy Codes Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ACE Learning Series - Adoption Toolkit ACE Learning Series - Adoption Toolkit This toolkit was developed by the U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) for use by states, municipalities, energy code advocates, policymakers, stakeholders, and all other groups with a vested interest in energy code adoption. This toolkit provides information and resources to help guide adopting authorities through the adoption process and setting minimum requirements for new construction. This toolkit provides some insight into how the adoption process may influence the residential and commercial build communities. Publication Date: Saturday, September 1, 2012 AdoptionToolkit.pdf Document Details Document Number: PNNL-SA-89963 Prepared by: prepared by Pacific Northwest National Laboratory for the U.S. Department

76

WRI-The Governance of Forests Toolkit | Open Energy Information  

Open Energy Info (EERE)

WRI-The Governance of Forests Toolkit WRI-The Governance of Forests Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: WRI-The Governance of Forests Toolkit Agency/Company /Organization: World Resources Institute Sector: Land, Climate Focus Area: Forestry Resource Type: Publications Website: pdf.wri.org/working_papers/gfi_tenure_indicators_sep09.pdf Cost: Free WRI-The Governance of Forests Toolkit Screenshot References: WRI-The Governance of Forests Toolkit[1] "The Governance of Forests Initiative (GFI) seeks to bring widely accepted principles of good governance to bear on the challenges of sustaining forests in developing countries. GFI is a collaboration of the World Resources Institute, Imazon (Brazil) and the Instituto Centro de Vida (Brazil). This document presents the GFI Toolkit (Version 1) and outlines a process

77

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Impact Assessment Toolkit Impact Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

78

Toolkit Definitions | Building Energy Codes Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Site Map Printable Version Development Adoption Compliance Regulations Resource Center Toolkit Definitions The following are definitions for common terms used within the adoption, compliance, and enforcement toolkits. Building code refers to a law or regulation used by state or local governments that establishes specifications for the design and construction of residential or commercial buildings. Building codes help ensure that new and existing residential and commercial structures meet minimum health, safety, and performance standards. In addition, building codes offer a baseline to which structures can be compared. Code adoption refers to the vehicle that establishes code requirements and their administration. Adoption can be mandatory, voluntary, or a combination of the two. The means of adoption vary with respect to the

79

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Impact Assessment Toolkit Impact Assessment Toolkit (Redirected from Gateway:International/Economic and Environmental Impacts) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

80

Land Use Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land Use Assessment Toolkit Land Use Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

MCT--The Model Coupling Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Model Coupling Toolkit Model Coupling Toolkit MCT is a set of open-source software tools for creating coupled models. MCT is fully parallel and can be used to couple message-passing parallel models to create a parallel coupled model. MCT is available as a small library and a set of Fortran90 modules. MCT provides model interoperability through a simple API. Two models that declare and use MCT datatypes can be coupled with a minimum of effort. MCT provides the following core coupling services: a component model registry domain decomposition descriptors communications schedulers for parallel MxN intercomponent data transfer and MxM intracomponent data redistribution a flexible and indexible (i.e., random-access) field data storage datatype a time averaging and accumulation buffer datatype

82

Community Wind Toolkit | Open Energy Information  

Open Energy Info (EERE)

Wind Toolkit Wind Toolkit Jump to: navigation, search "Community wind" refers to a class of wind energy ownership structures. Projects are considered "community" projects when they are at least partially owned by individuals or businesses in the state and local area surrounding the wind power project. The community element of these projects can be defined narrowly so that ownership is concentrated in the county or region where the project is built, or it may be defined broadly so that project investors are from the state where the project is sited. Furthermore, the extent of local ownership may range from a small minority share to full ownership by persons in the immediate area surrounding the wind project site. Potential project owners include local farmers,

83

Bioenergy Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Bioenergy Assessment Toolkit Bioenergy Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

84

LEDSGP/Transportation Toolkit/Strategies | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Strategies) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low emissions transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand

85

Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)  

SciTech Connect (OSTI)

Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

Young, K.

2014-04-01T23:59:59.000Z

86

E-Print Network 3.0 - assistant toolkit edat Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Recipient's Catalog No. 4. Title and Subtitle Comprehensive Evaluation of Transportation Projects: A Toolkit... and limitations of existing methods and toolkits for...

87

WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems  

E-Print Network [OSTI]

Open Access WAVOS: a MATLAB toolkit for wavelet analysis anduser interface within MATLAB. The interface allows for dataa comprehensive wavelet-based MATLAB toolkit that allows for

Harang, Richard; Bonnet, Guillaume; Petzold, Linda R

2012-01-01T23:59:59.000Z

88

A Declarative Toolkit for Rapid Experimentation Wireless Mesh Networks  

E-Print Network [OSTI]

patterns. Lack of systematic tools for rapid prototyping. #12;3 Motivation Simulation studies are useful: The Approach A development toolkit that unifies rapid prototyping, simulation and experimentation. IntegratesRapidMesh A Declarative Toolkit for Rapid Experimentation of Wireless Mesh Networks http

Loo, Boon Thau

89

Category:Wind Working Group Toolkit | Open Energy Information  

Open Energy Info (EERE)

Wind Working Group Toolkit Wind Working Group Toolkit Jump to: navigation, search In 1999, the U.S. Department of Energy (DOE) launched the Wind Powering America (WPA) initiative to educate, engage, and enable critical stakeholders to make informed decisions about how wind energy contributes to the U.S. electricity supply. State Wind Working Groups used Wind Powering America's State Wind Working Group Handbook to serve their states, in conjunction with their own methods and outreach materials. This updated wiki-based Wind Working Group Toolkit provides links to information, methods, and resources. This wiki is a work in progress, and we welcome your contributions. See the Wind Working Group Toolkit home page for an outline of topics. Pages in category "Wind Working Group Toolkit"

90

LEDSGP/DIA-Toolkit/Uses | Open Energy Information  

Open Energy Info (EERE)

Uses Uses < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Ways to Use the Development Impacts Assessment Toolkit The Development Impacts Assessment (DIA) Toolkit offers a structured way to consider the impact of proposed low emission development strategies (LEDS) on other national or local priorities, and provides links to resources for conducting development impacts analysis. DIA can help in identifying impacts (which may be positive or negative), the extent of the impact, who is impacted, and the timeframe of the impact. DIA supports country efforts to reach development goals articulated in LEDS and elsewhere. Explore the DIA Concept This toolkit provides information on what is meant by DIA and how to

91

NYSERDA-Wind Energy Toolkit | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » NYSERDA-Wind Energy Toolkit Jump to: navigation, search Tool Summary Name: NYSERDA-Wind Energy Toolkit Agency/Company /Organization: New York State Energy Research and Development Authority Sector: Energy Focus Area: Renewable Energy, Wind Topics: Resource assessment, Technology characterizations Website: www.powernaturally.org/Programs/Wind/Wind%20Energy%20Toolkit.pdf Cost: Free NYSERDA-Wind Energy Toolkit Screenshot References: NYSERDA[1] "The Wind Energy Toolkit was developed for the New York State Energy Research & Development Authority (NYSERDA) by AWS Truewind, LLC, to provide

92

Transportation Assessment Toolkit/Home | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Transportation Assessment Toolkit/Home < Transportation Assessment Toolkit Jump to: navigation, search Home Transport Topics Ask an Expert Training Contact us What are the key actions necessary to implementing a transportation system LEDS? Action 1: Evaluate the existing transport system Action 2: Develop BAU scenario Action 3: Assess opportunities Avoid-Shift-Improve framework of strategies Action 4: Develop alternative scenarios Action 5: Prioritize and plan Action 6: Implement and monitor Transportation Assessment Toolkit Train licensed.png Transportation Assessment Toolkit Information licensed.png Transportation Assessment Toolkit Learning licensed.png

93

ACE Learning Series - Enforcement Toolkit | Building Energy Codes Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Toolkit Enforcement Toolkit The U.S. Department of Energy's (DOE's) Building Energy Codes Program (BECP) developed this toolkit to help the enforcement community achieve higher levels of compliance with building energy codes. Although this toolkit is not intended for use by designers, developers, home owners or renters, building owners, or building operators, it may provide those individuals some insight into the issues facing the enforcement community. Publication Date: Saturday, September 1, 2012 EnforcementToolkit.pdf Document Details Document Number: PNNL-SA-90467 Prepared by: prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy Building Energy Codes Program Focus: Enforcement Document type: Other Target Audience: Advocate Architect/Designer

94

Asian Co-benefits Partnership (ACP) Toolkit | Open Energy Information  

Open Energy Info (EERE)

Asian Co-benefits Partnership (ACP) Toolkit Asian Co-benefits Partnership (ACP) Toolkit Jump to: navigation, search Tool Summary Name: Asian Co-benefits Partnership (ACP) Toolkit Agency/Company /Organization: Asian Co-benefits Partnership (ACP) Topics: Low emission development planning, -LEDS Resource Type: Publications References: Asian Co-benefits Partnership (ACP)[1] ACP Rio+20[2] Logo: Asian Co-benefits Partnership (ACP) Toolkit Overview "The Asian Co-benefits Partnership (ACP) provides publications and information to help mainstream climate and developmental co-benefits into decision-making processes in Asia." The Tookit "offers recent publication from ACP member organizations on themes related to co-benefits and green growth." The most recent Toolkit, from ACP's participation in Rio+20, is available

95

Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information  

Open Energy Info (EERE)

Hands-on Energy Adaptation Toolkit (HEAT) Hands-on Energy Adaptation Toolkit (HEAT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Hands-on Energy Adaptation Toolkit (HEAT) Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guide/manual Website: esmap.org/esmap/node/312 Hands-on Energy Adaptation Toolkit (HEAT) Screenshot References: HEAT[1] Background "HEAT- A Hands-on Energy Adaptation Toolkit is designed to lead you through as assessment of climate vulnerabilities and adaptation options in the energy sector of your country. HEAT can help you raise awareness among key stakeholders and initiate dialogue on energy sector adaptation.

96

Online Toolkit Fosters Bioenergy Innovation | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Toolkit Fosters Bioenergy Innovation Toolkit Fosters Bioenergy Innovation Online Toolkit Fosters Bioenergy Innovation January 21, 2011 - 2:27pm Addthis Learn more about the Bioenergy Knowledge Discovery Framework, an online data sharing and mapping toolkit. Paul Bryan Biomass Program Manager, Office of Energy Efficiency & Renewable Energy What will the project do? The $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a facility that will nearly triple the amount of renewable diesel produced domestically. The online data sharing and mapping toolkit provides the extensive data, analysis, and visualization tools to monitor the bioenergy industry. Yesterday, Secretary Chu announced a $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a

97

LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy Information  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Strategies/Avoid LEDSGP/Transportation Toolkit/Strategies/Avoid < LEDSGP‎ | Transportation Toolkit‎ | Strategies(Redirected from Transportation Toolkit/Strategies/Avoid) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg Avoid trips taken and reduce travel demand by integrating land use planning, transport infrastructure planning, and transport demand

98

Safety Meeting Toolkits - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Awareness Cold and Flu Prevention Hand Washing Healthy Sleep Heat Stress Radon Signs of a Heart Attack Signs of a Stroke Distracted Driving Coping with Stress & Change Skin Cancer...

99

The Best Ever Alarm System Toolkit  

SciTech Connect (OSTI)

Learning from our experience with the standard Experimental Physics and Industrial Control System (EPICS) alarm handler (ALH) as well as a similar intermediate approach based on script-generated operator screens, we developed the Best Ever Alarm System Toolkit (BEAST). It is based on Java and Eclipse on the Control System Studio (CSS) platform, using a relational database (RDB) to store the configuration and log actions. It employs a Java Message Service (JMS) for communication between the modular pieces of the toolkit, which include an Alarm Server to maintain the current alarm state, an arbitrary number of Alarm Client user interfaces (GUI), and tools to annunciate alarms or log alarm related actions. Web reports allow us to monitor the alarm system performance and spot deficiencies in the alarm configuration. The Alarm Client GUI not only gives the end users various ways to view alarms in tree and table, but also makes it easy to access the guidance information, the related operator displays and other CSS tools. It also allows online configuration to be simply modified from the GUI. Coupled with a good "alarm philosophy" on how to provide useful alarms, we can finally improve the configuration to achieve an effective alarm system.

Kasemir, Kay [ORNL; Chen, Xihui [ORNL; Danilova, Katia [ORNL

2009-01-01T23:59:59.000Z

100

ParCAT: Parallel Climate Analysis Toolkit  

SciTech Connect (OSTI)

Climate science is employing increasingly complex models and simulations to analyze the past and predict the future of Earth s climate. This growth in complexity is creating a widening gap between the data being produced and the ability to analyze the datasets. Parallel computing tools are necessary to analyze, compare, and interpret the simulation data. The Parallel Climate Analysis Toolkit (ParCAT) provides basic tools to efficiently use parallel computing techniques to make analysis of these datasets manageable. The toolkit provides the ability to compute spatio-temporal means, differences between runs or differences between averages of runs, and histograms of the values in a data set. ParCAT is implemented as a command-line utility written in C. This allows for easy integration in other tools and allows for use in scripts. This also makes it possible to run ParCAT on many platforms from laptops to supercomputers. ParCAT outputs NetCDF files so it is compatible with existing utilities such as Panoply and UV-CDAT. This paper describes ParCAT and presents results from some example runs on the Titan system at ORNL.

Smith, Brian E [ORNL; Steed, Chad A [ORNL; Shipman, Galen M [ORNL; Ricciuto, Daniel M [ORNL; Thornton, Peter E [ORNL; Wehner, Michael [Lawrence Berkeley National Laboratory (LBNL); Williams, Dean N. [Lawrence Livermore National Laboratory (LLNL)

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Research deciphers HIV attack plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights...

102

Transport Activity Measurement Toolkit (TAMT) | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Transport Activity Measurement Toolkit (TAMT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transport Activity Measurement Toolkit (TAMT) Agency/Company /Organization: World Bank Sector: Energy Focus Area: Transportation Topics: GHG inventory, Low emission development planning Resource Type: Dataset, Maps, Software/modeling tools, Video, Training materials User Interface: Website, Desktop Application Website: code.google.com/p/tamt/ Cost: Free Transport Activity Measurement Toolkit (TAMT) Screenshot References: TAMT Presentation[1] TAMT Google Site Page[2] TAMT Demonstration Videos[3] "The World Bank Latin America and the Caribbean Region Sustainable Development Department Transport Cluster in conjunction with the World

103

DOE Hydrogen Analysis Repository: Powertrain Systems Analysis Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Powertrain Systems Analysis Toolkit (PSAT) Powertrain Systems Analysis Toolkit (PSAT) Project Summary Full Title: Powertrain Systems Analysis Toolkit (PSAT) Project ID: 122 Principal Investigator: Aymeric Rousseau Brief Description: PSAT is a forward-looking model that simulates fuel economy and performance in a realistic manner -- taking into account transient behavior and control system characteristics. It can simulate an unrivaled number of predefined configurations (conventional, electric, fuel cell, series hybrid, parallel hybrid, and power split hybrid). Keywords: Hybrid electric vehicles (HEV); fuel cell vehicles (FCV); vehicle characteristics Purpose Simulate performance and fuel economy of advanced vehicles to support U.S. DOE R&D activities Performer Principal Investigator: Aymeric Rousseau

104

LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Improve < LEDSGP‎ | Transportation Toolkit‎ | Strategies(Redirected from Transportation Toolkit/Strategies/Improve) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and

105

LEDS Toolkit and Framework | Open Energy Information  

Open Energy Info (EERE)

LEDS Toolkit and Framework LEDS Toolkit and Framework Jump to: navigation, search Tool Summary LAUNCH TOOL Name: LEDS Toolkit and Methodology Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy, Land, Water, Climate Topics: Low emission development planning Resource Type: Dataset User Interface: Website, Desktop Application Website: en.openei.org/apps/LEDS/ Cost: Free UN Region: Central Asia, Eastern Asia, South-Eastern Asia, "Pacific" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Latin America and Caribbean" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western Asia & North Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., Northern America, "South Asia" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Sub-Saharan Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western & Eastern Europe" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

106

Financing Initiatives Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Financing Initiatives Toolkit (Redirected from Gateway:International/Financing Options) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and

107

Building Energy Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Building Energy Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

108

Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Impact Assessment Toolkit Jump to: navigation, search Economic Community of West African States (ECOWAS) Clean Energy Gateway Home | About | News | Links | Help | Countries Benin | Burkina Faso | Cape Verde | Gambia | Ghana | Guinea| Guinea-Bissau | Ivory Coast | Liberia | Mali | Niger | Nigeria | Senegal | Sierra Leone | Togo Countries ECREEE light.JPG FBenin.png FBurkinaFaso.png FCapeVerde.png FGambia.png FGhana.png FGuinea.png FGuinea-Bissau.png Benin Burkina Faso Cape Verde Gambia Ghana Guinea Guinea-Bissau FIvoryCoast.png FLiberia.png FMali.png FNiger.png FNigeria.png FSenegal.png FSierraLeone.png FTogo.png

109

RAPID toolkit/FAQ | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » RAPID toolkit/FAQ Jump to: navigation, search Rapid selected.png RAPIDtoolkit About FAQ Contact Us Presentations Outreach Get Involved Tools Frequently Asked Questions What does RAPID offer? The RAPID web site provides tools to aid in the permitting of renewable energy and bulk transmission projects. RAPID covers federal and state regulations for selected states. Additional states and technologies are continuously being added, so check back for new information. Does RAPID address bills that have not been enacted or regulations that have not been fully approved? No. How is RAPID maintained?

