Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Generation Disclosure | Open Energy Information  

Open Energy Info (EERE)

Disclosure Disclosure Jump to: navigation, search Some states require electric utilities to provide their customers with specific information about the electricity that the utility supplies. This information, which generally must be shared with customers periodically, usually includes the utility's fuel mix percentages and emissions statistics. In states with restructured electricity markets, generation disclosure policies are designed to help consumers make informed decisions about the electricity and suppliers they choose. A few states that have not fully restructured their electricity markets require generation disclosure by utilities. [1] Generation Disclosure Incentives CSV (rows 1 - 40) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

2

T-578: Vulnerability in MHTML Could Allow Information Disclosure |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Vulnerability in MHTML Could Allow Information Disclosure 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory (2501696) CVE-2011-0096 SecurityTracker Alert ID: 1025003 Bugtraq ID: 46055 IMPACT ASSESSMENT: Moderate Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain

3

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce User Information Disclosure 2: IBM WebSphere Commerce User Information Disclosure Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability October 2, 2012 - 6:00am Addthis PROBLEM: IBM WebSphere Commerce User Information Disclosure Vulnerability PLATFORM: WebSphere Commerce Versions 6.0.0.0 to 6.0.0.11 WebSphere Commerce Versions 7.0.0.0 to 7.0.0.6 ABSTRACT: A vulnerability in WebSphere Commerce could allow disclosure of user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium Discussion: A remote unauthenticated attacker could exploit a security vulnerability in WebSphere Commerce to expose user personal data. The attack can be performed manually and the effort required is comparatively low.

4

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

of Energy, Energy Information Administration, "Power Plantof the “Right to Know”: Information Disclosure and theK. and M. Khanna. 2007. “Information and the provision of

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

5

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

6

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

7

Carbon Disclosure Project | Open Energy Information  

Open Energy Info (EERE)

Disclosure Project Disclosure Project Jump to: navigation, search Name Carbon Disclosure Project Place London, United Kingdom Zip EC1R 0NE Product A secretariat for 143 institutional investors with USD 20 trn under management, it aims to encourage the development of a common emissions measurement methodology and to facilitate its integration into general investment analysis. References Carbon Disclosure Project[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Carbon Disclosure Project is a company located in London, United Kingdom . References ↑ "Carbon Disclosure Project" Retrieved from "http://en.openei.org/w/index.php?title=Carbon_Disclosure_Project&oldid=343232

8

U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Bugzilla LDAP Injection and Information Disclosure 1: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities September 5, 2012 - 6:00am Addthis PROBLEM: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability reference LINKS: Bugzilla Homepage Bugzilla Security Advisory Bugtraq ID: 55349 Secunia Advisory SA50433 CVE-2012-3981 CVE-2012-4747 IMPACT ASSESSMENT: Medium Discussion: A vulnerability and a security issue have been reported, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data. 1) Input passed via the username is not properly escaped before being used

9

U-181: IBM WebSphere Application Server Information Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere Application Server Information Disclosure 1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information. Reference Links: Secunia Advisory 49352 CVE-2012-2170 Vendor Advisory IMPACT ASSESSMENT: High Discussion: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input

10

The interrelationships between corporations' dependence on external financing, information disclosure and cost of capital  

Science Conference Proceedings (OSTI)

The paper tests the relationship between corporations' dependence on external financing and their level of corporate information disclosure, and the relationship between the cost of capital and the level of corporate information disclosure in the ... Keywords: Taiwan, cost of capital, debt, e-finance, electronic finance, equity capital, external financing, information disclosure, integrated circuits, website information

Fu-Ju Yang; Chien-Ting Han; Her-Jiun Sheu

2008-12-01T23:59:59.000Z

11

Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users  

Science Conference Proceedings (OSTI)

The present study adopts the Communication Privacy Management theory and investigates the factors that influence the extent of private information disclosure of Facebook mobile phone users. Using a sample size of 488 adult mobile phone users, the study ... Keywords: Facebook, Information disclosure, Mobile phone users, Older adults, Online privacy, Online social networks

Victoria Kisekka, Sharmistha Bagchi-Sen, H. Raghav Rao

2013-11-01T23:59:59.000Z

12

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

modifications. State Incentives for Renewable Energy. FuelState has a Disclosure Rule Source: Database of State Incentives for Renewable Energy (

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

13

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

smaller increases in nuclear fuel usage when firms’impact of disclosure on nuclear fuel usage is +0.223 at the90 th percentile. Any nuclear fuel program response becomes

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

14

Heart Attack Survival Plan Information To Share With  

E-Print Network (OSTI)

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

15

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Eligibility Utility Program Information Maine Program Type Generation Disclosure Maine's 1997 restructuring...

16

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Eligibility Utility Program Information Nevada Program Type Generation Disclosure In 2001, Nevada enacted...

17

Inefficiencies in the Information Thicket: A Case Study of Derivative Disclosures During the Financial Crisis  

E-Print Network (OSTI)

investigation of the effectiveness of enhanced derivatives disclosure by conducting a series of single firm event

Bartlett, Robert P. III

2010-01-01T23:59:59.000Z

18

Green Power Network: Environmental Disclosure Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

govern_purch govern_purch Community Choice Aggregation Disclosure Policies Green Power Policies Net Metering Policies Environmental Disclosure Policies A number of states have adopted environmental disclosure policies, requiring electricity suppliers to provide information on fuel sources and, in some cases, emissions associated with electricity generation. The policies have been adopted in states with retail competition as well as in states with traditionally regulated electricity markets. Summaries of state environmental disclosure policies are provided below under the categories full, partial, or proposed. The term partial disclosure requirements refers to policies that are not mandatory, do not apply to all retail electricity suppliers, or do not result in direct disclosure to consumers.

19

PUBLIC DISCLOSURE CERTAIN INFORMATION CONTAINED IN USEC LETTER AET 05-0018 ENCLOSURE FOR THE AMERICAN CENTRIFUGE  

E-Print Network (OSTI)

Environmental Report for the American Centrifuge Plant. Enclosure 1 to this letter provides the remaining RAI responses for the Environmental Report that contains USEC Proprietary Information. Accordingly, USEC requests that the documents in Enclosure 1 be withheld from the public disclosure pursuant to 10 Code of Federal Regulations (CFR) 2.390(a)(4). An affidavit required by 10 CFR 2.390(b)(1)(ii) is provided in Enclosure 2. In addition, Enclosure 1 has been determined, in accordance with the guidance provided by the U.S.

Mr. Jack; R. Strosnider; Steven A. Toelle A

2005-01-01T23:59:59.000Z

20

Fuel Mix Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Disclosure Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State District of Columbia Program Type Generation Disclosure Provider Washington State Department of Commerce Washington's retail electric suppliers must disclose details regarding the fuel mix of their electric generation to customers. Electric suppliers must provide such information in a standard format annually to customers. In addition, most larger electric suppliers must provide at least two additional times annually a publication that contains the standard disclosure label, a customer service phone number to request the disclosure label or a reference to an electronic version of the disclosure label. (Small utilities and mutual light and power companies must provide the disclosure label at least annually to customers in the form of a

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Using GIS technology to manage information following a bio-terrorism attack.  

Science Conference Proceedings (OSTI)

The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

2005-05-01T23:59:59.000Z

22

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Minnesota Program Type Generation Disclosure Provider Minnesota Department of Commerice In September 2002, the Minnesota Public Utilities Commission (PUC) issued an order requiring the state's regulated electric utilities to disclose to customers details on the fuel mix and emissions of electric generation. Utilities must provide this information to customers in a standard format twice annually. Utilities may distribute this information to customers electronically. Disclosure information must also be filed with the PUC. In addition, in 2009, the Minnesota Pollution Control Agency began to transition to an inventory data management system that consolidates

23

Fuel Source and Environmental Impact Disclosure (Vermont) | Open...  

Open Energy Info (EERE)

suppliers to disclose information on fuel sources and the environmental impacts of electricity generation. Vermont's disclosure standards may address label forms and information...

24

Fuel Mix Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix Disclosure Fuel Mix Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State Colorado Program Type Generation Disclosure Provider Colorado Public Utilities Commission In January 1999, the Colorado Public Utility Commission (PUC) adopted regulations requiring the state's utilities to disclose information regarding their fuel mix to retail customers. Utilities are required to provide this information as a bill insert or as a separate mailing twice annually, in April and October of every year. The PUC provides a suggested format for the disclosure. Fuel mix percentages are to be based on the power supply mix for the previous calendar year. Supporting documentation concerning the calculations used to determine the power supply mix percentages must be submitted to the PUC for approval.