110

Transportation Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Transportation Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

111

Financing Initiatives Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Financing Initiatives Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

112

Afghanistan-NREL Resource Maps and Toolkits | Open Energy Information  

Open Energy Info (EERE)

Afghanistan-NREL Resource Maps and Toolkits Afghanistan-NREL Resource Maps and Toolkits Jump to: navigation, search Logo: Afghanistan Resources Maps and Toolkits Name Afghanistan Resources Maps and Toolkits Agency/Company /Organization National Renewable Energy Laboratory Sector Energy Focus Area Solar, Wind Topics Resource assessment, Background analysis Resource Type Dataset, Maps, Software/modeling tools Website http://www.nrel.gov/internatio Country Afghanistan Southern Asia References NREL International Activities Website [1] Abstract NREL partnered with Afghanistan to develop high-resolution wind and solar resource maps and data products for Afghanistan. NREL partnered with Afghanistan to develop high-resolution wind and solar resource maps and data products for Afghanistan. The data were output in

113

Guidelines and Toolkits for Urban Transport Development in Medium Sized  

Open Energy Info (EERE)

Guidelines and Toolkits for Urban Transport Development in Medium Sized Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Jump to: navigation, search Tool Summary Name: Guidelines and Toolkits for Urban Transport Development in Medium Sized Cities in India Agency/Company /Organization: Asian Development Bank Focus Area: Governance - Planning - Decision-Making Structure Topics: Best Practices Complexity/Ease of Use: Not Available Website: sti-india-uttoolkit.adb.org/ Transport Toolkit Region(s): Asia Related Tools Promoting Clean Cars: Case Study of Stockholm and Sweden MOtor Vehicle Emission Simulator (MOVES) The World Bank - Transport ... further results Find Another Tool FIND TRANSPORTATION TOOLS This resource is designed to help decision makers and practitioners in states and municipal governments who are concerned with urban transport

114

LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information  

Open Energy Info (EERE)

Contact Us Contact Us < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Contacts for the LEDS GP Transport Working Group If you have questions or comments about the Transportation Toolkit, . Powered by OpenEI ledsgp.org is built on the same platform as the popular Wikipedia site. Like Wikipedia, it is a "wiki" or website developed collaboratively by a community of users. Thanks to our unique relationship with OpenEI.org, you can add or edit most content on ledsgp.org. For more information about this unique collaboration, contact us. View or edit this page on OpenEI.org. Retrieved from "http://en.openei.org/w/index.php?title=LEDSGP/Transportation_Toolkit/Contact_Us&oldid=690462

115

Property:TransportToolkit/Regions | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:TransportToolkit/Regions Jump to: navigation, search Property Name TransportToolkit/Regions Property Type String Description Transport Toolkit property to help filter pages Valid values are Africa & Middle East, Asia, Australia & North America, Europe, Latin America & Caribbean and Global Used in Form/Template Tool Allows Values Africa & Middle East;Asia;Australia & North America;Europe;Latin America & Caribbean;Global Pages using the property "TransportToolkit/Regions" Showing 6 pages using this property. A Africa's Transport Infrastructure Mainstreaming Maintenance and Management + Africa & Middle East + Assessment of the type of cycling infrastructure required to attract new cyclists + Australia & North America +

116

ACE Learning Series - Compliance Toolkit | Building Energy Codes Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Compliance Toolkit Compliance Toolkit The compliance toolkit describes the steps that should be taken by the build community to make sure that their buildings meet the requirements of the energy codes in effect where the buildings are being built and that the building designs are well documented so that the enforcement community can quickly and easily determine if the building meets the requirement of the energy code. This toolkit describes the steps that should be taken by the build community to make sure that their buildings meet the requirements of the energy codes in effect where the buildings are being built and that the building designs are well documented so that the enforcement community can quickly and easily determine if the building meets the requirement of the

117

Clean Air-Cool Planet Community Toolkit | Open Energy Information  

Open Energy Info (EERE)

Clean Air-Cool Planet Community Toolkit Clean Air-Cool Planet Community Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Clean Air-Cool Planet Community Toolkit Agency/Company /Organization: Clean Air-Cool Planet Partner: Jeffrey H. Taylor and Associates Inc. Sector: Climate Focus Area: Energy Efficiency, Buildings, - Landfill Gas, - Waste to Energy, - Solar PV, Wind, Transportation, Agriculture, People and Policy, Food Supply, - Materials, Offsets and Certificates, Greenhouse Gas Phase: Bring the Right People Together, Determine Baseline, Get Feedback, Develop Finance and Implement Projects, Create Early Successes Resource Type: Guide/manual, Case studies/examples, Templates User Interface: Website Website: www.cleanair-coolplanet.org/for_communities/toolkit_home.php

118

LEDSGP/Transportation Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Tools < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Tools) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Tools for Low Emission Development Strategies in Transportation Use one of the search methods below to find tools for building sustainable, low emission development strategies (LEDS) for your country's transportation system. These resources focus on strategies to limit air pollutants and greenhouse gas emissions. Learn more in the report on LEDS for transportation. If you are aware of a relevant technical resource not

119

LEDSGP/Transportation Toolkit/Strategies | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

120

Activity Stream - Integrated: Geospatial Toolkit for Brazil from...  

Open Energy Info (EERE)

for Brazil from NREL 6 days ago Jay Huggins added the extra "catalog" to the dataset Integrated: Geospatial Toolkit for Brazil from NREL 8 days ago Jay Huggins updated the dataset...

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Integrated: Geospatial Toolkit for Brazil from NREL - Datasets...  

Open Energy Info (EERE)

Brazil from NREL (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other...

122

Development of the Potential Energy Savings Estimation (PESE) Toolkit  

E-Print Network [OSTI]

This study has developed a prototype computer tool called the Potential Energy Savings Estimation (PESE) Toolkit. Baltazar’s methodology for potential energy savings estimation from EBCx/retrofit measures has been improved in several ways...

Liu, J.; Baltazar, J. C.; Claridge, D. E.

123

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Key Actions) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

124

World Bank Renewable Energy Toolkit | Open Energy Information  

Open Energy Info (EERE)

World Bank Renewable Energy Toolkit World Bank Renewable Energy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: World Bank Renewable Energy Toolkit Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy, Solar, Wind Topics: Finance, Implementation, Market analysis, Policies/deployment programs, Resource assessment, Pathways analysis Resource Type: Publications, Guide/manual, Training materials, Lessons learned/best practices Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: World Bank RE Toolkit Homepage [1] The Word Bank's REToolKit is designed "to assist Bank staff and country counterparts to improve the design and implementation of renewable energy (RE) projects, incorporates best practices and lessons learned from RE

125

Distributed Renewable Energy Finance and Policy Toolkit | Open Energy  

Open Energy Info (EERE)

Distributed Renewable Energy Finance and Policy Toolkit Distributed Renewable Energy Finance and Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Renewable Energy Finance and Policy Toolkit Agency/Company /Organization: Clean Energy States Alliance (CESA) Partner: Charles Kubert and Mark Sinclair Sector: Energy Focus Area: People and Policy, Economic Development Phase: Evaluate Options, Develop Goals, Develop Finance and Implement Projects Topics: Best Practices Resource Type: Guide/manual User Interface: Other Website: www.cleanenergystates.org/Publications/cesa-financial_Toolkit_Dec2009. Cost: Free Equivalent URI: cleanenergysolutions.org/content/distributed-renewable-energy-finance- Language: English Policies: "Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property.

126

LEDSGP/Transportation Toolkit/Training | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Training < LEDSGP‎ | Transportation Toolkit(Redirected from Transportation Toolkit/Training) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Training for Low Emission Development Strategies in Transportation The LEDS GP Transport Working Group provides technical training and resources in the form of webinars, e-learning, live/recorded presentation videos, presentation files, and other knowledge exchange formats relevant to low emission development strategies in the transport sector. Below are

127

Clean Cities: IdleBox Toolkit for Idle-Reduction Projects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

IdleBox Toolkit for Idle-Reduction IdleBox Toolkit for Idle-Reduction Projects to someone by E-mail Share Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Facebook Tweet about Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Twitter Bookmark Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Google Bookmark Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Delicious Rank Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on Digg Find More places to share Clean Cities: IdleBox Toolkit for Idle-Reduction Projects on AddThis.com... Coordinator Basics Outreach Logos, Graphics, & Photographs Print Products & Templates Exhibit Booths Presentations Videos QR Codes Tips Education & Webinars Meetings Reporting Contacts IdleBox Toolkit for Idle-Reduction Projects

128

Efficient template attacks  

E-Print Network [OSTI]

joint MD , d joint LINEAR. 6 Evaluation of Methods We evaluated the efficiency of many template-attack variants on a real hard- ware platform, comparing all the compression methods from Table 110 and all 9 MATLAB, single core CPU with 3794 MIPS. 10 We... implementing template attacks. Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts at: http://www.cl.cam.ac.uk/research/security/datasets/grizzly/ Acknowledgement: Omar Choudary is a...

Choudary, Omar; Kuhn, Markus G.

2014-01-01T23:59:59.000Z

129

Grid-Connected Renewable Energy Generation Toolkit-Wind | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Wind Grid-Connected Renewable Energy Generation Toolkit-Wind Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Wind Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Wind Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_6/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Wind Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Wind[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Wind GCREwind.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Wind" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Wind&oldid=375084"

130

Grid-Connected Renewable Energy Generation Toolkit-Solar | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Solar Grid-Connected Renewable Energy Generation Toolkit-Solar Jump to: navigation, search Tool Summary Name: Grid-Connected Renewable Energy Generation Toolkit-Solar Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Solar Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_5/index.shtml Grid-Connected Renewable Energy Generation Toolkit-Solar Screenshot References: Grid-Connected Renewable Energy Generation Toolkit-Solar[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Solar GCREsolar.JPG References ↑ "Grid-Connected Renewable Energy Generation Toolkit-Solar" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Solar&oldid=375083

131

SciTech Connect: Guide to Using the WIND Toolkit Validation Code  

Office of Scientific and Technical Information (OSTI)

Toolkit Validation Code In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to...

132

Seven Deadliest Wireless Technologies Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, ...

Brad Haines

2010-03-01T23:59:59.000Z

133

Seven Deadliest Unified Communications Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified ...

Dan York

2010-06-01T23:59:59.000Z

134

Security Assessment Simulation Toolkit (SAST) Final Report  

SciTech Connect (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

135

The ProxyGator Server-side Wireless Toolkit Dushiant Kochhar and Abdelsalam (Sumi) Helal  

E-Print Network [OSTI]

The ProxyGator ­ Server-side Wireless Toolkit Dushiant Kochhar and Abdelsalam (Sumi) Helal Computer significantly. To reduce the development time, we are introducing the ProxyGator toolkit. It is a server infrastructure is built within Visual C++ 6.0 IDE. We present the ProxyGator Toolkit and give an analysis to show

Helal, Abdelsalam

136

RSVC: A Reliable Distributed Control Software Development Toolkit Control Software Group  

E-Print Network [OSTI]

RSVC: A Reliable Distributed Control Software Development Toolkit Jie Chen Control Software Group- velop a toolkit for building reliable and fault-tolerant distributed software. This paper describes a C++ toolkit (RSVC) that reduces e ort of development of reliable distributed control software. Keywords

Mao, Weizhen

137

Cosmological toolkit project featured on DOE energy website | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cosmological toolkit project featured on DOE energy website Cosmological toolkit project featured on DOE energy website October 2, 2013 Tweet EmailPrint Researchers from Argonne National Laboratory, in partnership with Fermilab and Lawrence Berkeley National Laboratory, are developing a state-of-the-art toolkit for analyzing cosmological simulation data. The work was recently featured on the DOE website Energy.gov. Leading the Argonne team are Salman Habib, senior physicist and computational scientist in Argonne's High Energy Physics and Mathematics and Computer Science Divisions, and Ravi Madduri, project manager in the MCS Division. The multilaboratory team seeks to create an open platform with a web-based front end that will allow scientists to transfer, search, and analyze the complex data being generated by galaxy-formation simulations. Key to this

138

Integrated: Geospatial Toolkit for Honduras from NREL | OpenEI  

Open Energy Info (EERE)

Honduras from NREL Honduras from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

139

LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Avoid < LEDSGP‎ | Transportation Toolkit‎ | Strategies Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low-emission transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

140

Integrated: Geospatial Toolkit for Guatemala from NREL | OpenEI  

Open Energy Info (EERE)

Guatemala from NREL Guatemala from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Building Energy Codes ENFORCEMENT TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ENFORCEMENT TOOLKIT ENFORCEMENT TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES i Building Energy Codes ENFORCEMENT TOOLKIT Prepared by: Building Energy Codes Program The U.S. Department of Energy's Building Energy Codes Program is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-90467 LEARNING SERIES OVERVIEW Building Energy Codes ACE

142

Service and product provider's marketing toolkit | ENERGY STAR Buildings  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Service and product provider's marketing toolkit Service and product provider's marketing toolkit Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section How can ENERGY STAR help your business? Get started Join ENERGY STAR as a partner ENERGY STAR service & product provider training series Service and product provider's marketing toolkit Industry initiatives ENERGY STAR sales tools for service and product providers

143

Building Energy Codes COMPLIANCE TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

COMPLIANCE TOOLKIT COMPLIANCE TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES III Building Energy Codes COMPLIANCE TOOLKIT Prepared by: Building Energy Codes Program (BECP) The U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-90466 LEARNING SERIES OVERVIEW Building Energy Codes

144

Integrated: Geospatial Toolkit for Ghana from NREL | OpenEI  

Open Energy Info (EERE)

Ghana from NREL Ghana from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

145

Category:LEDSGP Development Impacts Assessment Toolkits | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Category Edit History Facebook icon Twitter icon » Category:LEDSGP Development Impacts Assessment Toolkits Jump to: navigation, search Development Impacts Assessment Tools help country, regional, and local policymakers find tools and online resources to assess the impacts of low-emission development strategies (LEDS). These tools equip decision makers with information to explore policy options and build consensus with stakeholders to acheive low-emission development. LEDSGP/DIA-Toolkit Pages in category "LEDSGP Development Impacts Assessment Toolkits" The following 65 pages are in this category, out of 65 total.

146

Building Energy Codes ADOPTION TOOLKIT BUILDING TECHNOLOGIES PROGRAM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ADOPTION TOOLKIT ADOPTION TOOLKIT BUILDING TECHNOLOGIES PROGRAM Building Energy Codes ACE LEARNING SERIES I Building Energy Codes ADOPTION TOOLKIT Prepared by: Building Energy Codes Program (BECP) The U.S. Department of Energy's (DOE) Building Energy Codes Program (BECP) is an information resource on energy codes and standards for buildings. They work with other government agencies, state and local jurisdictions, organizations that develop model codes and standards, and building industry to promote codes that will provide for energy and environmental benefits and help foster adoption of, compliance with, and enforcement of those codes. September 2012 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL-SA-89963 LEARNING SERIES OVERVIEW Building Energy Codes

147

Integrated: Geospatial Toolkit for Nicaragua from NREL | OpenEI  

Open Energy Info (EERE)

Nicaragua from NREL Nicaragua from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

148

LEDSGP/DIA-Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit/Tools < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Tools for Assessing the Impacts of Low-Emission Development Use one of the search methods below to find tools for assessing the impacts of low emission development strategies (LEDS) on country development goals. These resources focus on strategies to reduce poverty, improve health and local environment quality, improve energy and water access, facilitate gender equity, and address other development priorities. If you are aware

149

LEDSGP/DIA-Toolkit/Factors | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/DIA-Toolkit/Factors < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance Development Impacts Assessment Dia goals actions.png Governments set national goals and priorities-social, economic, and environmental-that establish the context for government policies and programs. At the same time, many countries have defined low emission development strategies (LEDS) as a guiding framework for development. The purpose of development impacts assessment (DIA) is to identify and assess the impacts, including both positive impacts (e.g., improved air or

150

LEDSGP/Transportation Toolkit/Training | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Training < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Training for Low Emission Development Strategies in Transportation The LEDS GP Transport Working Group provides technical training and resources in the form of webinars, e-learning, live/recorded presentation videos, presentation files, and other knowledge exchange formats relevant to low emission development strategies in the transport sector. Below are links to relevant online training/learning sites. To suggest additional

151

LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Strategies/Improve < LEDSGP‎ | Transportation Toolkit‎ | Strategies Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Avoid, Shift, Improve Framework The avoid, shift, improve (ASI) framework enables development stakeholders to holistically design low emissions transport strategies by assessing opportunities to avoid the need for travel, shift to less carbon-intensive modes, and improve on conventional technologies, infrastructure, and policies. Avoid Trips and Reduce Travel Demand Transportation Assessment Toolkit Bikes Spain licensed cropped.jpg

152

Integrated: Geospatial Toolkit for Bangladesh from NREL | OpenEI  

Open Energy Info (EERE)

Bangladesh from NREL Bangladesh from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

153

Validation of Power Output for the WIND Toolkit  

SciTech Connect (OSTI)

Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

King, J.; Clifton, A.; Hodge, B. M.

2014-09-01T23:59:59.000Z

154

Integrated: Geospatial Toolkit for Brazil from NREL | OpenEI  

Open Energy Info (EERE)

Brazil from NREL Brazil from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

155

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

Actions Actions < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

156

LEDSGP/Transportation Toolkit/Tools | Open Energy Information  

Open Energy Info (EERE)

Tools Tools < LEDSGP‎ | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Tools for Low-Emission Development Strategies in Transportation Use one of the search methods below to find tools for building sustainable, low-emission development strategies (LEDS) for your country's transportation system. These resources focus on strategies to limit air pollutants and greenhouse gas emissions. Learn more in the report on LEDS for transportation. Search Method: Category Keyword Choose one or more items from the following categories. Key Actions Implement & Monitor Evaluate System Create Baseline Assess Opportunities Develop Alternatives Prioritize & plan Strategies Resource Types Topics Regions Powered by OpenEI

157

Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

158

Grid-Connected Renewable Energy Generation Toolkit-Biomass | Open Energy  

Open Energy Info (EERE)

Grid-Connected Renewable Energy Generation Toolkit-Biomass Grid-Connected Renewable Energy Generation Toolkit-Biomass Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Grid-Connected Renewable Energy Generation Toolkit-Biomass Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Biomass Resource Type: Training materials Website: www.energytoolbox.org/gcre/mod_2/index.shtml#update Grid-Connected Renewable Energy Generation Toolkit-Biomass Screenshot References: Grid-Connected Renewable Energy-Biomass[1] Logo: Grid-Connected Renewable Energy Generation Toolkit-Biomass Biomass Toolkit References ↑ "Grid-Connected Renewable Energy-Biomass" Retrieved from "http://en.openei.org/w/index.php?title=Grid-Connected_Renewable_Energy_Generation_Toolkit-Biomass&oldid=375080

159

Integrated: Geospatial Toolkit GIS data for India from NREL | OpenEI  

Open Energy Info (EERE)

India from NREL India from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

160

Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL | OpenEI  

Open Energy Info (EERE)

Oaxaca from NREL Oaxaca from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Integrated: Geospatial Toolkit GIS data for Bhutan from NREL | OpenEI  

Open Energy Info (EERE)

Bhutan from NREL Bhutan from NREL Dataset Summary Description The Geospatial Toolkit (GsT) is a map viewer developed by the National Renewable Energy Laboratory (NREL). The toolkit helps energy planners, project developers, researchers and others identify areas of a country that show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers, borders, and transportation and power infrastructure. The toolkit is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL and currently owned by HOMER Energy LLC. HOMER integration with the toolkit makes it possible to automatically populate HOMER inputs using weather data from the toolkit to help you get started with your HOMER analysis. The toolkit also displays preliminary HOMER results that you can see without running the model.

162

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

163

Water Security Toolkit User Manual Version 1.2.  

SciTech Connect (OSTI)

The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agen

Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

2014-08-01T23:59:59.000Z

164

Information Toolkit for post-2012 climate policies | Open Energy  

Open Energy Info (EERE)

Information Toolkit for post-2012 climate policies Information Toolkit for post-2012 climate policies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Information Toolkit for post-2012 climate policies Agency/Company /Organization: Energy Research Centre of the Netherlands Partner: Brinkman Climate Change Sector: Energy Topics: Co-benefits assessment, Policies/deployment programs, Pathways analysis Resource Type: Dataset, Software/modeling tools Website: www.brinkmanclimatechange.com/Toolkit.htm Coordinates: 31.9524799°, -102.1732882° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":31.9524799,"lon":-102.1732882,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

165

Integrated: Geospatial Toolkit for Brazil from NREL - Download...  

Open Energy Info (EERE)

66baaf1f-6d30-4cd2-888d-2e4ecff5ecdbresource8161382f-e58b-4e60-9558-340561151156downloadbrazgst172.zip Download Executable Toolkit & Documentation No preview available. More...

166

Visual toolkit for network security experiment specification and data analysis  

Science Journals Connector (OSTI)

The increasing availability of network testbeds and the benefits of visualization-based security study call for the emergence of supporting tools for network security research. In this article we present ESVT, an integrated experiment specification and ... Keywords: animated topology, experiment specification, testbed, visual toolkit

L. Li; P. Liu; G. Kesidis

2006-11-01T23:59:59.000Z

167

A Hack-Free RTS Game Toolkit Michael Buro  

E-Print Network [OSTI]

ORTS A Hack-Free RTS Game Toolkit Michael Buro RTDS-Meeting Oct/25/2002 Outline RTS Games Sophisticated distributed game AI Competition on server Hack-free client software Server-Side Game Simulation Server-Side Simulation Benefits Client hacks useless. Fair competition! All unit commands

Buro, Michael

168

Waste Toolkit A-Z Plastic cups Grundon  

E-Print Network [OSTI]

Waste Toolkit A-Z Plastic cups ­ Grundon Can I recycle plastic cups? Yes, you can recycle plastic cups if they are made from PET or HDPE plastic (ask your supplier to confirm the type of plastic if you do not know). If the cups are made from any other type of plastic (see symbols below) they cannot

Melham, Tom

169

ORBIT -Operating-Regime-Based Modeling and Identi cation Toolkit  

E-Print Network [OSTI]

projects. The MATLAB-based software tool is called ORBIT (Operating-Regime-Based modeling and Identi cation, Norway. ORBIT is a MATLAB-based toolkit for black-box and grey-box mod- eling of non-linear dynamic feature of ORBIT, compared for example to the MATLAB Fuzzy Logic Toolbox, is the strong focus

Foss, Bjarne A.

170

Capturing and Using Knowledge about the Use of Visualization Toolkits  

SciTech Connect (OSTI)

When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

2012-11-02T23:59:59.000Z

171

GRANT AND CONTRACT ACCOUNTING GRANT REVIEW TOOLKIT POST AWARD PROCESS  

E-Print Network [OSTI]

GRANT AND CONTRACT ACCOUNTING ­ GRANT REVIEW TOOLKIT POST AWARD PROCESS Page 1 of 7 POST AWARD PROCESS The below information is a brief overview of the Post Award Process that Grant and Contract responsibilities, as they relate to the post award management and compliance of sponsored projects. Grant

Heller, Barbara

172

Architecture 2030 District Toolkit- 2014 BTO Peer Review  

Broader source: Energy.gov [DOE]

Presenter: Cindy Regnier, Lawrence Berkeley National Laboratory This project aims to create programmatic guidance and a technical toolkit to support the promotion, development, and execution of 2030 District energy efficiency savings programs for small commercial office and retail buildings across the nation.

173

Using the Model Coupling Toolkit to couple earth system models  

Science Journals Connector (OSTI)

Continued advances in computational resources are providing the opportunity to operate more sophisticated numerical models. Additionally, there is an increasing demand for multidisciplinary studies that include interactions between different physical ... Keywords: COAMPS, Model Coupling Toolkit, Model coupling, ROMS, SWAN, Sparse matrix interpolation

John C. Warner; Natalie Perlin; Eric D. Skyllingstad

2008-10-01T23:59:59.000Z

174

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMU’s are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

175

Toolkit for Public-Private Partnerships in Roads and Highways | Open Energy  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » Toolkit for Public-Private Partnerships in Roads and Highways Jump to: navigation, search Tool Summary Name: Toolkit for Public-Private Partnerships in Roads and Highways Agency/Company /Organization: World Bank Sector: Energy Focus Area: Transportation Resource Type: Guide/manual User Interface: Website Website: www.ppiaf.org/ppiaf/sites/ppiaf.org/files/documents/toolkits/highwayst Cost: Free Toolkit for Public-Private Partnerships in Roads and Highways Screenshot References: Toolkit for Public-Private Partnerships in Roads and Highways[1] "The Toolkit for Public-Private Partnership in Roads and Highways is to

176

Integrated: Enhanced Geospatial Toolkit for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Enhanced Geospatial Toolkit for Sri Lanka from NREL Enhanced Geospatial Toolkit for Sri Lanka from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): Enhancements to the GeoSpatial Toolkit (GsT) were funded by USAID's Southeast Asia Regional Initiative/Energy (SARI/E). These enhancements include additional functionality and data development not available with the standard GeoSpatial Toolkit.

177

Greenhouse Gas Inventory Development Toolkit | Open Energy Information  

Open Energy Info (EERE)

Greenhouse Gas Inventory Development Toolkit Greenhouse Gas Inventory Development Toolkit Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

178

Renewable Energy Technical Potential Toolkit | Open Energy Information  

Open Energy Info (EERE)

Renewable Energy Technical Potential Toolkit Renewable Energy Technical Potential Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

179

USAID Toolkit for Increasing Energy Access | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » USAID Toolkit for Increasing Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: USAID Toolkit for Increasing Energy Access Agency/Company /Organization: United States Agency for International Development (USAID) Partner: United Nations Framework Convention on Climate Change (UNFCCC), UNEP, United Nations Foundation Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, People and Policy Phase: Evaluate Options, Develop Goals, Prepare a Plan, Create Early Successes, Evaluate Effectiveness and Revise as Needed Topics: Co-benefits assessment, - Energy Access

180

Project Screening and Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Project Screening and Design Toolkit Project Screening and Design Toolkit Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Land-use Scenario Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land-use Scenario Analysis Toolkit Land-use Scenario Analysis Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

182

Energy System and Scenario Analysis Toolkit | Open Energy Information  

Open Energy Info (EERE)

Energy System and Scenario Analysis Toolkit Energy System and Scenario Analysis Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

183

Performance Based Service Acquisition Toolkit | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Guidance Guidance » Contracting for Support Services » Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit Performance-based Service Acquisition (PBA) means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed. Performance-based Work Statement (PWS) means that a statement of work for performance-based acquisitions that describes the required results in clear, specific and objective terms with measurable outcomes. Statement of Objectives (SOO) means a Government-prepared document incorporated into the solicitation that states the overall performance objectives. It is used in solicitations when the Government intends to provide the maximum flexibility to each offeror to propose an innovative

184

LEDSGP/DIA-Toolkit/How To | Open Energy Information  

Open Energy Info (EERE)

How To How To < LEDSGP‎ | DIA-Toolkit Jump to: navigation, search LEDSGP Logo.png Development Impacts Assessment Toolkit Home Tools Request Assistance How to Assess Development Impacts Countries may assess the impacts of a proposed or implemented development policy, program, or project on social, economic, and environmental development goals through a five-step process: Identify the policy or program of interest: What policy or program am I considering? Define impacts to consider: What impacts am I interested in identifying and evaluating? Identify the options for examining impacts: What tools and methodologies, both quantitative and qualitative, are available for impact analysis? Conduct the analysis. Share the results. 1. What policy or program am I considering?

185

Renewable Energy Technical Potential Toolkit | Open Energy Information  

Open Energy Info (EERE)

Energy Technical Potential Toolkit Energy Technical Potential Toolkit (Redirected from Gateway:International/Renewable Energy and Energy Efficiency Potential) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives

186

Sustainable Land-use Impact Assessment Toolkit | Open Energy Information  

Open Energy Info (EERE)

Sustainable Land-use Impact Assessment Toolkit Sustainable Land-use Impact Assessment Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

187

Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Policy and Program Design Toolkit Policy and Program Design Toolkit (Redirected from Gateway:International/Policy and Program Design) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

188

Technology Cost and Performance Toolkit | Open Energy Information  

Open Energy Info (EERE)

Technology Cost and Performance Toolkit Technology Cost and Performance Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

189

A new development cycle of the Statistical Toolkit  

E-Print Network [OSTI]

The Statistical Toolkit is an open source system specialized in the statistical comparison of distributions. It addresses requirements common to different experimental domains, such as simulation validation (e.g. comparison of experimental and simulated distributions), regression testing in the course of the software development process, and detector performance monitoring. Various sets of statistical tests have been added to the existing collection to deal with the one sample problem (i.e. the comparison of a data distribution to a function, including tests for normality, categorical analysis and the estimate of randomness). Improved algorithms and software design contribute to the robustness of the results. A simple user layer dealing with primitive data types facilitates the use of the toolkit both in standalone analyses and in large scale experiments.

Batic, M; Pfeiffer, A; Pia, M G; Ribon, A

2012-01-01T23:59:59.000Z

190

Project Screening and Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Screening and Design Toolkit Screening and Design Toolkit (Redirected from Gateway:International/Project Screening and Design) Jump to: navigation, search Stage 2 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

191

Monitoring the grid with the globus toolkit MDS4.  

SciTech Connect (OSTI)

The Globus Toolkit Monitoring and Discovery System (MDS4) defines and implements mechanisms for service and resource discovery and monitoring in distributed environments. MDS4 is distinguished from previous similar systems by its extensive use of interfaces and behaviors defined in the WS-Resource Framework and WS-Notification specifications, and by its deep integration into essentially every component of the Globus Toolkit. We describe the MDS4 architecture and the Web service interfaces and behaviors that allow users to discover resources and services, monitor resource and service states, receive updates on current status, and visualize monitoring results. We present two current deployments to provide insights into the functionality that can be achieved via the use of these mechanisms.