25

OMB Burden Disclosure Statement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71.1 OMB Control Number 71.1 OMB Control Number (09/2012) (Classification) OMB Burden Disclosure Statement 1910-1800 Public reporting burden for this collection of information is estimated to average 10 (minutes) per response, including the time for reviewing instructions, searching exist ing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comme nts regarding this estimate or any other aspect of this information, including suggestions for reducing this burden, to Information, Records, and Resource Management, MA-41-GTN, Paperwork Reduction Project (1910-1800), U.S. Department of Energy, Washington, DC 20874-1290; and to the Office of Management and Budget (OMB), Paperwork Reduction Project (1910-1800),Washington, DC 20503.

26

Environmental Disclosure Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Disclosure Program Environmental Disclosure Program Environmental Disclosure Program < Back Eligibility Utility Program Info State New York Program Type Generation Disclosure Provider New York State Department of Public Service The New York Public Service Commission (PSC) requires all electric utilities, energy service companies, jurisdictional municipal electric utilities and jurisdictional cooperative electric utilities to disclose details regarding the fuel mix and emissions of the supplier's electric generation to customers. This information must be provided to retail customers in a standard format every 6 months. The PSC created New York's Environmental Disclosure Program via an order issued in December 1998. This program has been modified several times since it was established. A November 2008 PSC order reduced the frequency of the

27

Environmental Information Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

New Jersey’s 1999 electric utility restructuring law requires electricity suppliers to disclose to customers details regarding the fuel mix and emissions of the supplier’s electric generation....

28

The carbon disclosure project, an evolution in international environmental corporate governance : motivations and determinants of market response to voluntary disclosures.  

E-Print Network (OSTI)

??This paper examines the factors associated with Canadian firms voluntarily disclosing climate change information through the Carbon Disclosure Project. Five hypotheses are presented to explain… (more)

Wegener, Matt

2010-01-01T23:59:59.000Z

29

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

30

Pre-processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure Control  

Science Conference Proceedings (OSTI)

A pre-processing optimisation is proposed that can be applied to the integer and mixed integer linear programming models that are used to solve the cell suppression problem in statistical disclosure control. In this paper we report our initial findings ... Keywords: Cell Suppression Problem, Classical Model, External Attacker, Pre-processing Optimisation, Statistical Disclosure Control

Martin Serpell; Alistair Clark; Jim Smith; Andrea Staggemeier

2008-09-01T23:59:59.000Z

31

IT-Enabled Corporate Governance: The Characteristics and Determinants of Web-based Corporate Governance Disclosures  

Science Conference Proceedings (OSTI)

Sophisticated information technologies allow companies to provide stakeholders with more transparency. Web-based disclosures have the advantages of low cost, mass reach, frequency and speed, and yet the extent of Internet disclosure varies across companies ... Keywords: Corporate Governance, Disclosure, Information Technology, Transparency, Web Page Content, Web Page Design

Yabing Jiang; Wullianallur Raghupathi

2010-10-01T23:59:59.000Z

32

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Massachusetts Program Type Generation Disclosure Provider Executive Office of Energy and Environmental Affairs Massachusetts's 1997 electric utility restructuring legislation authorized the Massachusetts Department of Telecommunications and Energy (DTE)* to require certain electricity providers to disclose details on their fuel mix and emissions to end-use customers. In February 1998, the DTE issued final rules requiring competitive suppliers and distribution companies providing standard offer generation service or default generation service to provide this information to customers quarterly and upon request. * In 2007, the Massachusetts Department of Telecommunications and Energy

33

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

34

Computer patent disclosures  

Science Conference Proceedings (OSTI)

Suppose a potentially very valuable experimental multi-computer system is being designed by you and your group. You feel you have made at least a system invention. In your Company scientists and engineers are responsible for initiating invention disclosures.

Joseph P. Kates

1964-10-01T23:59:59.000Z

35

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

36

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Emissions Disclosure and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State District of Columbia Program Type Generation Disclosure Provider DC Public Service Commission Under regulations adopted by the D.C. Public Service Commission, all electricity suppliers and electricity companies operating in the District of Columbia must report to the Commission every six months the fuel mix of electricity sold and the emissions produced. The fuel mix report must be in a format similar to the information provided by the PJM Environmental Information Services (PJM EIS). Electricity suppliers and electricity companies must also provide a fuel mix report to customers twice annually, within the June and December billing cycles. Emissions information must be disclosed every six months on

37

More Secrecy...More Knowledge Disclosure? On Disclosure Outside of Patents  

E-Print Network (OSTI)

It is an important concern that innovators by waiving their patent rights might obstruct the disclosure of knowledge and therefore retard progress. This paper explores this concern by using a simple model of two innovators who must decide sequentially whether to protect an innovation with limited patent rights. Two features are crucial to the disclosure decision. First: the second inventor may use his valid patent right to exclude the …rst inventor from using a secret invention. Second: when waiving her patent right, the …rst inventor may disclose her knowledge outside of a patent. Disclosure informs the Patent O ¢ ce and courts that related inventions from later inventors may lack novelty and hence should not be protected by valid patent rights. This paper shows that when the …rst inventor chooses not to patent the innovation, the amount of disclosure is related to the intellectual property choices in a paradoxical way: the amount of disclosure will be ‘large’ (‘small’) when the second inventor chooses secrecy (patenting) to protect the innovation too.

Carlos J. Ponce Y

2007-01-01T23:59:59.000Z

38

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Virginia Program Type Generation Disclosure Provider Virginia State Corporation Commission Virginia's 1999 electric industry restructuring law requires the state's electricity providers to disclose -- "to the extent feasible" -- fuel mix and emissions data regarding electric generation. Legislation in 2007 and 2008 related to Electric Utility Regulation amended the restructuring laws, but still require emissions and fuel mix disclosure. Information must be provided to customers and to the Virginia State Corporation Commission (SCC) at least once annually. If any portion of this information is unavailable, the electricity provider must file a report

39

Fuel Mix and Emissions Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

As part of the state's 1997 electric utility restructuring legislation, Illinois established provisions for the disclosure of fuel mix and emissions data. All electric utilities and alternative...

40

DISCLOSURE OF LOBBYING ACTIVITIES  

Gasoline and Diesel Fuel Update (EIA)

OF LOBBYING ACTIVITIES OF LOBBYING ACTIVITIES Approved by OMB Complete this form to disclose lobbying activities pursuant to 31 U.S.C. 1352 0348-0046 (See reverse for public burden disclosure.) 1. Type of Federal Action: 2. Status of Federal Action: 3. Report Type: a. contract a. bid/offer/application a. initial filing b. grant b. initial award b. material change c. cooperative agreement c. post-award For Material Change Only: d. loan year _________ quarter _________ e. loan guarantee date of last report ______________ f. loan insurance 4. Name and Address of Reporting Entity: 5. If Reporting Entity in No. 4 is a Subawardee, Enter Name

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Michigan Program Type Generation Disclosure Provider Michigan Public Service Commission Michigan's Customer Choice and Electric Reliability Act of 2000 (P.A. 141) requires electric suppliers to disclose to customers details related to the fuel mix and emissions, in pounds per megawatt-hour (MWh) of electric generation. Electric suppliers must provide this information to customers twice annually in a standardized, uniform format. The Michigan Public Service Commission (MPSC) staff must calculate the regional electricity generation and environmental characteristics and make it available to be used by the state's generation providers. The web site above describes the

42

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Ohio Program Type Generation Disclosure Provider Public Utilities Commission of Ohio Ohio's 1999 electric industry restructuring law requires the state's electricity suppliers to disclose details regarding their fuel mix and emissions to customers. Electric utilities and competitive retail electric service providers of retail electric generation service must provide this information to their customers in a standard format several times per year. The Ohio Public Utilities Commission (PUCO) adopted rules in 2000 to implement this policy; the rules have been amended subsequently. There are separate rules for electric utilities providing a standard offer for retail

43

E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho...

44

Fuel Mix and Emissions Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Maryland Program Type Generation Disclosure Provider Maryland Public Service Commission Maryland's 1999 electric utility restructuring legislation requires all electric companies and electricity suppliers to provide customers with details regarding the fuel mix and emissions of electric generation. Emissions data must be expressed in terms of pounds per megawatt-hour (MWh). This information must be provided to customers every six months and annually to the Maryland Public Service Commission (PSC). Past reports are available in Case No. 8738 through the [http://webapp.psc.state.md.us/Intranet/Casenum/caseform_new.cfm? PSC's

45

Disclosures | Princeton Plasma Physics Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosures Disclosures No. Title Inventors M-864 "Display of Tournament Bracket" Inventors Eliot Feibush, Michael Knyszek, Matthew Lotocki, Jared Miller, Andrew Zwicker. M-863 "Fueling method for small, steady-state, aneutronic FRC fusion reactors" Inventors Samuel A. Cohen, Daren Stotler, Michael Buttolph M-862 " A Heterodyne Laser-induced Fluorescence Technique to Determine Simultaneously the Bulk and Time Varying Molecule Velocity Distribution." Inventors Ahmed Diallo, Stephane Mazouffre.The method's primary goal is to determine simultaneously the bulk a M-861 "Increasing Solar Panel Efficiency And Reliability By Evaporative Cooling" Inventors..--.. Lewis Meixler, Charles Gentile, Patricia Hillyer, Dylan Carpe, Jason Wang, Caroline Brooks

46

Fuel Mix Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

In April 1998, the Pennsylvania Public Utility Commission (PUC) adopted rules requiring retail electricity suppliers to "respond to reasonable requests made by consumers for information concerning...