Schopf, J. M.; Pearlman, L.; Miller, N.; Kesselman, C.; Foster, I.; D'Arcy, M.; Chervenak, A.; Mathematics and Computer Science; Univ. of Chicago; Univ. of Southern California; Univ. of Edinburgh

2006-01-01T23:59:59.000Z

192

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

193

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

194

WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems  

Science Journals Connector (OSTI)

We have presented WAVOS: a comprehensive wavelet-based MATLAB toolkit that allows for easy visualization, exploration... http://sourceforge.net/projects/wavos/files/ ...

Richard Harang; Guillaume Bonnet; Linda R Petzold

2012-03-01T23:59:59.000Z

195

LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan...  

Open Energy Info (EERE)

Transportation Toolkit Home Tools Training Request Assistance Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for...

196

A Molecular Modeling Toolkit with Applications to Efficient Free Energy Computation.  

E-Print Network [OSTI]

??In this thesis we develop a molecular modeling toolkit that models the conformation space of proteins and allows easy prototyping of algorithms on the conformation… (more)

Tezcan, Hasan Gokhan

2010-01-01T23:59:59.000Z

197

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

198

Guide to Using the WIND Toolkit Validation Code  

SciTech Connect (OSTI)

In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

2014-12-01T23:59:59.000Z

199

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

200

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

202

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

203

Mobile Computing with the Rover Toolkit Anthony D. Joseph, Joshua A. Tauber, and M. Frans Kaashoek  

E-Print Network [OSTI]

Mobile Computing with the Rover Toolkit Anthony D. Joseph, Joshua A. Tauber, and M. Frans Kaashoek@lcs.mit.edu Abstract Rover is a software toolkit that supports the construction of both mobile­transparent and mobile­aware appli­ cations. The objective of the mobile­transparent approach is to develop proxies for system

Joseph, Anthony D.

204

Mobile Computing with the Rover Toolkit Anthony D. Joseph, Joshua A. Tauber, and M. Frans Kaashoek  

E-Print Network [OSTI]

Mobile Computing with the Rover Toolkit Anthony D. Joseph, Joshua A. Tauber, and M. Frans Kaashoek@lcs.mit.edu Abstract Rover is a software toolkit that supports the construction of both mobile-transparent and mobile-aware appli- cations. The objective of the mobile-transparent approach is to develop proxies for system

Han, Richard Y.

205

American Institute of Aeronautics and Astronautics Development of a Distributed Design Toolkit for Analyzing  

E-Print Network [OSTI]

American Institute of Aeronautics and Astronautics 1 Development of a Distributed Design Toolkit - SUNY, Buffalo, NY, 14260 The distribution of a complex system design problem into smaller, coupled a toolkit that enables the modeling and analysis of distributed design process architectures using basic

Lewis, Kemper E.

206

Integrated: Geospatial Toolkit GIS data for Nepal from NREL | OpenEI  

Open Energy Info (EERE)

Nepal from NREL Nepal from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners.To access the Geospatial toolkit, http://www.nrel.gov/international/geospatial_toolkits.html

207

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot DÂŽaniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

BencsĂĄth, BoldizsĂĄr

208

The Wind Integration National Dataset (WIND) toolkit (Presentation)  

SciTech Connect (OSTI)

Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

Caroline Draxl: NREL

2014-01-01T23:59:59.000Z

209

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

210

Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)  

SciTech Connect (OSTI)

The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

Young, K. R.; Levine, A.

2014-09-01T23:59:59.000Z

211

An Attack on Centrifugal Costs  

E-Print Network [OSTI]

AN ATTACK ON CENTRIFUGAL COSTS j P. ~,t~~c1ier Mwra~ I Mons'anto ' Alvin, 'ie~as I ABSTRACT Energy conservation in small and medium horse power industrial centrifugal power users has re ceived very little attention to date. Monsanto...

Murray, P. F.

212

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

213

E-Print Network 3.0 - attack model development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: for the development of realistic models of DoS traffic, can be packaged as an automated tool to aid in rapid response... to detect and re- spond to attacks quickly....

214

Transverse space charge effect calculation in the Synergia accelerator modeling toolkit  

SciTech Connect (OSTI)

This paper describes a transverse space charge effect calculation algorithm, developed in the context of accelerator modeling toolkit Synergia. The introduction to the space charge problem and the Synergia modeling toolkit short description are given. The developed algorithm is explained and the implementation is described in detail. As a result of this work a new space charge solver was developed and integrated into the Synergia toolkit. The solver showed correct results in comparison to existing Synergia solvers and delivered better performance in the regime where it is applicable.

Okonechnikov, Konstantin; Amundson, James; Macridin, Alexandru; /Fermilab

2009-09-01T23:59:59.000Z

215

Modeling attacks on physical unclonable functions  

E-Print Network [OSTI]

We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm ...

Ulrich, Ruhrmair

216

Afghanistan Geospatial Toolkit - Full Data | OpenEI  

Open Energy Info (EERE)

Full Data Full Data Dataset Summary Description (Abstract): This Geospatial Toolkit contains the full (with high resolution data) version of the GsT interfaced to HOMER for Afghanistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

217

Pakistan Geospatial Toolkit - Data Lite | OpenEI  

Open Energy Info (EERE)

Data Lite Data Lite Dataset Summary Description (Abstract): This Geospatial Toolkit contains the lite (with lower resolution data) version of the GsT interfaced to HOMER for Pakistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

218

Pakistan Geospatial Toolkit - Full Data | OpenEI  

Open Energy Info (EERE)

Full Data Full Data Dataset Summary Description (Abstract): This Geospatial Toolkit contains the full (with high resolution data) version of the GsT interfaced to HOMER for Pakistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

219

Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Policy and Program Design Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country

220

Technology Cost and Performance Toolkit | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Technology Cost and Performance Toolkit (Redirected from Gateway:International/Technology Performance and Costs) Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Afghanistan Geospatial Toolkit - Data Lite | OpenEI  

Open Energy Info (EERE)

Data Lite Data Lite Dataset Summary Description (Abstract): This Geospatial Toolkit contains the lite (with lower resolution data) version of the GsT interfaced to HOMER for Afghanistan. (Purpose): The products contained on this web site were developed by the U.S. National Renewable Energy Laboratory (NREL) for the U.S. Agency for International Development's (USAID) South Asia Regional Initiative for Energy Cooperation (SARI/E). (Supplemental Information): The GsT allows the user to examine the resource data in a geospatial context along with other key information relevant to renewable energy development, such as transportation networks, transmission corridors, existing power facilities, load centers, terrain conditions, and land use. Working within the GsT, the user can also incorporate location-specific data directly into NREL's Micropower Optimization Model, HOMER, to design least-cost hybrid renewable power systems to meet electric-load requirements at the village level.

222

SEMILAR: A Semantic Similarity Toolkit For Assessing Students' Natural Language Inputs  

E-Print Network [OSTI]

SEMILAR: A Semantic Similarity Toolkit For Assessing Students' Natural Language Inputs Vasile Rus to understand students' natural language responses. Accurate assessment of students' responses enables, & Graesser, in press). There are at least two different types of natural language assessments

Rus, Vasile

223

PART 1 OF TUTORIAL ON EXTREMES TOOLKIT (1) Installation of R software  

E-Print Network [OSTI]

PART 1 OF TUTORIAL ON EXTREMES TOOLKIT (1) Installation of R software R-2.9.2-win32.exe Use default options (2) Installation of Extremes Toolkit extRemes (R package for extreme value analysis): extRemes_1.60.zip ismev (R package used by extRemes): ismev_1.34.zip Lmoments (R package used by extRemes): Lmoments

Katz, Richard

224

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

225

Information sharing for distributed intrusion detection systems  

Science Journals Connector (OSTI)

In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems ... Keywords: Anomaly detection, Denial of service attack, Distributed intrusion detection, Information sharing, Reflector attack

Tao Peng; Christopher Leckie; Kotagiri Ramamohanarao

2007-08-01T23:59:59.000Z

226

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-08-03T23:59:59.000Z

227

Renewable Energy and Energy Efficiency Toolkit Website | Open Energy  

Open Energy Info (EERE)

Renewable Energy and Energy Efficiency Toolkit Website Renewable Energy and Energy Efficiency Toolkit Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy and Energy Efficiency Toolkit Website Focus Area: Renewable Energy Topics: Policy Impacts Website: toolkits.reeep.org/ Equivalent URI: cleanenergysolutions.org/content/renewable-energy-and-energy-efficienc Language: "English,Chinese,French,Portuguese,Spanish" is not in the list of possible values (Abkhazian, Achinese, Acoli, Adangme, Adyghe; Adygei, Afar, Afrihili, Afrikaans, Afro-Asiatic languages, Ainu, Akan, Akkadian, Albanian, Aleut, Algonquian languages, Altaic languages, Amharic, Angika, Apache languages, Arabic, Aragonese, Arapaho, Arawak, Armenian, Aromanian; Arumanian; Macedo-Romanian, Artificial languages, Assamese, Asturian; Bable; Leonese; Asturleonese, Athapascan languages, Australian languages, Austronesian languages, Avaric, Avestan, Awadhi, Aymara, Azerbaijani, Balinese, Baltic languages, Baluchi, Bambara, Bamileke languages, Banda languages, Bantu (Other), Basa, Bashkir, Basque, Batak languages, Beja; Bedawiyet, Belarusian, Bemba, Bengali, Berber languages, Bhojpuri, Bihari languages, Bikol, Bini; Edo, Bislama, Blin; Bilin, Blissymbols; Blissymbolics; Bliss, Bosnian, Braj, Breton, Buginese, Bulgarian, Buriat, Burmese, Caddo, Catalan; Valencian, Caucasian languages, Cebuano, Celtic languages, Central American Indian languages, Central Khmer, Chagatai, Chamic languages, Chamorro, Chechen, Cherokee, Cheyenne, Chibcha, Chichewa; Chewa; Nyanja, Chinese, Chinook jargon, Chipewyan; Dene Suline, Choctaw, Chuukese, Chuvash, Classical Newari; Old Newari; Classical Nepal Bhasa, Classical Syriac, Coptic, Cornish, Corsican, Cree, Creek, Creoles and pidgins , Crimean Tatar; Crimean Turkish, Croatian, Cushitic languages, Czech, Dakota, Danish, Dargwa, Delaware, Dinka, Divehi; Dhivehi; Maldivian, Dogri, Dogrib, Dravidian languages, Duala, Dutch; Flemish, Dyula, Dzongkha, Eastern Frisian, Efik, Egyptian (Ancient), Ekajuk, Elamite, English, Erzya, Esperanto, Estonian, Ewe, Ewondo, Fang, Fanti, Faroese, Fijian, Filipino; Pilipino, Finnish, Finno-Ugrian languages, Fon, French, Friulian, Fulah, Ga, Gaelic; Scottish Gaelic, Galibi Carib, Galician, Ganda, Gayo, Gbaya, Geez, Georgian, German, Germanic languages, Gilbertese, Gondi, Gorontalo, Gothic, Grebo, Greek, Modern, Guarani, Gujarati, Gwich'in, Haida, Haitian; Haitian Creole, Hausa, Hawaiian, Hebrew, Herero, Hiligaynon, Himachali languages; Western Pahari languages, Hindi, Hiri Motu, Hittite, Hmong; Mong, Hungarian, Hupa, Iban, Icelandic, Ido, Igbo, Ijo languages, Iloko, Inari Sami, Indic languages, Indo-European languages, Indonesian, Ingush, Interlingue; Occidental, Inuktitut, Inupiaq, Iranian languages, Irish, Iroquoian languages, Italian, Japanese, Javanese, Judeo-Arabic, Judeo-Persian, Kabardian, Kabyle, Kachin; Jingpho, Kalaallisut; Greenlandic, Kalmyk; Oirat, Kamba, Kannada, Kanuri, Kara-Kalpak, Karachay-Balkar, Karelian, Karen languages, Kashmiri, Kashubian, Kawi, Kazakh, Khasi, Khoisan languages, Khotanese; Sakan, Kikuyu; Gikuyu, Kimbundu, Kinyarwanda, Kirghiz; Kyrgyz, Klingon; tlhIngan-Hol, Komi, Kongo, Konkani, Korean, Kosraean, Kpelle, Kru languages, Kuanyama; Kwanyama, Kumyk, Kurdish, Kurukh, Kutenai, Ladino, Lahnda, Lamba, Land Dayak languages, Lao, Latin, Latvian, Lezghian, Limburgan; Limburger; Limburgish, Lingala, Lithuanian, Lojban, Lower Sorbian, Lozi, Luba-Katanga, Luba-Lulua, Luiseno, Lule Sami, Lunda, Luo (Kenya and Tanzania), Lushai, Luxembourgish; Letzeburgesch, Macedonian, Madurese, Magahi, Maithili, Makasar, Malagasy, Malay, Malayalam, Maltese, Manchu, Mandar, Mandingo, Manipuri, Manobo languages, Manx, Maori, Mapudungun; Mapuche, Marathi, Mari, Marshallese, Marwari, Masai, Mayan languages, Mende, Mi'kmaq; Micmac, Minangkabau, Mirandese, Mohawk, Moksha, Mon-Khmer languages, Mongo, Mongolian, Mossi, Multiple languages, Munda languages, N'Ko, Nahuatl languages, Nauru, Navajo; Navaho, Ndebele, North; North Ndebele, Ndebele, South; South Ndebele, Ndonga, Neapolitan, Nepal Bhasa; Newari, Nepali, Nias, Niger-Kordofanian languages, Nilo-Saharan languages, Niuean, North American Indian languages, Northern Frisian, Northern Sami, Norwegian, Nubian languages, Nyamwezi, Nyankole, Nyoro, Nzima, Occitan (post 1500); Provençal, Ojibwa, Oriya, Oromo, Osage, Ossetian; Ossetic, Otomian languages, Pahlavi, Palauan, Pali, Pampanga; Kapampangan, Pangasinan, Panjabi; Punjabi, Papiamento, Papuan languages, Pedi; Sepedi; Northern Sotho, Persian, Philippine languages, Phoenician, Pohnpeian, Polish, Portuguese, Prakrit languages, Pushto; Pashto, Quechua, Rajasthani, Rapanui, Rarotongan; Cook Islands Maori, Romance languages, Romanian; Moldavian; Moldovan, Romansh, Romany, Rundi, Russian, Salishan languages, Samaritan Aramaic, Sami languages, Samoan, Sandawe, Sango, Sanskrit, Santali, Sardinian, Sasak, Scots, Selkup, Semitic languages, Serbian, Serer, Shan, Shona, Sichuan Yi; Nuosu, Sicilian, Sidamo, Sign Languages, Siksika, Sindhi, Sinhala; Sinhalese, Sino-Tibetan languages, Siouan languages, Skolt Sami, Slave (Athapascan), Slavic languages, Slovak, Slovenian, Sogdian, Somali, Songhai languages, Soninke, Sorbian languages, Sotho, Southern, South American Indian (Other), Southern Altai, Southern Sami, Spanish; Castilian, Sranan Tongo, Sukuma, Sumerian, Sundanese, Susu, Swahili, Swati, Swedish, Swiss German; Alemannic; Alsatian, Syriac, Tagalog, Tahitian, Tai languages, Tajik, Tamashek, Tamil, Tatar, Telugu, Tereno, Tetum, Thai, Tibetan, Tigre, Tigrinya, Timne, Tiv, Tlingit, Tok Pisin, Tokelau, Tonga (Nyasa), Tonga (Tonga Islands), Tsimshian, Tsonga, Tswana, Tumbuka, Tupi languages, Turkish, Turkmen, Tuvalu, Tuvinian, Twi, Udmurt, Ugaritic, Uighur; Uyghur, Ukrainian, Umbundu, Uncoded languages, Undetermined, Upper Sorbian, Urdu, Uzbek, Vai, Venda, Vietnamese, Volap√Âșk, Votic, Wakashan languages, Walamo, Walloon, Waray, Washo, Welsh, Western Frisian, Wolof, Xhosa, Yakut, Yao, Yapese, Yiddish, Yoruba, Yupik languages, Zande languages, Zapotec, Zaza; Dimili; Dimli; Kirdki; Kirmanjki; Zazaki, Zenaga, Zhuang; Chuang, Zulu, Zuni) for this property.

228

Using the Model Coupling Toolkit to couple earth system models  

Science Journals Connector (OSTI)

Continued advances in computational resources are providing the opportunity to operate more sophisticated numerical models. Additionally, there is an increasing demand for multidisciplinary studies that include interactions between different physical processes. Therefore there is a strong desire to develop coupled modeling systems that utilize existing models and allow efficient data exchange and model control. The basic system would entail model “1” running on “M” processors and model “2” running on “N” processors, with efficient exchange of model fields at predetermined synchronization intervals. Here we demonstrate two coupled systems: the coupling of the ocean circulation model Regional Ocean Modeling System (ROMS) to the surface wave model Simulating \\{WAves\\} Nearshore (SWAN), and the coupling of ROMS to the atmospheric model Coupled Ocean Atmosphere Prediction System (COAMPS). Both coupled systems use the Model Coupling Toolkit (MCT) as a mechanism for operation control and inter-model distributed memory transfer of model variables. In this paper we describe requirements and other options for model coupling, explain the MCT library, ROMS, SWAN and COAMPS models, methods for grid decomposition and sparse matrix interpolation, and provide an example from each coupled system. Methods presented in this paper are clearly applicable for coupling of other types of models.

John C. Warner; Natalie Perlin; Eric D. Skyllingstad

2008-01-01T23:59:59.000Z

229

A Public Toolkit and ITS Dataset for EEG Yueran Yuan, Kai-min Chang, Yanbo Xu, Jack Mostow  

E-Print Network [OSTI]

A Public Toolkit and ITS Dataset for EEG Yueran Yuan, Kai-min Chang, Yanbo Xu, Jack Mostow Language a classifier to estimate a student's amount of prior exposure to a given word. We make this dataset and toolkit setting. In this paper, we present a dataset from 3 years of school usage of Project LISTEN's Reading

230

Practical Attacks on Proximity Identification Systems  

E-Print Network [OSTI]

DEFCON ­ eavesdropped RFID at 20 m Confusion ?? RFID type Definition of distances Experimental setup skimming) Relay Attacks Practical Attacks on Proximity Identification Systems ­ p. #12;"Proximity from distance dE Further considerations dRT , Reader Token communication dTR, Token Reader

Hancke, Gerhard

231

Detection and Analysis of Threatsto the Energy Sector (DATES), March 2010 |  

Broader source: Energy.gov (indexed) [DOE]

, , March 2010 Detection and Analysis of Threatsto the Energy Sector (DATES), March 2010 A security monitoring capability featuring multiple detection algorithms and cross-domain event correlation for defense against cyber attacks on energy control systems. DATES is a detection and security information/event management (SIEM) solution enabling asset owners to protect their energy control systems at the network, host, and device level from cyber attacks. DATES complements traditional, signature-based detection with multiple detection algorithms, including modelbased and flow anomaly detection and cross-site attack correlation. The DATES detection and SIEM solution gives operators succinct and intuitive attack visualization, with attacks prioritized as to their

232

Integrated: Geospatial Toolkit GIS data for Ghana from NREL | OpenEI  

Open Energy Info (EERE)

Ghana from NREL Ghana from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

233

Integrated: Geospatial Toolkit GIS data for Guatemala from NREL | OpenEI  

Open Energy Info (EERE)

Guatemala from NREL Guatemala from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

234

Integrated: Geospatial Toolkit GIS data for China from NREL | OpenEI  

Open Energy Info (EERE)

China from NREL China from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

235

Integrated: Geospatial Toolkit GIS data for El Salvador from NREL | OpenEI  

Open Energy Info (EERE)

El Salvador from NREL El Salvador from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

236

Integrated: Geospatial Toolkit GIS data for Bangladesh from NREL | OpenEI  

Open Energy Info (EERE)

Bangladesh from NREL Bangladesh from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

237

Integrated: Geospatial Toolkit for El Salvador from NREL | OpenEI  

Open Energy Info (EERE)

El Salvador from NREL El Salvador from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

238

Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL | OpenEI  

Open Energy Info (EERE)

Nicaragua from NREL Nicaragua from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

239

Integrated: Geospatial Toolkit GIS data for Kenya from NREL | OpenEI  

Open Energy Info (EERE)

Kenya from NREL Kenya from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

240

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Evaluate the System < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Evaluate the System) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

242

Integrated: Geospatial Toolkit GIS data for Cuba from NREL | OpenEI  

Open Energy Info (EERE)

Cuba from NREL Cuba from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

243

LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Create a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

244

Integrated: Geospatial Toolkit GIS data for Ethiopia from NREL | OpenEI  

Open Energy Info (EERE)

Ethiopia from NREL Ethiopia from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software.(Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

245

Integrated: Geospatial Toolkit GIS data for Brazil from NREL | OpenEI  

Open Energy Info (EERE)

Brazil from NREL Brazil from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

246

Integrated: Geospatial Toolkit GIS data for Honduras from NREL | OpenEI  

Open Energy Info (EERE)

Honduras from NREL Honduras from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software.(Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

247

LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan | Open Energy  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Prioritize and Plan < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Prioritize and Plan) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

248

Integrated: Geospatial Toolkit for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Sri Lanka from NREL Sri Lanka from NREL Dataset Summary Description (Abstract): Stand-alone and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected areas, elevation, etc. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the geospatial toolkit executable, Getting Started Document, and metadata.

249

AutoMicromanager: A microscopy scripting toolkit for LABVIEW and other programming environments  

Science Journals Connector (OSTI)

We present a scripting toolkit for the acquisition and analysis of a wide variety of imaging data by integrating the ease of use of various programming environments such as LABVIEW IGOR PRO MATLAB SCILAB and others. This toolkit is designed to allow the user to quickly program a variety of standard microscopy components for custom microscopy applications allowing much more flexibility than other packages. Included are both programming tools as well as graphical user interface classes allowing a standard consistent and easy to maintain scripting environment. This programming toolkit allows easy access to most commonly used cameras stages and shutters through the Micromanager project so the scripter can focus on their custom application instead of boilerplate code generation.

Brian Alan Ashcroft; Tjerk Oosterkamp

2010-01-01T23:59:59.000Z

250

Integrated: Geospatial Toolkit GIS data for Sri Lanka from NREL | OpenEI  

Open Energy Info (EERE)

Sri Lanka from NREL Sri Lanka from NREL Dataset Summary Description (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy Resource Assessment (SWERA) Geospatial Toolkit (GsT) is a map-based software application that can be used for decision making and policy analysis in addition to planning for future energy projects. The SWERA application utilizes Geographical Information Systems (GIS) to develop common scenarios to evaluate potential locations for solar or wind energy plants. (Supplemental Information): The zip file contains the available geospatial toolkit data and metadata. Each country's data package depends on the data provided by the SWERA partners. ---------------------------------------------------------

251

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Implement and Monitor) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a

252

Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems  

E-Print Network [OSTI]

Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2007-04-24T23:59:59.000Z

253

U. S. Army Measurement and Verification (M&V) Costing Toolkit  

E-Print Network [OSTI]

This is the 2003 final report for the U.S. Army Monitoring and Verification (M&V) costs project. The purpose of this project is to develop a M&V Costing Toolkit to be used by the government or third party planners to design a M&V plan...

Haberl, J. S.; Powell, T.; Carlson, K. A.; Im, P.; Turner, W. D.

2003-01-01T23:59:59.000Z

254

Metaprogrammable Toolkit for Model-Integrated Computing Akos Ledeczi, Miklos Maroti, Gabor Karsai and Greg Nordstrom  

E-Print Network [OSTI]

building, constraint management, and automatic program synthesis components, are well suited for the design. Model-Integrated Computing (MIC) is well suited for the rapid design and implementation of such systemsMetaprogrammable Toolkit for Model-Integrated Computing Akos Ledeczi, Miklos Maroti, Gabor Karsai

MarĂłti, MiklĂłs

255

ProtEx: a toolkit for the analysis of distributed real-time systems  

E-Print Network [OSTI]

and queuing policies present in a system. In this thesis we present a methodology to extend the traditional RMA approach by allowing general characterization of workload and flexible modeling of resources. We realize our approaches within ProtEx, a toolkit...

Meylan, Yves Damien Meylan

2012-06-07T23:59:59.000Z

256

Waste Toolkit A-Z Food waste (recycling on-site)  

E-Print Network [OSTI]

Waste Toolkit A-Z Food waste (recycling on-site) How can I recycle food waste on-site? Recycling to be recycled. While this is better than sending waste to landfill, there is a more sustainable way to recycle and parks. See examples of Tidy Planet's customers recycling on-site: www.tidyplanet.co.uk/our-news Short

Melham, Tom

257

The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise  

E-Print Network [OSTI]

1 The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise Ali Khajeh-Hosseini, David Greenwood, James W. Smith, Ian Sommerville Cloud Computing Co-laboratory, School of Computer Science University of St Andrews, UK {akh, dsg22, jws7, ifs}@cs.st-andrews.ac.uk Abstract Cloud computing

Sommerville, Ian

258

Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study  

SciTech Connect (OSTI)

This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

Wang, Na

2013-03-13T23:59:59.000Z

259

Injection Technologies for Fault Attacks on Microprocessors  

Science Journals Connector (OSTI)

The fault injection technique we will analyze in detail in Sect. 16.3, is the constant under-powering of a computing device. By running the chip with a depleted power supply, the attacker is able to insert transi...

Alessandro Barenghi; Guido M. Bertoni; Luca Breveglieri…

2012-01-01T23:59:59.000Z

260

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." żżRichard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack  

Science Journals Connector (OSTI)

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-06-24T23:59:59.000Z

262

Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack  

E-Print Network [OSTI]

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-02-01T23:59:59.000Z

263

Phase 1 Development Report for the SESSA Toolkit.  

SciTech Connect (OSTI)

The Site Exploitation System for Situational Awareness ( SESSA ) tool kit , developed by Sandia National Laboratories (SNL) , is a comprehensive de cision support system for crime scene data acquisition and Sensitive Site Exploitation (SSE). SESSA is an outgrowth of another SNL developed decision support system , the Building R estoration Operations Optimization Model (BROOM), a hardware/software solution for data acquisition, data management, and data analysis. SESSA was designed to meet forensic crime scene needs as defined by the DoD's Military Criminal Investigation Organiza tion (MCIO) . SESSA is a very comprehensive toolki t with a considerable amount of database information managed through a Microsoft SQL (Structured Query Language) database engine, a Geographical Information System (GIS) engine that provides comprehensive m apping capabilities, as well as a an intuitive Graphical User Interface (GUI) . An electronic sketch pad module is included. The system also has the ability to efficiently generate necessary forms for forensic crime scene investigations (e.g., evidence submittal, laboratory requests, and scene notes). SESSA allows the user to capture photos on site, and can read and generate ba rcode labels that limit transcription errors. SESSA runs on PC computers running Windows 7, but is optimized for touch - screen tablet computers running Windows for ease of use at crime scenes and on SSE deployments. A prototype system for 3 - dimensional (3 D) mapping and measur e ments was also developed to complement the SESSA software. The mapping system employs a visual/ depth sensor that captures data to create 3D visualizations of an interior space and to make distance measurements with centimeter - level a ccuracy. Output of this 3D Model Builder module provides a virtual 3D %22walk - through%22 of a crime scene. The 3D mapping system is much less expensive and easier to use than competitive systems. This document covers the basic installation and operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

2014-09-01T23:59:59.000Z

264

TagMe: an easy-to-use toolkit for turning the personal environment into an extended communications interface  

E-Print Network [OSTI]

In this paper we present an end-user toolkit for easy creation of responsive objects and environments. TagMe consists of a wearable device that recognizes the object or surface the user is touching. The user can make ...

Benavides Palos, Xavier

265

When Utility Bills Attack! | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

266

Zero-knowledge against quantum attacks  

E-Print Network [OSTI]

This paper proves that several interactive proof systems are zero-knowledge against quantum attacks. This includes a few well-known classical zero-knowledge proof systems as well as quantum interactive proof systems for the complexity class HVQSZK, which comprises all problems having "honest verifier" quantum statistical zero-knowledge proofs. It is also proved that zero-knowledge proofs for every language in NP exist that are secure against quantum attacks, assuming the existence of quantum computationally concealing commitment schemes. Previously no non-trivial proof systems were known to be zero-knowledge against quantum attacks, except in restricted settings such as the honest-verifier and common reference string models. This paper therefore establishes for the first time that true zero-knowledge is indeed possible in the presence of quantum information and computation.

John Watrous

2005-11-03T23:59:59.000Z

267

Responding to chemical attack. Final report  

SciTech Connect (OSTI)

In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

Bagley, R.W.

1991-02-11T23:59:59.000Z

268

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

Develop Alternative Scenarios Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Develop Alternative Scenarios) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

269

LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios |  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative Scenarios < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

270

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

Assess Opportunities Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions(Redirected from Transportation Toolkit/Key Actions/Assess Opportunities) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport

271

Land-use Policy and Program Design Toolkit | Open Energy Information  

Open Energy Info (EERE)

Land-use Policy and Program Design Toolkit Land-use Policy and Program Design Toolkit Jump to: navigation, search Stage 4 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

272

LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities | Open  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other

273

Real-time analysis of aggregate network traffic for anomaly detection  

E-Print Network [OSTI]

The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies...

Kim, Seong Soo

2005-08-29T23:59:59.000Z

274

Development of a Measurement and Verification (M&V) Costing Toolkit  

E-Print Network [OSTI]

into two parts, including the cost summary and detailed costing information. Labor costs and weather information spreadsheets are also included in each of the workbooks. DESCRIPTION OF THE TOOLKIT Costing Information Input for the Utility... utility billing analysis across 100s of meters for a large retrofit project, which uses weather data from the National Weather Service (NWS). In this figure it is estimated that the one-time setup will take 4 hours of time at $40 per hour, and ? hour...

Haberl, J. S.; Lewis, T.; Im, P.; Carlson, K. A.; Underwood, D.

2004-01-01T23:59:59.000Z

275

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

276

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

277

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

278

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

279

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

280

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer ...

Ruhrmair, Ulrich

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

operation Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and...

282

Fatal Chimpanzee Attack in Loango National Park, Gabon  

E-Print Network [OSTI]

Fatal Chimpanzee Attack in Loango National Park, Gabon Christophe Boesch & Josephine Head & Nikki a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found or habituation. Keywords chimpanzees . fatal attack . gabon . intergroup conflict Introduction Chimpanzee social

283

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

284

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

285

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

286

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

287

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems  

Science Journals Connector (OSTI)

Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely, the time-shift attack—against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (?4%) to break the security of the system. Eve’s success is due to the well-known detection efficiency loophole in the experimental testing of Bell’s inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2008-10-28T23:59:59.000Z

288

Air Pollution Teaching Toolkit Manual on how to teach Air Pollution to Students of Grade 7–9Air Pollution Teaching Toolkit Manual on how to teach air pollution to students of Grade 7–9 Prepared by  

E-Print Network [OSTI]

Users may reproduce and use content of this Toolkit for noncommercial purposes by informing and giving due credit to aforementioned organizations and writers who hold copyright. No other uses are permitted without the express written permission of the aforementioned organizations. Layout Design and Printing by

Charina Cabrido; Gopal Raj Joshi

289

A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.  

SciTech Connect (OSTI)

There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

Groth, Katrina; Tchouvelev, Andrei V.