47

Fuel Mix Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

Hawaii requires the state’s retail electric suppliers to disclose details regarding the fuel mix of their electric generation to retail customers. Such information must be provided on customers’...

48

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

49

Water Disclosure in the Electric Power Industry  

Science Conference Proceedings (OSTI)

This topical brief provides an overview of two of the prominent water disclosure mechanisms affecting the electric power industry, the Global Reporting Initiative (GRI) and Carbon Disclosure Project Water Disclosure (CDP Water), and identifies connections to relevant EPRI research. The document was developed through EPRI's Program 55 Strategic Water Issues, and the Energy Sustainability Interest Group. This collaborative interest group was launched in 2008 and is made up of nearly 30 companies representi...

2011-06-17T23:59:59.000Z

50

Probabilistic algebraic attacks  

Science Conference Proceedings (OSTI)

This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the ... Keywords: algebraic attack, algebraic immunity, annihilator, combination and filter generator, walsh spectrum

An Braeken; Bart Preneel

2005-12-01T23:59:59.000Z

51

TITLE: Disclosures of Protected Health Information Required by Law Columbia University Medical Center will use, disclose, or release a patient's protected health  

E-Print Network (OSTI)

and Assignments Team of the Office of Counterintelligence at 505-665-1572. I certify that the above information of Energy plans, policies, reports, studies, financial plans, internal data protected by the Privacy Act

Champagne, Frances A.

52

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No....

53

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

54

Defending against side-channel attacks : DynamoREA  

E-Print Network (OSTI)

Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

55

Seven Deadliest Network Attacks  

Science Conference Proceedings (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

2010-05-01T23:59:59.000Z

56

Paducah DUF6 Conversion Final EIS - Appendix H: Contractor Disclosure Statement  

NLE Websites -- All DOE Office Websites (Extended Search)

Paducah DUF Paducah DUF 6 Conversion Final EIS APPENDIX H: CONTRACTOR DISCLOSURE STATEMENT Disclosure Statement H-2 Paducah DUF 6 Conversion Final EIS Disclosure Statement H-3 Paducah DUF 6 Conversion Final EIS APPENDIX H: CONTRACTOR DISCLOSURE STATEMENT Argonne National Laboratory (ANL) is the contractor assisting the U.S. Department of Energy (DOE) in preparing the environmental impact statement (EIS) for depleted UF 6 conversion. DOE is responsible for reviewing and evaluating the information and determining the appropriateness and adequacy of incorporating any data, analyses, or results in the EIS. DOE determines the scope and content of the EIS and supporting documents and will furnish direction to ANL, as appropriate, in preparing these documents. The Council on Environmental Quality's regulations (40 CFR 1506.5(c)), which have

57

On the disclosure risk of multivariate microaggregation  

Science Conference Proceedings (OSTI)

The aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencies. Record linkage is the standard ... Keywords: Data projection, Disclosure risk, Microaggregation, Privacy in statistical databases, Record linkage

Jordi Nin; Javier Herranz; Vicenç Torra

2008-12-01T23:59:59.000Z

58

Fuel Mix Disclosure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Mix Disclosure Fuel Mix Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State Delaware Program Type Generation Disclosure Provider Delaware Public Service Commission Delaware's 1999 restructuring law (HB 10) authorized the state Public Service Commission (PSC) to develop environmental disclosure requirements and consumer protection standards for green power marketing. The PSC's rules require all electric suppliers to disclose to the commission aggregate proportions of fuel resource mix for the electricity supplied to customers in Delaware for each quarter. In addition, electric suppliers must disclose their fuel resource mix to retail electric customers annually via bill inserts and "each other quarter' on the supplier's web site or by customer request. A standard label is not required; however, the reports

59

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

60

Disclosure of Permitted Communication Concerning Regional Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

62

Introduction to side channel attacks and non invasive attacks  

Science Conference Proceedings (OSTI)

... FIPS conference side channel attacks and perturbation attacks 7 Pow er analysis Pow er leakage usec m A Instruction fetch Instruction processing ...

2007-09-21T23:59:59.000Z

63

Extending the resynchronization attack  

Science Conference Proceedings (OSTI)

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their ...

Frederik Armknecht; Joseph Lano; Bart Preneel

2004-08-01T23:59:59.000Z

64

Beware of BGP attacks  

Science Conference Proceedings (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

Ola Nordström; Constantinos Dovrolis

2004-04-01T23:59:59.000Z

65

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

66

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

67

GPS software attacks  

Science Conference Proceedings (OSTI)

Since its creation, the Global Positioning System (GPS) has grown from a limited purpose positioning system to a ubiquitous trusted source for positioning, navigation, and timing data. To date, researchers have essentially taken a signal processing approach ... Keywords: gps, rf attacks, security

Tyler Nighswander; Brent Ledvina; Jonathan Diamond; Robert Brumley; David Brumley

2012-10-01T23:59:59.000Z

68

Environmental Disclosure Requirements by State Â… August 2002  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Disclosure Requirements by State - August 2002 Environmental Disclosure Requirements by State - August 2002 State Disclosure Requirement Scope Frequency Distribution Effective Date Authority Legislation/ Regulation Verification Requirement Notes Full Disclosure Requirements Arkansas Standards to be set for disclosure of environmental impacts Electric service providers TBD TBD TBD Legislature 1999 Act 1556; Rules not yet developed TBD Restructuring delayed until 2003. California Fuel mix required in standard format. Electric service providers Quarterly Bill insert, offers, and written promotional materials (except ads) 1999 Legislature Title 20, Article 5, California Code of Regulation Report to Commission annually with supporting documentation. Suppliers not making specific claims may disclose system mix. Colorado Fuel mix. Standard format is suggested.

69

Distributed Disaster Disclosure Bernard Mans1  

E-Print Network (OSTI)

Distributed Disaster Disclosure Bernard Mans1 , Stefan Schmid2 , and Roger Wattenhofer3 1 sensed the event, in order to raise--if necessary--a disaster alarm. This paper presents distributed algorithms for this problem. Concretely, our algorithms aim at minimizing both the response time as well

Schmid, Stefan

70

BILATERAL NON-DISCLOSURE AGREEMENT  

or contemporaneous communications, agreements or understandings between the Parties concerning Company’s receipt of NREL PROTECTED INFORMATION or NREL’s receipt of

71

Disclosure Guidelines Patients are informed of routine uses and disclosures of their information for  

E-Print Network (OSTI)

for lawful intelligence, counterintelligence and other national security purposes. · To public health

Príncipe, José Carlos

72

Disclosure and Investment as Strategies in the Patent Race.” Working paper  

E-Print Network (OSTI)

Research firms disclose a surprisingly large amount of information to the public. Conventional wisdom holds that these disclosures are made for defensive purposes; the disclosing firm does not itself plan to pursue patents related to the disclosed information, so the firm discloses as a way of creating prior art that might stop rivals from patenting. But firms have an incentive to disclose even if they themselves intend to pursue patent protection. The reason is that, by making it more difficult to patent, disclosure in essence extends the patent race. If an invention of a certain quality would have been sufficient to qualify for patent protection before the disclosure, after the disclosure any invention must be that much better before it will represent a sufficient advance over the now-expanded prior art. Extending the patent race can be an attractive strategy for a firm trailing in a given race since a longer race might offer that firm a better opportunity to catch up. Extending the race can similarly be attractive to a leading firm, since making the race longer raises the costs of racing, a strategy that will in certain instances discourage trailing firms from

Scott Baker; Doug Lichtman; Claudio Mezzetti

2001-01-01T23:59:59.000Z

73

Fuel Mix and Emissions Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

Rhode Island requires all entities that sell electricity in the state to disclose details regarding the fuel mix and emissions of their electric generation to end-use customers. This information...

74

Fuel Mix and Emissions Disclosure  

Energy.gov (U.S. Department of Energy (DOE))

As part of Texas’s 1999 electric utility restructuring legislation, the state’s retail electric providers are required to disclose certain information in the form of a standardized “Electricity...

75

Beware of BGP Attacks  

E-Print Network (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.

Ola Nordström; Constantinos Dovrolis

2004-01-01T23:59:59.000Z

76

Attachment to Registered Lobbyist Disclosure Form: R  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Registered Lobbyist Disclosure Form: R. Paul Detwiler Registered Lobbyist Disclosure Form: R. Paul Detwiler April 17, 2009 10:10 - 11:15 am At the request of the staff of Pennsylvania State Sen. Jim Ferlo, I attended a meeting of the Pittsburgh Green Innovators to answer logistical questions regarding the availability of Recovery Act funding for energy efficiency and renewable energy projects in Pittsburgh. The meeting was attended by elected officials, their staffs, a representative of a private foundation and others; it focused on a particular project -- renovation of a former vocational school campus in Pittsburgh. The meeting was also attended by Charles J. Kolling, Jr., who identified himself as a registered lobbyist in response to a question I posed to those in attendance. My remarks were limited to logistical matters

77

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

78

Best Mode Disclosure—Comply or Invalidate Your Patent  

Science Conference Proceedings (OSTI)

Best Mode Disclosure—Comply or Invalidate Your Patent. Arnold B. Silverman. The United States patent system provides the inventor with a period of exclusivity  ...

79

Risk-Based models of attacker behavior in cybersecurity  

Science Conference Proceedings (OSTI)

Even as reliance on information and communication technology networks continues to grow, and their potential security vulnerabilities become a greater threat, very little is known about the humans who perpetrate cyber attacks--what are their strategies, ...

Si Li; Ryan Rickert; Amy Sliva

2013-04-01T23:59:59.000Z

80

Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Plug-in Electric Plug-in Electric Vehicle (PEV) Information Disclosure to someone by E-mail Share Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Facebook Tweet about Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Twitter Bookmark Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Google Bookmark Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Delicious Rank Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Digg Find More places to share Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on AddThis.com... More in this section... Federal State Advanced Search

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie 6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30, 2013 - 4:33am Addthis PROBLEM: Two vulnerabilities have been reported in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system. PLATFORM: Apache 2.0.x Apache HTTP Server 2.x ABSTRACT: Two vulnerabilities have been reported in Apache HTTP Server REFERENCE LINKS: CVE-2012-0053 CVE-2013-1862 http://secunia.com/advisories/54320/ IMPACT ASSESSMENT: Medium DISCUSSION: protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400)

82

Information Strategies and Energy Conservation Behavior: A Meta-analysis of Experimental Studies from 1975-2011  

E-Print Network (OSTI)

Eds. ), Environment, information and consumer behavior (pp.J. , 2010. Mandatory Information Disclosure Policy: Evidenceand State 2010. Energy Information Administration. Available

Delmas, Magali; Fischlein, Miriam; Asensio, Omar

2013-01-01T23:59:59.000Z

83

Information Strategies and Energy Conservation Behavior: A Meta-analysis of Experimental Studies from 1975-2012  

E-Print Network (OSTI)

Eds. ), Environment, information and consumer behavior (pp.J. , 2010. Mandatory Information Disclosure Policy: EvidenceEnergy Use: Payments, Information, and Feedback. Journal of

Delmas, Magali A.; Fischlein, Miriam; Asensio, Omar I.

2013-01-01T23:59:59.000Z

84

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

85

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

86

Manufacturers' View on Benchmarking and Disclosure  

U.S. Energy Information Administration (EIA) Indexed Site

Association of Electrical and Association of Electrical and Medical Imaging Equipment Manufacturers Manufacturing Solutions for Energy Efficiency in Buildings Patrick Hughes Policy Director, High Performance Buildings National Electrical Manufacturers Association The Association of Electrical and Medical Imaging Equipment Manufacturers What is NEMA? The Association of Electrical Equipment and Medical Imaging Manufacturers Which policies encourage energy efficiency in buildings? Energy Savings Performance Contracts Tax Incentives Shaheen- Portman Benchmarking and Disclosure Bullitt Center Seattle, Washington The Association of Electrical Equipment and Medical Imaging Manufacturers Energy Savings Performance Contracts ESPCs pay for efficiency upgrades with

87

Metrics for Assessment of Smart Grid Data Integrity Attacks  

Science Conference Proceedings (OSTI)

There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

88

Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous and Nonhazardous Solid Waste Applicant Disclosure Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations (Mississippi) Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations (Mississippi) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Mississippi Program Type

89

Bayesian Assessment of Rounding-Based Disclosure Control  

Science Conference Proceedings (OSTI)

In this paper, we consider how the security of a disclosure control mechanism based on randomised, but uncontrolled, rounding can be assessed by Bayesian methods. We develop a methodology, based on Markov chain Monte Carlo, for estimating the conditional ...

Jon J. Forster; Roger C. Gill

2008-09-01T23:59:59.000Z

90

Disclosure of Permitted Communication Concerning Fossil Fuel Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077

91

Visualizing Risks: Icons for Information Attack Scenarios  

Science Conference Proceedings (OSTI)

... impact of specific threats by avoiding or transferring risk, reducing vulnerability, recovering quickly ... Underground facility Optical cable ... Tornado Water ...

2000-11-03T23:59:59.000Z

92

A defence scheme against Identity Theft Attack based on multiple social networks  

Science Conference Proceedings (OSTI)

Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind ... Keywords: Identity Theft Attack, Multi-dimensional social network, Social networks

Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun

2014-04-01T23:59:59.000Z

93

Control systems under attack?  

E-Print Network (OSTI)

The enormous growth of the Internet during the last decade offers new means to share and distribute both information and data. In Industry, this results in a rapprochement of the production facilities, i.e. their Process Control and Automation Systems, and the data warehouses. At CERN, the Internet opens the possibility to monitor and even control (parts of) the LHC and its four experiments remotely from anywhere in the world. However, the adoption of standard IT technologies to Distributed Process Control and Automation Systems exposes inherent vulnerabilities to the world. The Teststand On Control System Security at CERN (TOCSSiC) is dedicated to explore the vulnerabilities of arbitrary Commercial-Of-The-Shelf hardware devices connected to standard Ethernet. As such, TOCSSiC should discover their vulnerabilities, point out areas of lack of security, and address areas of improvement which can then be confidentially communicated to manufacturers. This paper points out risks of accessing the Control and Automa...

Lüders, Stefan

2005-01-01T23:59:59.000Z

94

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

95

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

96

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

97

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

98

UK Fuel Mix Disclosure Data: 2009 - 2010 The UK Department of...  

Open Energy Info (EERE)

Fuel Mix Disclosure Data: 2009 - 2010 The UK Department of Energy and Climate Change (DECC) publishes an annual "fuel mix disclosure data table" as defined in the Electricity (Fuel...

99

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

100

DOE O 326.1, Confidential Financial Disclosure Reports (OGE 450)  

Directives, Delegations, and Requirements

The directive establishes requirements and responsibilities for Departmental elements and employees regarding filing Confidential Financial Disclosure Reports ...

2008-12-09T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

BESC Submits 32 Gene Disclosures for Patents | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

News Careers Work with ORNL About ORNL Visiting ORNL Events and Conferences Highlights Success Stories Contact Us Index Home | ORNL | Highlights SHARE BESC submits 32 gene disclosures for future patents July 01, 2012 Plant geneticist Wellington Muchero examines phenotypic traits of Populus transgenic lines grown in a greenhouse. The Bioenergy Science Center (BESC) at Oak Ridge National Laboratory (ORNL) is preparing invention disclosures for 32 different genes that can help improve the yield of ethanol from cellulosic biomass. These genes or their variants function to overcome recalcitrance-difficulty in breaking down cellulosic biomass to release sugars. Several members of ORNL's Biosciences Division are submitting disclosures: 16 genes by Wellington Muchero, 10 genes by Udaya Kalluri, and

102

Attacking Automatic Wireless Network Selection  

E-Print Network (OSTI)

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as Preferred or Trusted Networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker’s wireless network without user interaction or notification. This will occur even if the user has never connected to a wireless network before or they have an empty Preferred/Trusted Networks List. We describe these vulnerabilities as well as their implementation and impact. 1

Dino A. Dai Zovi; Shane A. Macaulay

2005-01-01T23:59:59.000Z

103

Serial model for attack tree computations  

Science Conference Proceedings (OSTI)

In this paper we extend the standard attack tree model by introducing temporal order to the attacker's decision making process. This will allow us to model the attacker's behaviour more accurately, since this way it is possible to study his actions related ...

Aivo Jürgenson; Jan Willemson

2009-12-01T23:59:59.000Z

104

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

105

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

106

Benchmarking and Disclosure: Lessons from Leading Cities | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Benchmarking and Disclosure: Lessons from Leading Cities Benchmarking and Disclosure: Lessons from Leading Cities Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources

107

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network (OSTI)

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

108

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful exploitation of the security issue requires that the audit log is enabled (disabled by default). 2) The vulnerability is caused due to an error when changing password...

109

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

CA, NY, ME, and VT, had green energy generation proportionsand exemptions for green energy generation are becominggreen power pricing programs where consumers can support cleaner energy

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

110

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

fuels (renewables, hydroelectric) represent approximately 9for clean sources like hydroelectric and renewables. As theuse of renewable and hydroelectric generation. Results also

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

111

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

Evidence from the Electricity Industry Magali Delmas UCEvidence from the Electricity Industry May 2007 ABSTRACT A “programs in the electricity industry achieve stated policy

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

112

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network (OSTI)

average proportion of fossil fuels decreases and the averageusage attributable to fossil fuels substantially decreasesresidential customers. Firms’ fossil fuel program responses

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

113

Fuel Mix and Emissions Disclosure (Ohio) | Open Energy Information  

Open Energy Info (EERE)

energy use disclosed in fuel mix data Active Incentive Yes Implementing Sector StateTerritory Energy Category Renewable Energy Incentive Programs Distribution and...