2014-03-01T23:59:59.000Z

290

Improving the detection ...1 Improving the detection of On-line Vertical Port Scan  

E-Print Network [OSTI]

Improving the detection ...1 Improving the detection of On-line Vertical Port Scan Improving the detection of On-line Vertical Port Scan in IP Traffic Yousra Chabchoub , Christine Fricker and Philippe to detect port scan attacks in IP traffic. Only relevant information about destination IP addresses

Paris-Sud XI, Université de

291

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

292

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia…

2014-01-01T23:59:59.000Z

293

Funding Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Additional Funding Additional Funding QuarkNet Home - Information - Calendar - Contacts - Projects - Forms: EoI - Teachers Many additional sources of funding are available above and beyond the QuarkNet funds. They can be in the form of money, supplies, matching funds and in-kind contributions. The sources run from National Science Foundation (NSF) grants to local stores in your area. Some of those sources are listed below. If you know of others, please send them in. Sources of Funds Name Source Deadline Amount Availability Research Experience for Teachers (RET) National Science Foundation (NSF) Anytime Can fund multiple teachers for 8 weeks Annually Venture Fund American Association of Physics Teachers (AAPT) None Up to $25,000 to promote the development and marketing of innovative teaching products and services One project at a time

294

Funding Toolkit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Experience for Teachers (RET) Research Experience for Teachers (RET) Organization: National Science Foundation (NSF) Deadline: NA Limitations: Institution must have a REU grant or be applying for one Amount varies depending on needs. An institution can apply for up to 2 months of a teacher's annualized salary for as many teachers as necessary. Available annually The institution MUST have a Research Experience for Undergraduates (REU) grant or must be applying for an REU grant along with the RET grant. The RET request (as supplement or as part of the proposal) should address the following points. The request should describe the plan for teacher activities and the nature of involvement with the REU site program. One special goal of this involvement should be to incorporate the outcome of

295

LEDSGP/Transportation Toolkit/Key Actions/Implement and Monitor | Open  

Open Energy Info (EERE)

Actions/Implement and Monitor Actions/Implement and Monitor < LEDSGP‎ | Transportation Toolkit‎ | Key Actions Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Contacts Key Actions for Low-Emission Development in Transportation Although no single approach or fixed process exists for low-emission development strategies (LEDS), the following key actions are necessary steps for implementing LEDS in the transportation sector. Undertaking these actions requires flexibility to adapt to dynamic societal conditions in a way that complements existing climate and development goals in other sectors. Planners, researchers, and decision-makers should customize this LEDS implementation framework for the specific conditions of their transport sector, choosing from relevant resources to achieve a comprehensive action

296

News Release: Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)  

Broader source: Energy.gov (indexed) [DOE]

No-Cost ANTFARM Tool Maps Control System Networks to Help Implement No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in meeting the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards. The Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM) helps utilities meet NERC CIP-005, which requires that they identify their electronic security perimeter (ESP), inside which all critical cyber assets and external access points reside. By using a utility's existing network information and

297

Attacking Systems ecurity vulnerabilities related to buffer overruns  

E-Print Network [OSTI]

Attacking Systems S ecurity vulnerabilities related to buffer overruns account for the largest exploits that take ad- vantage of the vulnerability to attack a system. The traditional approach and even security profession- als seemingly assume that all buffer overrun exploits operate in a similar

Sekar, R.

298

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

299

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

300

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks  

E-Print Network [OSTI]

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J by an implementation of the relay attack that has been tested on live systems. Once designers appreciate the risk to the smartcard standard, based on a distance bounding protocol, which provides adequate resistance to the relay

Xu, Wenyuan

302

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

303

On the algebraic attack against summation type keystream generators  

Science Journals Connector (OSTI)

The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.

Md. Iftekhar Salam; Hoon-Jae Lee

2012-01-01T23:59:59.000Z

304

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

305

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

306

Analysis and Defense of Emerging Malware Attacks  

E-Print Network [OSTI]

propose a new scheme, which is named as informed active probing, for large-scale P2P malware analysis and detection. In further, our internet-wide evaluation shows our active probing scheme can successfully detect malicious P2P malware and its...

Xu, Zhaoyan

2014-05-28T23:59:59.000Z

307

PoisonAmplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. ...

Jialong Zhang; Chao Yang; Zhaoyan Xu; Guofei Gu

2012-09-01T23:59:59.000Z

308

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

309

E-Print Network 3.0 - attacks influence driving Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

310

E-Print Network 3.0 - attacks draft resolution Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(and our attacks) to four real-world PRNGs. We close Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 8 Cryptanalytic Attacks on...

311

Complex Attack Analysis and Safeguard Selection: a Cost-Oriented Approach.  

E-Print Network [OSTI]

??When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vulnerability. Rather, they achieve their goals by composing attacks and… (more)

TANG, SUK WAH CRISTINA

2009-01-01T23:59:59.000Z

312

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware...

Jialong Zhang; Chao Yang; Zhaoyan Xu…

2012-01-01T23:59:59.000Z

313

Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community  

Science Journals Connector (OSTI)

Passive attacks are of the nature of eavesdropping on, monitoring of, transmissions where the attacker's goal is to unnoticeably obtain the information in transmission. Passive attacks are difficult to detect and therefore hard to prevent. The main focus for most research in this area has been on preventing the attacks rather than detecting the attacker for example by data encryption. But encryption by itself falls short because passive attack can occur in more ways than just observing exposed data. Encryption is also not always applicable for example in open wireless communication protocols. With these observations, we aim to design a scheme that reduces such attackers' capability. We introduce the non-verbal social signal deception detection in the investigative module while we optimise the scheme by putting in consideration a participant's centrality given the topology. The results are an intuitive scalable and optimised scheme that detects, investigates, and expels the guilty suspects.

Munene W. Kanampiu

2014-01-01T23:59:59.000Z

314

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack the key deriva- tion of IPsec

Paris-Sud XI, Université de

315

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec the confidentiality of other Internet standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack

Fouque, Pierre-Alain

316

Fatal Chimpanzee Attack in Loango National Park, Gabon  

Science Journals Connector (OSTI)

In some populations, chimpanzees engage in lethal aggression within and between social units. We report a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found a...

Christophe Boesch; Josephine Head; Nikki Tagg…

2007-10-01T23:59:59.000Z

317

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

318

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

319

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

320

Modeling attacker-defender interactions in information networks.  

SciTech Connect (OSTI)

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

Collins, Michael Joseph

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

322

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1, we have built a simulation model using OPNET simulation package, where the attack agents create as in the non-attacked condition. Keywords: Network Security, Denial-of-Service Attack, TCP Flooding, Router

Merat, Francis L.

323

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

324

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars  

E-Print Network [OSTI]

to certain types of relay attacks 1 . Our attack allowed to open and start the car while the true distanceRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars AurÂŽelien Francillon, Boris.francillon, boris.danev, srdjan.capkun}@inf.ethz.ch Abstract We demonstrate relay attacks on Passive Keyless Entry

325

Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems  

SciTech Connect (OSTI)

Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

Bri Rolston

2005-09-01T23:59:59.000Z

326

Engineering On-Chip Thermal Attacks  

E-Print Network [OSTI]

we make it? · Temperature profile on an FPGA over 1 day · On-chip temperature measurement · We 2006 #12;Can information be more covert? · Detecting Temperature events on an FPGA · SNR of 24-hour ­Processing load · Digital RO cannot be alias-free tTs fs 2fs f #12;Our communications system f f Heat Source

Schaumont, Patrick

327

We will present an overview of Oak Ridge Bio-surveillance Toolkit (ORBiT), which we have developed specifically to address data analytic challenges in the realm of public health surveillance. The digitization of health related information  

E-Print Network [OSTI]

We will present an overview of Oak Ridge Bio-surveillance Toolkit (ORBiT), which we have developed research scientist in the Computational Data Analytics Group at the Oak Ridge National Labor- atory. Her and machine learning systems, and R&D of ORBiT, the Oak Ridge Biosurveillance Toolkit. Prior to joining ORNL

Mukherjee, Amar

328

A fundamental threat to quantum cryptography: gravitational attacks  

E-Print Network [OSTI]

An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

R. Plaga

2006-03-26T23:59:59.000Z

329

Simulation and modeling for the stand-off radiation detection system (SORDS) using GEANT4  

SciTech Connect (OSTI)

A Stand-Off Radiation Detection System (SORDS) is being developed through a joint effort by Raytheon, Los Alamos National Laboratory, Bubble Technology Industries, Radiation Monitoring Devices, and the Massachusetts Institute of Technology, for the Domestic Nuclear Detection Office (DNDO). The system is a mobile truck-based platform performing detection, imaging, and spectroscopic identification of gamma-ray sources. A Tri-Modal Imaging (TMI) approach combines active-mask coded aperture imaging, Compton imaging, and shadow imaging techniques. Monte Carlo simulation and modeling using the GEANT4 toolkit was used to generate realistic data for the development of imaging algorithms and associated software code.

Hoover, Andrew S [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Mocko, Michal [Los Alamos National Laboratory; Palmer, David [Los Alamos National Laboratory; Schultz, Larry [Los Alamos National Laboratory; Tornga, Shawn [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

330

Watermarking Attack: Security of WSS Techniques Francois Cayre1  

E-Print Network [OSTI]

carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal. This approach is certainly not the only one but secret disclosure is a very powerful hack: it gives the access of the communication channel at the lowest distortion price to hack content. The key idea of this security analysis

Boyer, Edmond

331

Energy Attacks and Defense Techniques for Wireless Systems  

E-Print Network [OSTI]

systems, where energy is the most critical constraint to life- time and reliability. We for the first time propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden Security Keywords Wireless security, hardware Trojan, leakage energy 1. INTRODUCTION Wireless communication

Potkonjak, Miodrag

332

Generalized watermarking attack based on watermark estimation and perceptual remodulation  

E-Print Network [OSTI]

on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise image statistics to perform the best watermark removal or damage. The proposed attack is based and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; b) watermark alteration

GenÚve, Université de

333

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

334

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

335

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

336

Measuring Topological Robustness of Networks under Sustained Targeted Attacks  

Science Journals Connector (OSTI)

In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network ... Keywords: complex networks, robustness, social networks

Mahendra Piraveenan; Shahadat Uddin; Kon Shing Kenneth Chung

2012-08-01T23:59:59.000Z

337

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

338

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

that could deplete IMD resources (e.g., battery power) quickly. The RD attacks could reduce the lifetime are powered by a non-rechargeable battery and replacing the battery requires surgery. Re-charging an IMD from an external RF electromagnetic source causes thermal effects in the organs and thus is not recommended. Unlike

Wu, Jie

339

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

340

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

342

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31 - 28540 of 31,917 results. 31 - 28540 of 31,917 results. Download Questions and Answers for the Smart Grid Investment Grant Program: Accounting Systems http://energy.gov/oe/downloads/questions-and-answers-smart-grid-investment-grant-program-accounting-systems Download Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers http://energy.gov/oe/downloads/cyber-security-audit-and-attack-detection-toolkit-national-scada-test-bed-may-2008 Download Inspection Report: INS-L-10-03 Allegations of Retaliation at a Department of Energy Site http://energy.gov/ig/downloads/inspection-report-ins-l-10-03

343

Florida Conference on Recent Advances in Robotics, FCRAR 2009 -Boca Raton, Florida, May 21-22, 2009 1 RSARSim: A Toolkit for Evaluating  

E-Print Network [OSTI]

Florida Conference on Recent Advances in Robotics, FCRAR 2009 - Boca Raton, Florida, May 21-22, 2009 1 RSARSim: A Toolkit for Evaluating HRI in Robotic Search and Rescue Tasks Bennie Lewis and Gita 32816-2362 BennieLewis@knights.ucf.edu, gitars@eecs.ucf.edu ABSTRACT A well-designed human-robot

Sukthankar, Gita Reese

344

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

345

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......of dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...Support System for Nuclear Emergency Management...Hazard Release Risk Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

346

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...potentially security sensitive...System for Nuclear Emergency...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

347

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

348

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

349

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

350

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

351

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut fË?ur Experimentelle

Diem, Claus

352

Governments' and Terrorists' Defense and Attack in a T-Period Game  

Science Journals Connector (OSTI)

We analyze how a government allocates its resources between attacking to downgrade a terrorist's resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government's asset and defending ... Keywords: conflict, contest success function, dynamics, game theory, multiple-period game, terror capacity, terrorism, threat

Kjell Hausken; Jun Zhuang

2011-03-01T23:59:59.000Z

353

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato  

E-Print Network [OSTI]

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

354

An attack on CFB mode encryption as used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to determine 16 bits of any block of plaintext with about 215 oracle ... Keywords: OpenPGP, chosen-ciphertext attacks, cipher-feedback mode, encryption

Serge Mister; Robert Zuccherato

2005-08-01T23:59:59.000Z

355

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

356

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering  

E-Print Network [OSTI]

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks without stuttering. The attack takes around O(285 ) CPU clocks with 278 keystream observations. Keywords

357

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

358

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

359

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

360

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ... Keywords: Attacker intent and strategy modeling, attack strategy inference, game theory

Peng Liu; Wanyu Zang; Meng Yu

2005-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

362

Ice slurry technology can save heart attack victims, surgery patients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

363

Argonne applied mathematicians use INCITE awards to attack energy problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

364

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

365

Secondary Prevention after Ischemic Stroke or Transient Ischemic Attack  

Science Journals Connector (OSTI)

...-pressure lowering depend on the particular class of antihypertensive drugs or simply on the antihypertensive effect of all such drugs remains controversial, although most of the evidence appears to support the latter. The PROGRESS trial showed a greater reduction in the risk of stroke and other vascular... This article reviews recommended strategies to reduce the risk of a subsequent stroke in patients with a history of transient ischemic attack (TIA) or stroke.

Davis S.M.; Donnan G.A.

2012-05-17T23:59:59.000Z

366

Factors contributing to resistance of cotton to pink bollworm attack  

E-Print Network [OSTI]

cage used in the anti?biosis s t u d y . . . . . . . . . . . . . . . . 5 ? 0 Appendix II. Figure 1* Pink bollworm emergence data, College Station, Texas ,19f?6-195>8. . 1^2 FACTORS CONTRIBUTING TO RESISTANCE OF COTTON TO PINK BOLLWORM ATTACK... hybrids resulting from crosses of aphid- resistant and susceptible cantaloupes were resistant and that the F2 progeny were three-fourths resistant and one- fourth susceptible* This typical Mendellan ratio indicates that resistance was due to a single...

Williams, Robert Kenneth

2013-10-04T23:59:59.000Z

367

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

368

Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection  

E-Print Network [OSTI]

Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection Ulrich Flegel company by itself cannot detect all instances of fraud or insider attacks. An ex- ample is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies

Flegel, Ulrich

369

An information theoretic framework for web inference detection  

Science Journals Connector (OSTI)

Document redaction is widely used to protect sensitive information in published documents. In a basic redaction system, sensitive and identifying terms are removed from the document. Web-based inference is an attack on redaction systems whereby the redacted ... Keywords: document redaction, inference detection, information theory, web-based inference detection

Hoi Le Thi; Reihaneh Safavi-Naini

2012-10-01T23:59:59.000Z

370

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon  

E-Print Network [OSTI]

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon populations. Module 1 The Psychological Effects of Terror 1. Terror as a Strategy of Psychological Warfare against the Masses 2. Mental Health

Rhode Island, University of

371

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

372

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Broader source: Energy.gov (indexed) [DOE]

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

373

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

374

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

375

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

376

A Data-Centric Approach to Insider Attack Detection in Database Systems  

E-Print Network [OSTI]

Petropoulos2 , Hung Q. Ngo2 , and Shambhu Upadhyaya2 1 Information Security, Amazon.com Inc., Seattle WA 98104, USA, smathew@amazon.com, 2 Computer Science and Engineering, University at Buffalo, Buffalo NY 14260, USA, (mpertropo, hungngo, shambhu)@buffalo.edu Abstract. The insider threat against database

Ngo, Hung Q.

377

Paint for detection of corrosion and warning of chemical and radiological attack  

DOE Patents [OSTI]

A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

Farmer, Joseph C. (Tracy, CA)

2010-08-24T23:59:59.000Z

378

Network Attack Detection and Defense Manifesto of the Dagstuhl Perspective Workshop  

E-Print Network [OSTI]

and the critical infrastructures, e.g. the health care system, the traffic system, power supply, trade (in , 2008 Editors: Georg Carle University of Tuebingen, Germany Falko Dressler University Erlangen-Nuremberg, Germany Richard A. Kemmerer University of California, Santa Barbara, USA Hartmut Koenig Brandenburg

Breu, Ruth

379

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network [OSTI]

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may… (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

380

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic  

E-Print Network [OSTI]

systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry is evaluated at packet level (e.g., packet send/delivery ratio [8], the number of jammed packets [11 metrics cannot be readily adapted to measure the jamming impact on time-critical appli- cations. Further

Wang, Wenye

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions  

Science Journals Connector (OSTI)

......2Department of Computer Science, University of Colorado at Colorado Springs, Colorado Springs, CO 80933-7150, USA Corresponding...Trinoo was deployed in at least 227 systems, to flood a single University of Minnesota computer, which......

Monowar H. Bhuyan; H. J. Kashyap; D. K. Bhattacharyya; J. K. Kalita

2014-04-01T23:59:59.000Z

382

StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks  

E-Print Network [OSTI]

resistance and performance. We present experimental results of both the penetration resis- tance by the vendors, before releasing the software, if the vendors had performed elementary testing or code reviews

Walpole, Jonathan

383

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

384

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

385

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

386

E-Print Network 3.0 - amyloid oxidative attack Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: amyloid oxidative attack Page: << < 1 2 3 4 5 > >> 1 Brain Research Reviews 43 (2003) 164178 www.elsevier.comlocatebrainresrev Summary: to...

387

Effect of Tricalcium Silicate Content on Expansion in Internal Sulfate Attack.  

E-Print Network [OSTI]

??The purpose of this study was to determine the cementitious parameters and placement temperature that impact internal sulfate attack in concrete. Concrete structures make up… (more)

Whitfield, Troy T.

2006-01-01T23:59:59.000Z

388

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

389

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

390

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

391

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience… (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

392

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence… (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

393

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

394

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

395

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

396

Detection Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a...

397

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhäusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

398

Measurement of attacks and interferences with health care in conflict: validation of an incident reporting tool for attacks on and interferences with health care in eastern Burma  

Science Journals Connector (OSTI)

Attacks on health care in armed conflict and other civil disturbances, including those on health workers, health facilities, patients and health transports, represent a critical yet often overlooked violation ...

Rohini J Haar; Katherine HA Footer; Sonal Singh; Susan G Sherman…

2014-11-01T23:59:59.000Z

399

An ab initio investigation into the SN2 reaction: Frontside attack versus backside attack in the reaction of F? with CH3F  

Science Journals Connector (OSTI)

The energy hypersurface for the attack of fluoride ion on methyl fluoride has been explored with ab initio LCAO-SCF calculations at a split-valence basis set level. Transition states for frontside and backside at...

H. Bernhard Schlegel; Kurt Mislow; Fernando Bernardi…

1977-01-01T23:59:59.000Z

400

Digital Bond Fact Sheet.cdr  

Broader source: Energy.gov (indexed) [DOE]

cost-shared effort between industry and cost-shared effort between industry and Cyber Security Audit and Attack Detection Toolkit Cyber Security Audit and Attack Detection Toolkit Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Digital Bond Partners: OSIsoft Tenable Network Security PacifiCorp Tennessee Valley Authority Other Participating Vendors: ABB AREVA Emerson Matrikon SNC Telvent Bandolier and Portaledge The Concept Bandolier-The Approach By building configuration audit and attack detection capabilities into tools already

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

402

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

403

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

404

Digital image watermarking resistant to geometric and removal attacks in the wavelet transform domain  

E-Print Network [OSTI]

,2]. The watermark is embedded in the image additively, in the difficulty. g · Translation · Row and column removalDigital image watermarking resistant to geometric and removal attacks in the wavelet transform watermarking scheme resistant to various commonly used removal attacks. g p y watermark image will still

Qi, Xiaojun

405

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

DĂŒntsch, Ivo

406

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H, the TCP poriion of the bandwidth can be protected. In simulation study, thefilter successfily blocked 99 SYN flooding may be blocked on the server side [1][2][6], the link bandwidth exhaustion attack must

Chao, Jonathan

407

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

408

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

409

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad ... Keywords: attack prediction, computer security, game theory

Peng Liu; Wanyu Zang

2003-10-01T23:59:59.000Z

410

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

411

Scaling property and opinion model for interevent time of terrorism attack  

E-Print Network [OSTI]

The interevent time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows it follows a scale-free property. In order to understand the dynamic mechanism of such statistic feature, an opinion dynamic model with memory effect is proposed on a two-dimension lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter of the system reaches a critical value. Ultimately, the model reproduces the same statistical property as the empirical data and gives a good understanding of terrorism attack.

Zhu, Jun-Fang; Wang, Bing-Hong

2009-01-01T23:59:59.000Z

412

Anomaly Detection in Medical Wireless Sensor Networks using SVM and Linear Regression Models  

Science Journals Connector (OSTI)

This paper details the architecture and describes the preliminary experimentation with the proposed framework for anomaly detection in medical wireless body area networks for ubiquitous patient and healthcare monitoring. The architecture integrates novel ... Keywords: Healthcare Monitoring, Malicious Attacks, Medical Systems, Patient Anomaly Detection, Sensor Faults, Wireless Body Area Networks

Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, Borko Furht

2014-01-01T23:59:59.000Z

413

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

414

Optimal power grid protection through a defender–attacker–defender model  

Science Journals Connector (OSTI)

Abstract Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender–attacker–defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker–defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender–attacker–defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

Wei Yuan; Long Zhao; Bo Zeng

2014-01-01T23:59:59.000Z

415

An Attack on CFB Mode Encryption as Used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP...15 oracle queries for the initial setup work and 215 oracle queries for each block. S...

Serge Mister; Robert Zuccherato

2006-01-01T23:59:59.000Z

416

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

417

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks  

Science Journals Connector (OSTI)

Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet. Its distributed and cooperative nature makes i...

Angelo Furfaro; Pasquale Pace; Andrea Parise…

2014-01-01T23:59:59.000Z

418

Antibiosis and Preferences as Factors in the Resistance of Certain Cottons to Pink Bollworm Attack  

E-Print Network [OSTI]

of resistance in this host-parasite relationship. There are sevezal economicaUy important paste attacking cotton. Resistant qualities have been demonstrated 1n certain varieties aga1nst sevezal of these pasta. Isely (1935) reported that cotton bo...

Reed, David Kent

1960-01-01T23:59:59.000Z

419

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Ettringite Fly ash Microstructural studies Sulfate attack a b s t r a c t A conventional solution in reducing of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

420

Proactive Intrusion Prevention and Response via Attack Graphs Steven Noel and Sushil Jajodia  

E-Print Network [OSTI]

triage and after-the-fact remediation. This chapter examines proactive methods of attack risk reduction for optimal countermeasures. This chapter describes the latest advances in an innovative proactive approach

Noel, Steven

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

422

A National Survey of Stress Reactions after the September 11, 2001, Terrorist Attacks  

Science Journals Connector (OSTI)

...population represented in the March 2001 Current Population Survey, our sample slightly overrepresented women, non-Hispanic whites, and persons with higher levels of education and household income, which is typical of samples selected by means of random-digit dialing. As a sensitivity analysis, we repeated... After the September 11 terrorist attacks, Americans experienced symptoms of psychological stress. This survey of U.S. adults performed just five days after the attacks quantifies the extent of the stress reactions.

Schuster M.A.; Stein B.D.; Jaycox L.H.

2001-11-15T23:59:59.000Z

423

Safeguarding Quantum Key Distribution through Detection Randomization  

E-Print Network [OSTI]

We propose and experimentally demonstrate a scheme to render the detection apparatus of a Quantum Key Distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a detector-scrambling approach where the random selection of the detector used for each measurement - equivalent to an active spatial mode randomization - hashes out the side-channel open by the detection efficiency mismatch-based attacks. The proposed combined countermeasure represents a practical and readily implementable solution against the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the inner working of the devices.

Thiago Ferreira da Silva; Gustavo C. do Amaral; Guilherme B. Xavier; Guilherme P. Temporăo; Jean Pierre von der Weid

2014-10-02T23:59:59.000Z

424

Quantum hacking on quantum key distribution using homodyne detection  

Science Journals Connector (OSTI)

Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2014-03-05T23:59:59.000Z

425

Quantum Hacking on Quantum Key Distribution using Homodyne Detection  

E-Print Network [OSTI]

Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2014-02-27T23:59:59.000Z

426

Voluntary Initiative: Partnerships Toolkit  

Broader source: Energy.gov [DOE]

Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success.

427

Solar Site Survey Toolkit  

Broader source: Energy.gov [DOE]

After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

428

The Model Coupling Toolkit  

Science Journals Connector (OSTI)

The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form one high-performance coupled modeling system? We present our solution to this ...

Jay Walter Larson; Robert L. Jacob; Ian T. Foster; Jing Guo

2001-05-01T23:59:59.000Z

429

BioenergizeME Toolkit  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and scored by the team's sponsoring teacher or leader using the rubric provided in Section 7. Infographics receiving at least three points in the research content category...

430

Alternative Fuel Implementation Toolkit  

E-Print Network [OSTI]

, and propane - are a smart choice for fleets looking to save money, improve air quality, and comply with air agency thereof. This material is based upon work supported by the Department of Energy under Award Number DE-EE0006083. Prepared by the North Carolina Solar Center in collaboration with: Centralina Clean

431

Trojan-horse attacks threaten the security of practical quantum cryptography  

E-Print Network [OSTI]

A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

Nitin Jain; Elena Anisimova; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-06-23T23:59:59.000Z

432

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

433

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

434

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

435

Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation  

SciTech Connect (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. We show that - for protocols that use quantum channels of any dimension and completely characterize them by state tomography - the noise threshold for classical advantage distillation of a specific kind is substantially lower than the threshold for quantum entanglement distillation if the eavesdropper can perform powerful coherent attacks. In marked contrast, earlier investigations had shown that the thresholds are identical for incoherent attacks on the same classical distillation scheme. It remains an open question whether other schemes for classical advantage distillation have higher thresholds for coherent eavesdropping attacks.

Kaszlikowski, Dagomir; Lim, J.Y.; Englert, Berthold-Georg [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Kwek, L.C. [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); National Institute of Education, Nanyang Technological University, Singapore 639798 (Singapore)

2005-10-15T23:59:59.000Z

436

Predicting the effect of climate change on wildfire behavior and initial attack success  

SciTech Connect (OSTI)

This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

2007-12-01T23:59:59.000Z

437

Decoy-state quantum key distribution using homodyne detection  

SciTech Connect (OSTI)

In this paper, we propose to use the decoy-state technique to improve the security of the quantum key distribution (QKD) systems based on homodyne detection against the photon number splitting attack. The decoy-state technique is a powerful tool that can significantly boost the secure transmission range of the QKD systems. However, it has not yet been applied to the systems that use homodyne detection. After adapting this theory to the systems based on homodyne detection, we quantify the secure performance and transmission range of the resulting system.

Shams Mousavi, S. H. [Ecole Superieure d'Electricite (Supelec), Photonic and Communication Systems, 2 rue Edouard Belin, 57070 Metz (France); Gallion, P. [TELECOM ParisTech, Ecole Nationale Superieure des Telecommunications, CNRS LTCI UMR 5141, 46 rue Barrault, 75013 Paris (France)

2009-07-15T23:59:59.000Z

438

Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks Lan Wang, Qishi Wu, Yaoqing Liu  

E-Print Network [OSTI]

, yliu6}@memphis.edu Abstract--A recent trend in Internet denial-of-service attacks is to distribute of the Internet makes DoS defense a very challenging task. The goal of our work is to protect legitimate flows on hosts, as those hosts controlled by attackers are going to abuse the trust. In this paper, we flesh out

Wang, Lan

439

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States  

E-Print Network [OSTI]

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2

Wang, Hai

440

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry Abstract--This paper explores distributed smart grid attack strategies to destabilize power system

Kundur, Deepa

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Broader source: Energy.gov (indexed) [DOE]

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

442

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter  

E-Print Network [OSTI]

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

Cao, Xiaojun (Matt)

443

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid  

E-Print Network [OSTI]

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid Wenkai Wang, Qiao Cai Department, Stevens Institute of Technology, Hoboken, NJ 07030 Abstract--The power grid network is a complex of power grid in terms of cascading failures caused by node failures. Specifically, we define three metrics

Sun, Yan Lindsay

444

Dynamic pharming attacks and locked same-origin policies for web browsers  

Science Journals Connector (OSTI)

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based ... Keywords: pharming, same-origin policy, web authentication

Chris Karlof; Umesh Shankar; J. D. Tygar; David Wagner

2007-10-01T23:59:59.000Z

445

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks JesÂŽus Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

446

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

447

A Proposal of QLearning to Control the Attack of a 2D Robot Soccer Simulation Team  

Science Journals Connector (OSTI)

This document presents a novel approach to control the attack behavior of a team of simulated soccer playing robot of the Robocup 2D category. The presented approach modifies the behavior of each player only when in the state "controlling the ball". ... Keywords: Simulated robot soccer, machine learning, learning, Q-Learning algorithm

Jose Rodrigo Ferreira Neri; Maicon Rafael Zatelli; Carlos Henrique Farias dos Santos; Joao Alberto Fabro

2012-10-01T23:59:59.000Z

448

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve  

E-Print Network [OSTI]

Engineering, University College Cork Email: {andrewb,liam,francisc}@rennes.ucc.ie LIRMM, CNRS - Univ, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy. The protected double and add algorithm provides a simple solution to this problem but is costly in terms

Paris-Sud XI, Université de

449

The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC  

E-Print Network [OSTI]

Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

California at Davis, University of

450

"How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks  

E-Print Network [OSTI]

"How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

Gelman, Andrew

451

Trojan horse attack free fault-tolerant quantum key distribution protocols  

Science Journals Connector (OSTI)

This work proposes two quantum key distribution (QKD) protocols--each of which is robust under one kind of collective noises--collective-dephasing noise and collective-rotation noise. Due to the use of a new coding function which produces error-robust ... Keywords: Collective noise, GHZ state, Quantum cryptography, Quantum key distribution, Trojan horse attack

Chun-Wei Yang; Tzonelih Hwang

2014-03-01T23:59:59.000Z

452

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

453

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

disturbances. I. INTRODUCTION The smart grid promises increased capacity, security and re- liability through smart grid is challenging on several fronts. Asset own- ers must understand how to best prioritize reliability metrics are then employed to characterize the effects of the attack. Such approaches are valuable

Kundur, Deepa

454

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin  

E-Print Network [OSTI]

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan Ošurich, Switzerland srdjan.capkun@inf.ethz.ch Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses

455

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)  

E-Print Network [OSTI]

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack Abstract A widespread security claim of the Bitcoin system, presented in the original Bitcoin white, as the distributed Bitcoin network is ideally supposed to be. Propagation of the at- tacker's block can

456

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

457

A Denial of Service Attack against Fair Computations using Bitcoin Deposits  

E-Print Network [OSTI]

A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

458

Quantifying the Attack Surface of a Web Application Thomas Heumann, Jorg Keller Sven Turpe  