114

Fuel Mix and Emissions Disclosure (Virginia) | Open Energy Information  

Open Energy Info (EERE)

-- "to the extent feasible" -- fuel mix and emissions data regarding electric generation. Legislation in 2007 and 2008 related to Electric Utility Regulation amended the...

115

Fuel Mix and Emissions Disclosure (Michigan) | Open Energy Information  

Open Energy Info (EERE)

The Michigan Public Service Commission (MPSC) staff must calculate the regional electricity generation and environmental characteristics and make it available to be used by...

116

A collusion attack optimization strategy for digital fingerprinting  

Science Conference Proceedings (OSTI)

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of ... Keywords: Multimedia security, collusion attack, digital fingerprinting, optimization

Hui Feng; Hefei Ling; Fuhao Zou; Weiqi Yan; Zhengding Lu

2012-09-01T23:59:59.000Z

117

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

118

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

119

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

120

Cybersecurity - Foiling attackers | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Non-Invasive Attack Testing Workshop  

Science Conference Proceedings (OSTI)

Non-Invasive Attack Testing Workshop. Purpose: To encourage development of test methods, metrics and tools for evaluating the effectiveness of ...

2013-05-14T23:59:59.000Z

122

Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs  

Science Conference Proceedings (OSTI)

As computers have become ever more interconnected, the complexity of security configuration has exploded. Management tools have not kept pace, and we show that this has made identity snowball attacks into a critical danger. Identity snowball attacks ... Keywords: access control, attack graph, authentication, combinatorial optimization, identity snowball, machine learning, sparsest cut, support vector machine

John Dunagan; Alice X. Zheng; Daniel R. Simon

2009-10-01T23:59:59.000Z

123

Higher Order Differential Attack of Camellia (II)  

Science Conference Proceedings (OSTI)

Camellia is a 128-bit block cipher, proposed by NTT and Mitsubishi in 2000. It has been shown that 10 round variant without FL function under a 256-bit secret key is attackable by Higher Order Differential Attack and even if FL function is included, ...

Yasuo Hatano; Hiroki Sekine; Toshinobu Kaneko

2002-08-01T23:59:59.000Z

124

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

125

Research deciphers HIV attack plan  

NLE Websites -- All DOE Office Websites (Extended Search)

they are blanketed in a greater amount of envelope protein that helps them access and enter host cells. These findings will help inform vaccine design and interpretation of...

126

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

Science Conference Proceedings (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

127

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

128

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

129

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

130

PHOENIX NATURAL GAS LIMITED PRICE DETERMINATION REFERENCE Disclosures of interest  

E-Print Network (OSTI)

Member disclosures Martin Cave (Group Chairman) is a joint academic director of a Brussels-based think tank on regulation called CERRE (www.cerre.eu). This has occupied about ten days per year, mostly attending seminars in Brussels with regulators and regulatees. Another joint academic director is Prof C Waddams. They have not collaborated on any research projects, but he has chaired a panel which she was on. He has co-written a general book, or textbook, on regulation, which includes chapters on price control. The index lists three brief references to energy regulation: Baldwin, Cave &

Richard Taylor

2012-01-01T23:59:59.000Z

131

All about me: Disclosure in online social networking profiles: The case of FACEBOOK  

Science Conference Proceedings (OSTI)

The present research examined disclosure in online social networking profiles (i.e., FACEBOOK(TM)). Three studies were conducted. First, a scoring tool was developed in order to comprehensively assess the content of the personal profiles. Second, grouping ... Keywords: Disclosure, FACEBOOKTM, Internet, Online, Privacy, Social communication, Social networking, Threat

Amanda Nosko; Eileen Wood; Seija Molema

2010-05-01T23:59:59.000Z

132

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network (OSTI)

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses LRU cache filtering to capture the high bandwidth flows followed by computation of wavelet variance on the aggregate miss traffic. The introduction of attack traffic in the network would elicit changes in the wavelet variance. This is combined with thresholding methods to enable attack detection. Sampling techniques can be used to tailor the cost of our detection mechanism. The mechanism we suggest is independent of routing information, thereby making attack detection immune to IP address spoofing. Using simulations and quantitative measures, we find that our mechanism works successfully on several kinds of attacks. We also use statistical methods to validate the results obtained.

Ramanathan, Anu

2002-01-01T23:59:59.000Z

133

Request from City of Alexandria for Public Disclosure of Documents Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from City of Alexandria for Public Disclosure of Documents from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Docket No. EO-05-01: On behalf of the City of Alexandria, Virginia ("Alexandria"), we submit this request for public disclosure of documents and materials related to Order No. 202-05-3, dated December 20, 2005, in the above-referenced Department of Energy docket and public participation in the implementation of this Order. Alexandria is deeply concerned with this Order and its consequences, both intended and unintended. Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 More Documents & Publications Comments on Department of Energy's Emergency Order To Resume Limited

134

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

135

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein  

Science Conference Proceedings (OSTI)

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein. For Immediate Release: November 3, 2009. ...

2012-10-02T23:59:59.000Z

136

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

137

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

138

When Utility Bills Attack! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

139

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

140

Extending gibson's attacks on the GPT cryptosystem  

Science Conference Proceedings (OSTI)

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibson's attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank ...

Raphael Overbeck

2005-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

142

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

143

Countering DoS attacks with stateless multipath overlays  

Science Conference Proceedings (OSTI)

Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that attackers will attack a fixed and bounded set of overlay nodes causing service ... Keywords: key agreement, spread-spectrum communications

Angelos Stavrou; Angelos D. Keromytis

2005-11-01T23:59:59.000Z

144

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

145

On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers  

E-Print Network (OSTI)

the vulnerabilities of DNS and SIP message handling in the Vonage phone, stealthily become the remote MITM and launch flaw in handling a malformed INVITE message, which allows the remote attacker to remotely crashOn the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers Ruishan

Wang, Xinyuan "Frank"

146

Simulation models for side-channel information leaks  

Science Conference Proceedings (OSTI)

Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power consumption, execution time, electromagnetic radiation and other information ... Keywords: countermeasure, differential power analysis, encryption, security IC, side-channel attack, simulation model, smart card

Kris Tiri; Ingrid Verbauwhede

2005-06-01T23:59:59.000Z

147

inform  

Science Conference Proceedings (OSTI)

The monthly member publication of AOCS. inform Inform Magazine Membership Merchandise Subscriptions Journals Membership Merchandise 8C5A902BB64F1A5D499524EFF5918AE0 INFORM-NM 2008

148

Security classification of information  

Science Conference Proceedings (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

149

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

150

Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds The Department of Energy has a policy that individuals with a conflict of interest cannot participate in the technical review of procurement proposals. This certification must be completed by individuals prior to their participation in the pre-application and/or proposal review processes. 1. I will not participate in the review of any pre-application or proposal involving a particular matter that would have a direct and predictable effect on any person, company or organization with which I have a

151

Analysis of Automated Model against DDoS Attacks  

E-Print Network (OSTI)

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with the overall DDoS problem. With a new packet marking technique and agent design, our approach has many advanced features to minimize the DDoS attacks within a single ISP domain. In this paper we discuss different types of attacks that are possible on our model and propose techniques to counteract the identified attacks. We will also discuss security protocols for communication between different entities in our model.

Udaya Kiran Tupakula

2003-01-01T23:59:59.000Z

152

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

153

Precision air data support for chem/bio attack response .  

E-Print Network (OSTI)

??The defense response against chemical and biological (Chem/bio) weapons has gained a renewed focus in light of the 11 Sept 2001 terrorist attack. A successful… (more)

Tan, Kwang Liang

2003-01-01T23:59:59.000Z

154

Hydrogen Attack in Creeping Polycrystals Due to Cavitation on ...  

Science Conference Proceedings (OSTI)

Sep 1, 1994 ... Hydrogen Attack (HA) is the development at elevated temperatures of grain boundary cavitation by internal methane gas, which is generated by ...

155

Rapid cooling technology could aid surgery patients, heart attack...  

NLE Websites -- All DOE Office Websites (Extended Search)

cooling technology could aid surgery patients, heart attack victims Diagram shows how ice slurry cools blood INTERNAL COOLING - An ice slurry, delivered through an endotracheal...

156

Thermal Barrier Coatings for Resistance Against Attack by Molten ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested ...

157

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

158

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

secure software providing independent testing, monitoring, and control of energy control system component operation Trust Anchor Lifecycle Attack Protection More Documents...

159

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... to disrupt the energy distribution of smart ... attacks against distributed energy routing in smart grid. ... on Cyber Technology in Automation, Control, and ...

2012-04-12T23:59:59.000Z

160

Registered Lobbyist Contact Disclosure, 03/26/09  

Science Conference Proceedings (OSTI)

... or announcements about opportunities through the ARRA stimulus package; 2) Web links to your information about stimulus money; 3) Other ...

2010-10-05T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)  

E-Print Network (OSTI)

Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

CERN. Geneva

2012-01-01T23:59:59.000Z

162

Title 20, California Code of Regulations Article 5. Electricity Generation Source Disclosure  

E-Print Network (OSTI)

Commission. (e) "Facility" means one or all generating units at an electric generating station. (f) "Fuel (b)(3)(C) of section 1392. (g) "Generating facility output" means the electrical energy and/or fuel1 Title 20, California Code of Regulations Article 5. Electricity Generation Source Disclosure

163

Attacking the IPsec Standards in Encryption-only Configurations  

Science Conference Proceedings (OSTI)

We describe new attacks which break any RFCcompliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted ...

Jean Paul Degabriele; Kenneth G. Paterson

2007-05-01T23:59:59.000Z

164

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

165

Selective Attack of Welds by Flow-Accelerated Corrosion  

Science Conference Proceedings (OSTI)

Flow-accelerated corrosion (FAC), a degradation mechanism that attacks carbon steel material, has been a significant issue for nuclear plants for some time. Until recently, though, welds were thought to be largely immune to this mechanism. This work demonstrates that significant weld attacks have been occurring at a number of nuclear plants throughout the world.

2002-07-26T23:59:59.000Z

166

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

167

Survey and Simulation on Malicious Data Attack on Power Market  

E-Print Network (OSTI)

It is expected that the next generation of power grid will be more intelligent in power distribution, grid data attack. A cyber-spy may inject malicious data to make power grid in danger. In this report the financial risk of data attack, a bunch of notions with respect to power grid are studies. Observability

Lavaei, Javad

168

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

169

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

170

c ? 2002 The Review of Economic Studies Limited The Sale of Ideas: Strategic Disclosure, Property Rights, and Contracting  

E-Print Network (OSTI)

Ideas are difficult to sell when buyers cannot assess an idea’s value before it is revealed and sellers cannot protect a revealed idea. These problems exist in a variety of intellectual property sales ranging from pure ideas to poorly protected inventions and reflect the nonverifiability of key elements of an intellectual property sale. An expropriable partial disclosure can be used as a signal, allowing the seller to obtain payment based on the value of the remaining (undisclosed) know-how. We examine contracting after the disclosure and find that seller wealth is pivotal in supporting a partial disclosure equilibrium and in determining the payoff size. 1.

James J. Anton; Dennis A. Yao

1998-01-01T23:59:59.000Z

171

NON-DISCLOSURE AGREEMENT FOR EVALUATION OF POTENTIALLY ...  

Joint NDA: AGMT-XXXX Page 2 of 4 Version 12.30.11 contained thereon, to use such Potentially Patentable Information only for the Purpose for Receiving ...

172

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

173

TCPL: A Defense against wormhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

174

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

175

Healing heart attack victims, one cell at a time  

NLE Websites -- All DOE Office Websites (Extended Search)

E-mail: stark8@llnl.gov FOR IMMEDIATE RELEASE April 2, 2009 NR-09-04-02 Healing heart attack victims, one cell at a time LIVERMORE, Calif. -- By using the amount of carbon...

176

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

177

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

178

Argonne applied mathematicians use INCITE awards to attack energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for...

179

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network (OSTI)

The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through con- trolled switching sequence. Such switching is facilitated by cyber-attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to effectively model the cyber-physical aspects of a smart grid and determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the different power system test cases including the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system frame- work. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of co-ordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.

Liu, Shan

2013-05-01T23:59:59.000Z

180

An online attack against Wiesner's quantum money  

E-Print Network (OSTI)

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Lutomirski, Andrew

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

An online attack against Wiesner's quantum money  

E-Print Network (OSTI)

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Andrew Lutomirski

2010-10-01T23:59:59.000Z

182

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium...

183

Inefficiencies in the Information Thicket: A Case Study of Derivative Disclosures During the Financial Crisis  

E-Print Network (OSTI)

quarterly and annual financial statements that were GAAP-companies to provide financial statements to the SEC in an2008). By requiring financial statement data to be filed

Bartlett, Robert P. III

2010-01-01T23:59:59.000Z

184

A random M-ary method based countermeasure against side channel attacks  

Science Conference Proceedings (OSTI)

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ... Keywords: DPA, SPA, elliptic curve cryptosystems, power analysis attacks, random m-ary recoding algorithm, side channel attacks

MahnKi Ahn; JaeCheol Ha; HoonJae Lee; SangJae Moon

2003-05-01T23:59:59.000Z

185

Coking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

186

Aromatics - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Hydrogen production ...

187

INFORMATION ABOUT PRINCIPAL INVESTIGATORS/PROJECT DIRECTORS(PI/PD) and co-PRINCIPAL INVESTIGATORS/co-PROJECT DIRECTORS  

E-Print Network (OSTI)

as confidential information at the time of disclosure ("Confidential Information"). Confidential Information does, AS TO ANY MATTER WHATSOEVER, INCLUDING, WITHOUT LIMITATION, THE CONDITION OF THE RESEARCH OR ANY INVENTION(S; OR THE OWNERSHIP, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE OF THE RESEARCH OR ANY SUCH INVENTION

Murayama, Hitoshi

188

The Influence of Information Control upon On-line Shopping Behavior  

Science Conference Proceedings (OSTI)

Previous studies have explored privacy instruments and disclosures as factors that affect on-line shopping intentions or attitudes. However, few have evaluated how information control affects this behavior. This paper draws on psychological and social ... Keywords: Cognitive Absorption, Information Control, Intrinsic Motivation, On-Line Behavior, Procedural Practice Justice

Milam Aiken; Jianfeng Wang; Linwu Gu; Kustim Wibowo

2011-01-01T23:59:59.000Z

189

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

190

Kipnis-shamir attack on unbalanced oil-vinegar scheme  

Science Conference Proceedings (OSTI)

The public key of the Oil-Vinegar scheme consists of a set of m quadratic equations in m+n variables over a finite field Fq. Kipnis and Shamir broke the balanced Oil-Vinegar scheme where d = n-m = 0 by finding equivalent ... Keywords: Kipnis-Shamir attack, Oil-Vinegar scheme, multivariate public key cryptosystem, signature scheme

Weiwei Cao; Lei Hu; Jintai Ding; Zhijun Yin

2011-05-01T23:59:59.000Z

191

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

192

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields  

E-Print Network (OSTI)

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields Electrical Engineering that the challenges software optimizers and microarchitects face every day boil down to a single problem: bottleneck cache miss or window stall. Tasks such as tuning processors for energy efficiency and finding the right

Hill, Mark D.

193

MULTOPS: a data-structure for bandwidth attack detection  

Science Conference Proceedings (OSTI)

A denial-of-service bandwidth attack is an attempt to disrupt an online service by generating a traffic overload that clogs links or causes routers near the victim to crash. We propose a heuristic and a data-structure that network devices (such as routers) ...

Thomer M. Gil; Massimiliano Poletto

2001-08-01T23:59:59.000Z

194

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

195

About EIA - Policies - U.S. Energy Information Administration (EIA)  

Gasoline and Diesel Fuel Update (EIA)

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The Freedom of Information Act, commonly known as the FOIA, was enacted by Congress in 1966 to give the American public improved access to the Federal Government's records. The Electronic Freedom of Information Act Amendments of 1996 expanded the scope of the FOIA to encompass electronic records and require the creation of "electronic reading rooms" to make records more easily and widely available to the public. However, FOIA does set forth nine exemptions under which records (or parts of records) may be exempt from public disclosure. This includes materials exempted from disclosure by other statutes as well as confidential, commercial, and financial information. What types of materials are available without filing a FOIA request?

196

Can information warfare ever be just?  

Science Conference Proceedings (OSTI)

The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather ...

John Arquilla

1998-01-01T23:59:59.000Z

197

A proposal of extension of FMS-Based mechanism to find attack paths  

Science Conference Proceedings (OSTI)

With the increase of internet service providers(companies) for the rapidly growing numbers of internet users in recent years, malicious attackers has been growing too. Due to these attacks, corporate image can be impaired significantly by such damages ...