E-Print Network [OSTI]

qualitative and quantitative indicators. We propose a multi- dimensional metric for the attack surface of web Introduction Measuring security properties is challenging yet necessary. The need to make informed decisions implies necessity, while the complex and sometimes counter-intuitive nature of security makes measuring

Keller, Jörg

459

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...a powdery form. Once...of poorly crystalline calcium silicate...and well-crystalline phases...containment of nuclear waste. Applying...conducted in accelerated conditions...attack. Chemical Reaction in...matrix, the chemical reactions with...because of aging of the binding...confirming the form of the...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

460

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...was associated with the formation of ettringite crystals [Ca 6 Al 2 (OH) 12 (SO 4 ) 3...bacillus.” During sulfate attack, ettringite is often formed from the monosulfate...the aluminate ions in the formation of ettringite. The reaction to generate ettringite...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and lim- ited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

462

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

463

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore  

E-Print Network [OSTI]

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore Computer Laboratory consumption of a normal ¹¥£ Read-only Memory(ROM) is simulated in HSPICE. Randomness is later inserted to mask the data-dependent information leakage. A dual-rail version of the ROM is then presented

Moore, Simon

464

Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective  

E-Print Network [OSTI]

with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

PolitĂšcnica de Catalunya, Universitat

465

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Ning, Peng

466

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power transmis the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Reiter, Michael

467

Practical Attacks on Proximity Identification Systems (Short Paper) Gerhard P. Hancke  

E-Print Network [OSTI]

of relay and eavesdropping attacks on RFID de- vices they don't always describe implementations or show 1 a contactless smart card system and simulated the distances achievable for readertoken and tokenreader communication in the context of a relay at- tack. As discussed in section 2, RFID is a general term for any near

Hancke, Gerhard

468

Distributed Internet-based Load Altering Attacks against Smart Power Grids  

E-Print Network [OSTI]

to cause circuite overflow or other malfunctions and damage the power system equipments. To gain insights-intrusion attempt may target any sector in a power system: generation, distribution and control, and consumption as shown in Fig. 1. A Type I cyber-attack targets power plants and aims in disrupting or taking over

Mohsenian-Rad, Hamed

469

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network [OSTI]

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Zhou, Yuanyuan

470

Alcohol Quantity and Type on Risk of Recurrent Gout Attacks: An Internet-based Case-crossover Study  

Science Journals Connector (OSTI)

AbstractObjectives Although beer and liquor have been associated with risk of incident gout, wine has not. Yet anecdotally, wine is thought to trigger gout attacks. Further, how much alcohol intake is needed to increase the risk of gout attack is not known. We examined the quantity and type of alcohol consumed on risk of recurrent gout attacks. Methods We conducted a prospective Internet-based case-crossover study in the US among participants with gout and who had at least one attack during the 1 year of follow-up. We evaluated the association of alcohol intake over the prior 24 hours as well as the type of alcoholic beverage with risk of recurrent gout attack, adjusting for potential time-varying confounders. Results This study included 724 participants with gout (78% men, mean age 54 years). There was a significant dose-response relationship between amount of alcohol consumption and risk of recurrent gout attacks (P gout attack was 1.36 (95% confidence interval [CI], 1.00-1.88) and 1.51 (95% CI, 1.09-2.09) times higher for >1-2 and >2-4 alcoholic beverages, respectively, compared with no alcohol consumption in the prior 24 hours. Consuming wine, beer, or liquor was each associated with an increased risk of gout attack. Conclusions Episodic alcohol consumption, regardless of type of alcoholic beverage, was associated with an increased risk of recurrent gout attacks, including potentially with moderate amounts. Individuals with gout should limit alcohol intake of all types to reduce the risk of recurrent gout attacks.

Tuhina Neogi; Clara Chen; Jingbo Niu; Christine Chaisson; David J. Hunter; Yuqing Zhang

2014-01-01T23:59:59.000Z

471

Early statistical detection of anthrax outbreaks by tracking over-the-counter medication sales  

Science Journals Connector (OSTI)

...characterization of an outbreak of a bioagent...Current Biological Outbreaks Various bioagents...especially difficult to predict, detect, or prevent...attack (3). Known outbreaks of inhalational...and an economic model developed by the...an acute-onset flu-like illness and...

Anna Goldenberg; Galit Shmueli; Richard A. Caruana; Stephen E. Fienberg

2002-01-01T23:59:59.000Z

472

Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on Facebook  

E-Print Network [OSTI]

Detecting In-Situ Identity Fraud on Social Network Services: A Case Study on Facebook 1 Shan-situ identity fraud incidents, which occur when the attackers use the same devices and IP addresses significant efforts to prevent identity fraud and protect users' privacy. For example, Facebook records

Chen, Sheng-Wei

473

Detection threshold  

Science Journals Connector (OSTI)

Detection threshold or recognition differential is defined as the signal?to?noise ratio at the beamformer output required for detection. An introduction to this topic is provided in Uricks’ Principles of Underwater Sound. The subject is frequently a source of confusion due to the multiple possible definitions of signal?to?noise ratio the effects of nonlinearities in the signal processing and the overall complexity of the sonar operators job of signal recognition in real?world clutter. In this paper a review of the basic theory of mathematical relationships are provided followed by a discussion of practical limitations in applying simple formulas to performance predictions. The relationships of detection threshold to the signal?processing approach and background?noise statistics are discussed. Active sonars in both noise and reverberation as well as passive sonars involving energy detection spectral analysis and cross correlators are discussed.

Henry Cox

1999-01-01T23:59:59.000Z

474

NRT is currently for adults (18 or older) and not approved for use in pregnancy or for persons with active chest pain or a recent heart attack.  

E-Print Network [OSTI]

with active chest pain or a recent heart attack. Nicotine Replacement Therapy What strength do I use? What

MacAdam, Keith

475

Fingerprint detection  

DOE Patents [OSTI]

A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

1992-01-01T23:59:59.000Z

476

Effect of aerodynamic uncertainties on unconventional lateral control at high angle of attack  

E-Print Network [OSTI]

EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATERAL CONTROL AT HIGH ANGLE OF ATTACK A Thesis by BOB GENSEN ELLER Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December 1987 Major Subject: Aerospace Engineering EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATEHAI CONTROL AT HIGH ANGI. E (&F A'I'TACK A Thesis by BOB GENSEN ELLER Approved as to style and content by: Donald T...

Eller, Bob Gensen

1987-01-01T23:59:59.000Z

477

Detection device  

DOE Patents [OSTI]

The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

Smith, Jay E. (Pittsburgh, PA)

1984-01-01T23:59:59.000Z

478

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

801 - 15810 of 31,917 results. 801 - 15810 of 31,917 results. Download Fuzhou Sunlight: Noncompliance Determination (2010-SE-1402) DOE issued a Notice of Noncompliance Determination to Fuzhou Sunlight Lighting Electrical Appliance Co., Ltd. finding that a variety of models of incandescent reflector lamps do not comport with the energy conservation standards. http://energy.gov/gc/downloads/fuzhou-sunlight-noncompliance-determination-2010-se-1402 Download Conflict of Interest and Nondisclosure Acknowledgement http://energy.gov/management/downloads/conflict-interest-and-nondisclosure-acknowledgement-0 Download Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the

479

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31 - 24740 of 26,764 results. 31 - 24740 of 26,764 results. Download http://energy.gov/management/downloads-11 Download AttachmentFlash_2011-20.pdf http://energy.gov/management/downloads/attachmentflash2011-20pdf Download E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory http://energy.gov/management/downloads/e-idr-inventory-disclosure-record-pia-idaho-national-laboratory Download Objections to the Nov. 2006 Special Environmental Analysis (SEA) by the Department of Energy from Elizabeth C. Chimento http://energy.gov/oe/downloads/objections-nov-2006-special-environmental-analysis-sea-department-energy-elizabeth-c Download Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will

480

Protecting Buildings From a Biological or Chemical Attack: actions to take  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

Note: This page contains sample records for the topic "attack detection toolkit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Project liberty: a public health response to New Yorkers' mental health needs arising fromthe World Trade Center terrorist attacks  

Science Journals Connector (OSTI)

The September 11th terrorist attacks had a dramatic impact on the mental health of millions of Americans. The impact was particularly severe in New York City and surrounding areas within commuting distance of the...

Mr. Chip J. Felton MSW

2002-09-01T23:59:59.000Z

482

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network [OSTI]

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

483

An adaptive elliptical anomaly detection model for wireless sensor networks  

Science Journals Connector (OSTI)

Abstract Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such as farms, forests and water and electricity networks. However, the restricted energy resources of the network impede the collection of raw monitoring data from all the nodes to a single location for analysis. This has stimulated research into efficient anomaly detection techniques to extract information about unusual events such as malicious attacks or faulty sensors at each node. Many previous anomaly detection methods have relied on centralized processing of measurement data, which is highly communication intensive. In this paper, we present an efficient algorithm to detect anomalies in a decentralized manner. In particular, we propose a novel adaptive model for anomaly detection, as well as a robust method for modeling normal behavior. Our evaluation results on both real-life and simulated data sets demonstrate the accuracy of our approach compared to existing methods.

Masud Moshtaghi; Christopher Leckie; Shanika Karunasekera; Sutharshan Rajasegarar

2014-01-01T23:59:59.000Z

484

Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking  

E-Print Network [OSTI]

and Ramamohanarao [18] propose a marking scheme wherein routers mark the packets with a adjusted probability. The packet marking probability is inversely proportional to the number of hops of the router from the source of the packet. The marking probability..., Peng, Leckie and Ramamohanarao [18] propose a mark- ing probability, pd = 1/d, where d is the distance (number of hops) of the router from the source of the packet. Assume an attack path of length k. By this we mean that there are k routers...

Dube, Raghav

2005-02-17T23:59:59.000Z

485

Dynamic safeguard assessment of terror attacks using system dynamics method for nuclear power plants  

Science Journals Connector (OSTI)

For the minimisation of the damage in possible terror attacks on the nuclear power plants and other nuclear facilities, a dynamic assessment is performed in the aspects of nuclear safeguard. The incidents against nuclear facilities are modelled by the time-step scenario. Several cases are explained for the illicit trafficking of radioactive material. The dynamic simulation is examined by the system dynamics method. In the modelling, there are three major models that include the nuclear insider terror, the reaction control and the nuclear forensic steps. The risk increases slowly and decreases rapidly in the result. This is the similar pattern of the September 2001 terror where many lives were lost.

Tae-Ho Woo; Un-Chul Lee; Yun-Il Kim

2010-01-01T23:59:59.000Z

486

Prediction of forces and moments on finned bodies at high angle of attack in transonic flow  

SciTech Connect (OSTI)

This report describes a theoretical method for the prediction of fin forces and moments on bodies at high angle of attack in subsonic and transonic flow. The body is assumed to be a circular cylinder with cruciform fins (or wings) of arbitrary planform. The body can have an arbitrary roll (or bank) angle, and each fin can have individual control deflection. The method combines a body vortex flow model and lifting surface theory to predict the normal force distribution over each fin surface. Extensive comparisons are made between theory and experiment for various planform fins. A description of the use of the computer program that implements the method is given.

Oberkampf, W. L.

1981-04-01T23:59:59.000Z

487

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect (OSTI)

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

488

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

Science Journals Connector (OSTI)

Background This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Methods Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. Results After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14–1.30), angina or CHD (OR = 1.29, 95% CI = 1.19–1.39) and heart attack (OR = 1.19, 95% CI = 1.10–1.30). Effects were present for both men and women. Conclusions Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Michael Hendryx; Keith J. Zullig

2009-01-01T23:59:59.000Z

489

Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks  

Science Journals Connector (OSTI)

Abstract Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are these models to capture the real performance is an interesting topic. This paper selects two typical complex network based models, including a purely topological model (PTM) and a betweenness based model (BBM), as well as a direct current power flow model (DCPFM), to simulate the topology-based and flow-based vulnerability of power grid under degree, betweenness, maximum traffic and importance based intentional attacks. The relationships of vulnerability results from different models are analyzed and discussed for model comparisons. Taking IEEE 300 power grid with line capacity set proportional to tolerant parameter tp as example, the results show that there exists a critical node attack intensity A I = 0.147 , above which the three models produce almost identical topology-based vulnerability results under each attack strategy at any t p ? 1 , while producing identical flow-based vulnerability results from PTM and DCPFM occurs at A I > 0.147 , and A I > 0.73 for BBM and DCPFM, which indicates that the PTM can better approach the DCPFM for flow-based vulnerability analysis under intentional attacks. Similar results are also found for intentional edge attacks and other power grids.

Min Ouyang; Lijing Zhao; Zhezhe Pan; Liu Hong

2014-01-01T23:59:59.000Z

490

Radioactive Threat Detection with Scattering Physics: A Model-Based Application  

SciTech Connect (OSTI)

The detection of radioactive contraband is a critical problem in maintaining national security for any country. Emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. The development of a model-based sequential Bayesian processor that captures both the underlying transport physics including scattering offers a physics-based approach to attack this challenging problem. It is shown that this processor can be used to develop an effective detection technique.

Candy, J V; Chambers, D H; Breitfeller, E F; Guidry, B L; Verbeke, J M; Axelrod, M A; Sale, K E; Meyer, A M

2010-01-21T23:59:59.000Z

491

Fuel washout detection system  

DOE Patents [OSTI]

A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

492

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

493

The probability of Mark-I containment failure by melt-attack of the liner  

SciTech Connect (OSTI)

This report is a followup to the work presented in NUREG/CR-5423 addressing early failure of a BWR Mark I containment by melt attack of the liner, and it constitutes a part of the implementation of the Risk-Oriented Accident Analysis Methodology (ROAAM) employed therein. In particular, it expands the quantification to include four independent evaluations carried out at Rensselaer Polytechnic Institute, Argonne National Laboratories, Sandia National Laboratories and ANATECH, Inc. on the various portions of the phenomenology involved. These independent evaluations are included here as Parts II through V. The results, and their integration in Part I, demonstrate the substantial synergism and convergence necessary to recognize that the issue has been resolved.

Theofanous, T.G.; Yan, H. [California Univ., Santa Barbara, CA (United States). Dept. of Chemical and Nuclear Engineering; Podowski, M.Z. [Rensselaer Polytechnic Inst., Troy, NY (United States). Dept. of Nuclear Engineering and Engineering Physics] [and others

1993-11-01T23:59:59.000Z

494

Detecting Stepping Stones Yin Zhang and Vern Paxson  

E-Print Network [OSTI]

surreptitious access. 1 Introduction A major problem with apprehending Internet attackers is the ease with which

Paxson, Vern

495

Detecting Stepping Stones Yin Zhang and Vern Paxson \\Lambda  

E-Print Network [OSTI]

surreptitious access. 1 Introduction A major problem with apprehending Internet attackers is the ease with which

Zhang, Yin

496

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio  

E-Print Network [OSTI]

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB were high. · Widespread attack of white fringe trees have not been reported. · These findings indicate

Ginzel, Matthew

497

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee  

E-Print Network [OSTI]

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan Web services depends on advertisement: they charge for prime screen real estate, and focus a great a pollution attack, that allows third parties to alter the customized content the services return to users who

Snoeren, Alex

498

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS -MANUSCRIPT 1 Taxonomy of Attacks for Agent-based Smart  

E-Print Network [OSTI]

, distributed and dynamic environment. Taxonomy of attacks is an effective tool in systematically classifying fuels or the energy is retrieved from the nuclear reaction, wind, water dams, the solar radiation, etc of agent-based smart grids as an effective tool to provide a structured framework. The proposed idea

Pota, Himanshu Roy

499

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

SciTech Connect (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

500

1460 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 7, JULY 2014 Data Framing Attack on State Estimation  

E-Print Network [OSTI]

attack, cyber security, smart grid. I. INTRODUCTION AFEATURE of any future smart grid is the promise such that the control center will remove useful measurements that would otherwise be used by the state estimator degree controlling only half of a critical set of measurements that are needed to make a system

Tong, Lang