Byung-Ryong Kim; Ki-Chang Kim

2006-05-01T23:59:59.000Z

198

Argonne applied mathematicians use INCITE awards to attack energy problems  

NLE Websites -- All DOE Office Websites (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

199

Ice slurry technology can save heart attack victims, surgery patients  

NLE Websites -- All DOE Office Websites (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

200

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

202

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

203

Quantifying information leakage in process calculi  

Science Conference Proceedings (OSTI)

Building on simple information-theoretic concepts, we study two quantitative models of information leakage in the pi-calculus. The first model presupposes an attacker with an essentially unlimited computational power. The resulting notion of absolute ... Keywords: Information leakage, Information theory, Process calculi, Secrecy

Michele Boreale

2009-06-01T23:59:59.000Z

204

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

205

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

206

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks  

Science Conference Proceedings (OSTI)

SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, ... Keywords: SQL injection attacks, dynamic monitoring, retrofitting code, symbolic evaluation

Prithvi Bisht; P. Madhusudan; V. N. Venkatakrishnan

2010-02-01T23:59:59.000Z

207

Countermeasures against fault attacks on software implemented AES: effectiveness and cost  

Science Conference Proceedings (OSTI)

In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm and analyze the efficiency of these countermeasures. We propose ... Keywords: countermeasures, fault attacks, side-channel attacks

Alessandro Barenghi; Luca Breveglieri; Israel Koren; Gerardo Pelosi; Francesco Regazzoni

2010-10-01T23:59:59.000Z

208

DDoS attack detection method based on linear prediction model  

Science Conference Proceedings (OSTI)

Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. The IP Flow feature value (FFV) algorithm is proposed based on the essential features of DDoS attacks, such as the abrupt traffic change, flow dissymmetry, ... Keywords: ARMA model, attack features, distributed denial of service, linear prediction, network security

Jieren Cheng; Jianping Yin; Chengkun Wu; Boyun Zhang; Yun Liu

2009-09-01T23:59:59.000Z

209

In defense of the realm: understanding the threats to information security  

Science Conference Proceedings (OSTI)

The popular press is replete with information about attacks on information systems. Viruses, worms, hackers, and employee abuse and misuse have created a dramatic need for understanding and implementing quality information security. In order to accomplish ...

Michael E. Whitman

2004-02-01T23:59:59.000Z

210

Denial-of-service attacks on battery-powered mobile computers  

E-Print Network (OSTI)

Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures. 1.

Thomas Martin; Michael Hsiao; Dong Ha; Jayan Krishnaswami

2004-01-01T23:59:59.000Z

211

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

212

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network (OSTI)

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

213

Fluid Coking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

214

Thermal Cracking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

215

Delayed Coking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

216

Catalytic Reforming - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

217

Fluid Coking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

218

Isopentane & Isohexane - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Hydrogen production ...

219

Vacuum Distillation - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

220

Catalytic Hydrocracking - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Iran's Response to a U.S. Attack  

E-Print Network (OSTI)

Click to skip to the comments section. Editor's Note: Readers, you can click the PDF button on the menu above to make this article into a PDF suitable for printing or e-reading. Michael Rienzi lays out a detailed analysis of Iran's potential reactions to a strike and finds the following thesis to be likely. Iran’s reaction to an attack by the US would be to use all means at its disposal including their large arsenal of missiles, asymmetric warfare, regular forces, and economic/political disruption methods that would cause large amounts of devastation, casualties, economic disruption, and fear; in the hopes that the enemy would lose the support of its citizens and allies, thus forcing them to end the confrontation; Iran would use all means at its disposal to accomplish this goal rather quickly as they would try to avoid an extended conflict. “Iran would not hesitate to retaliate if attacked. If enemies intend to endanger our welfare and security, we will adopt measures which will make them regret their actions."Islamic Revolutionary Guards Corps

V. Rienzi; Brig Gen; Mohammad Hejazi

2012-01-01T23:59:59.000Z

222

A study on information wrapper protection profile  

Science Conference Proceedings (OSTI)

How to help the end-users to identify and analyze the attacks in cyberspace has become extremely important to the information security task. Based on the standard of the Information Security Audit and Alarms Framework published by ISO, in this paper ... Keywords: common criteria (CC), information security audit and alarms, protection profile (PP), security assurance, security functional

Kwo-Jean Farn; Shu-Kuo Lin; Jiann-Ming Hwang

2007-04-01T23:59:59.000Z

223

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

224

Reserves Overstatements: History, Enforcement, Identification, and Implications of New SEC Disclosure Requirements  

E-Print Network (OSTI)

Despite the need for accurate oil and gas reserves estimates which honor disclosure requirements of the United States Securities and Exchange Commission (SEC), a number of exploration and production companies have allegedly overstated and subsequently written down their reserves during the last 20 years. Reserves write-downs are of great interest to numerous groups involved in the reserves estimation process and outcome, including estimators, managers, investors, creditors, and regulators. Considering the magnitude and nature of some alleged overstatement cases, it appears that some of these parties may benefit from a better understanding of reserves reporting, the relative risk of overstatements, the regulatory environment and enforcement procedures, and identifying questionable reserves data. After discussing the context and importance of reserves and write-downs, there is a detailed examination of the SEC, including the agency's reserves reporting requirements, and their enforcement methods. A number of alleged overstatement and write-down "case studies" are presented, with details on the specific Federal Laws alleged to have been violated by corporations or individuals and then cited by the SEC and shareholder lawsuits. We also conclude that there may be greater write-down potential due to the updated SEC reserves reporting guidelines. A comprehensive series of systematic questions have been compiled and quick-look graphical techniques have been developed that may be used to gain insight into -and potentially raise questions about- an operator's reserves data.

Olsen, Grant

2010-05-01T23:59:59.000Z

225

Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in Integrated Gas Combined Cycle Turbine Engines. Author(s), Andrew D.

226

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network (OSTI)

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

227

Real-time wind estimation and display for chem/bio attack response using UAV data .  

E-Print Network (OSTI)

??The defense response to a Chemical and Biological attack would be importantly based on predicting the dispersion of a toxic cloud. Considering that an Unmanned… (more)

Sir, CristiaÌ

2003-01-01T23:59:59.000Z

228

A simple and low cost platform to perform Power Analysis Attacks.  

E-Print Network (OSTI)

??Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it… (more)

Carmona, Manuel

2012-01-01T23:59:59.000Z

229

Information flow analysis for javascript  

Science Conference Proceedings (OSTI)

Modern Web 2.0 pages combine scripts from several sources into a single client-side JavaScript program with almost no isolation. In order to prevent attacks from an untrusted third-party script or cross-site scripting, tracking provenance of data is ... Keywords: eval, hybrid program analysis, implicit flow, information flow control, unstructured control flow

Seth Just; Alan Cleary; Brandon Shirley; Christian Hammer

2011-10-01T23:59:59.000Z

230

Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT  

E-Print Network (OSTI)

Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormous damage. Furthermore, traditional approaches ...

Shrobe, Howard

2007-04-10T23:59:59.000Z

231

It's Go Time Robots Attack Family Internet Safety  

Science Conference Proceedings (OSTI)

... Classmates.com You Tube Slashdot (Location) ... Vehicle registration information ? Got a Mailbox with a RED Flag? Unclassified Unclassified ...

2010-04-05T23:59:59.000Z

232

Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention  

Science Conference Proceedings (OSTI)

A chlorine tank truck attack could cause thousands of fatalities. As a means of preventing chlorine truck attacks, I consider the on-site generation of chlorine or hypochlorite at all U.S. facilities currently receiving chlorine by truck. I develop and ... Keywords: applications, cost-effectiveness, public policy, risk analysis, terrorism, uncertainty

Anthony M. Barrett

2010-12-01T23:59:59.000Z

233

Program on Technology Innovation: Chloride Attack-Induced Aging of Concrete Structures in the Energy Industry  

Science Conference Proceedings (OSTI)

Corrosion of embedded steel elements (reinforcement, liner, pre- or post-tensioning device) is a major cause of structure dysfunction resulting in large maintenance and repair costs worldwide. This report focuses on chloride attack–induced aging of concrete structures in the energy industry. Chloride attack is a common aging issue caused by marine environment, the extensive ...

2012-11-30T23:59:59.000Z

234

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

235

Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes  

Science Conference Proceedings (OSTI)

Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasures, a number of secure architectures based on linear and nonlinear error detecting codes were proposed. Linear codes provide protection only against primitive ... Keywords: arithmetic codes, cryptography, multipliers, sidechannel attacks

Zhen Wang, Mark Karpovsky, Ajay Joshi

2012-06-01T23:59:59.000Z

236

Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks  

Science Conference Proceedings (OSTI)

This paper proposes a novel approach for cryptanalysis of keystream generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis ... Keywords: LFSRs, algebraic attacks, decimation, fast correlation attack, nonlinear combination keystream generator, state transition matrix, stream ciphers

Miodrag J. Mihaljevi?; Marc P. C. Fossorier; Hideki Imai

2005-12-01T23:59:59.000Z

237

Power and EM Attacks on Passive $13.56\\,\\textrm{MHz}$ RFID Devices  

Science Conference Proceedings (OSTI)

During the last years, more and more security applications have been developed that are based on passive 13.56 MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the ... Keywords: AES, DEMA, DPA, EM Attacks, Power Analysis, RFID, Side-Channel Attacks

Michael Hutter; Stefan Mangard; Martin Feldhofer

2007-09-01T23:59:59.000Z

238

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

239

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

240

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network (OSTI)

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

242

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

243

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

244

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

245

Free energies for acid attack reactions of lithium cobaltate.  

Science Conference Proceedings (OSTI)

The attack of lithium-ion battery cathodes by stray aqueous HF, with resultant dissolution, protonation, and possibly other unintended reactions, can be a significant source of capacity fade. We explore the calculation of reaction free energies of lithium cobaltate in acid by a 'hybrid' method, in which solid-phase free energies are calculated from first principles at the generalized gradient approximation + intrasite coulomb interaction (GGA+U) level and tabulated values of ionization potentials and hydration energies are employed for the aqueous species. Analysis of the dissolution of the binary oxides Li{sub 2}O and CoO suggests that the atomic energies for Co and Li should be shifted from values calculated by first principles to yield accurate reaction free energies within the hybrid method. With the shifted atomic energies, the hybrid method was applied to analyze proton-promoted dissolution and protonation reactions of LiCoO{sub 2} in aqueous acid. Reaction free energies for the dissolution reaction, the reaction to form Co{sub 3}O{sub 4} spinel, and the proton-for-lithium exchange reaction are obtained and compared to empirical values. An extension of the present treatment to consider partial reactions is proposed, with a view to investigating interfacial and environmental effects on the dissolution reaction.

Benedek, R.; van de Walle, A.; Chemical Sciences and Engineering Division; California Inst. of Tech.

2008-01-01T23:59:59.000Z

246

Less Safe--The Dismantling of Public Information Systems After 9/11  

Science Conference Proceedings (OSTI)

Since the terrorist attacks of 9/11, there has been a tightening of public access. In response to perceived security threats, government agencies have taken information down from web sites, curtailed or restricted access to electronic sources of information, ... Keywords: Freedom of Information Act (FOIA), classification, information policy, public information, sensitive but unclassified, critical infrastructure information, state secrets privilege, web sites

Harry Hammitt

2005-11-01T23:59:59.000Z

247

JOINT COMMUNICATIONS ELECTRONICS OPERATION INSTRUCTIONS References: a. DODD 5230.11, “Disclosure of Classified Military Information to Foreign  

E-Print Network (OSTI)

for the planning, coordination and production of the joint communicationselectronics operating instruction (JCEOI). 2. Cancellation. CJCSI 3320.03, 23 September 2002, is canceled. 3. Applicability. This instruction applies to the Joint Staff, Services, unified commands, US elements of combined commands, Defense agencies and joint activities. 4. Policy. To facilitate a more seamless transition into a combined and/or joint operational environment, the Services, Defense agencies and joint activities are encouraged to incorporate the described policies and procedures into their unique contingency operations, training and exercises. a. All unified combatant commands and the US elements of combined commands are directed to develop and use a JCEOI to support contingency operations, training and exercises. b. The JCEOI offers some degree of communications security (COMSEC) protection by changing call signs, call words and frequencies on a daily basis. 2 CJCSI 3320.03A

International Organizations

2005-01-01T23:59:59.000Z

248

Essays on information asymmetry, disclosures and the financing of R&D. The case of the biotechnology industry.  

E-Print Network (OSTI)

??Investments in research and development (R&D) are an important driver of innovation, productivity and economic growth. Despite the importance of R&D investments to society, it… (more)

Jeppsson, Hans

2013-01-01T23:59:59.000Z

249

Global Framework for Climate Risk Exposure | Open Energy Information  

Open Energy Info (EERE)

Framework for Climate Risk Exposure Framework for Climate Risk Exposure Jump to: navigation, search Tool Summary Name: Global Framework for Climate Risk Exposure Agency/Company /Organization: United Nations Environment Programme Topics: Finance, Co-benefits assessment, Market analysis Resource Type: Publications, Guide/manual Website: www.unepfi.org/fileadmin/documents/global_framework.pdf Global Framework for Climate Risk Exposure Screenshot References: Global Framework for Climate Risk Exposure[1] Summary "A group of leading institutional investors from around the world released the Global Framework for Climate Risk Disclosure-a new statement on disclosure that investors expect from companies-in October 2006. Investors require this information in order to analyze a company's business risks and opportunities resulting from climate change, as well as

250

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

251

Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks  

Science Conference Proceedings (OSTI)

This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

2010-01-14T23:59:59.000Z

252

NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET  

E-Print Network (OSTI)

: · Treating all of your health information that we collect as confidential. · Stating confidentiality policies provides the insurer the right to contest the claim under the policy Uses and Disclosures with Neither for lawful intelligence, counterintelligence, and other national security activities. We may be required

Bordenstein, Seth

253

Natural Gas Gross Withdrawals - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Beginning with ...

254

U.S. Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Conventional ...

255

Coalbed Methane Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Eastern States ...

256

Natural Gas Processed - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

257

Domestic Crude by Barge - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

258

Total Crude by Trucks - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

259

Coalbed Methane Proved Reserves - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Eastern States ...

260

Number of Operating Refineries - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Normal Butane/Butylene - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Working storage ...

262

Fuels Solvent Deasphalting - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

263

Catalytic Cracking Fresh Feed - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

264

Total Working Gas Capacity - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Existing fields ...

265

Marketable Petroleum Coke - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Hydrogen production ...

266

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

267

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

268

A study on visual attack to BPCS-Steganography and countermeasure  

Science Conference Proceedings (OSTI)

This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS replaces noisy blocks with the binary patterns mapped from secret data. The logical operation called conjugate ...

Michiharu Niimi; Hideki Noda; Bruce Segee

2005-09-01T23:59:59.000Z

269

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

270

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

271

All other interested parties INVITATION TO COMMENT ON IFAC’S INTERNATIONAL AUDITING AND ASSURANCE STANDARDS BOARD (IAASB) DISCUSSION PAPER The Evolving Nature of Financial Reporting: Disclosure and its Audit Implications  

E-Print Network (OSTI)

Assurance Standards Committee is seeking comments on the IAASB Discussion Paper which has been posted on the Institute’s website at: www.hkicpa.org.hk/professionaltechnical/assurance/exposuredraft/. This Discussion Paper highlights recent trends in the range, volume, and complexity of financial statement disclosures, and explores issues and practical challenges in preparing, auditing, and using them. It begins with a discussion of recent trends in financial reporting and their impact on financial statement disclosures. It then discusses how the International Standards on Auditing currently deal with disclosures. The remainder of the Discussion Paper focuses on audit issues that the IAASB has identified regarding disclosures required by a financial reporting framework. The Discussion Paper addresses critical issues such as challenges in preparing disclosures, the nature and extent of evidence for different types of disclosures, and the application of the concept of materiality to disclosures. Views from all stakeholders are sought, and the discussion paper asks specific questions of preparers; investors, lenders, and other creditors; regulators; and auditors.

Steve Ong

2011-01-01T23:59:59.000Z

272

Voice pharming attack and the trust of VoIP  

Science Conference Proceedings (OSTI)

Voice communication is fundamental to the normal operation of our society. The general public have put a lot of trust in voice communication and they have been relying on it for many critical and sensitive information exchange (e.g., emergency 911 calls, ...

Xinyuan Wang; Ruishan Zhang; Xiaohui Yang; Xuxian Jiang; Duminda Wijesekera

2008-09-01T23:59:59.000Z

273

More on graph theoretic software watermarks: Implementation, analysis, and attacks  

Science Conference Proceedings (OSTI)

This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, ... Keywords: Software piracy protection, Software protection, Software watermarking, Surreptitious software

Christian Collberg; Andrew Huntwork; Edward Carter; Gregg Townsend; Michael Stepp

2009-01-01T23:59:59.000Z

274

Protecting clients from insider attacks on trust accounts  

Science Conference Proceedings (OSTI)

Law firms are no exception to the trend towards computerized information infrastructures, particularly because the very nature of their business is collecting and storing highly confidential client data. One area of activity which has come under intense ... Keywords: Fraud, IT security, Trust account

Sameera Mubarak; Jill Slay

2009-11-01T23:59:59.000Z

275

Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes  

Science Conference Proceedings (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hall, Dr. Linda [ENVIRON International Corporation; Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

276

Tor HTTP usage and information leakage  

Science Conference Proceedings (OSTI)

This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up ... Keywords: information leakage, privacy, tor

Markus Huber; Martin Mulazzani; Edgar Weippl

2010-05-01T23:59:59.000Z

277

Modernizing Patent Law's Inequitable Conduct Doctrine  

E-Print Network (OSTI)

to the claimed invention, disclosure absolves any potentialand adequate disclosure—of the invention at issue. 1 Thefailed to disclosure information material to the invention's

Cotropia, Christopher

2008-01-01T23:59:59.000Z

278

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

279

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

280

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

282

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

283

Classified STI Products | Scientific and Technical Information Program  

Office of Scientific and Technical Information (OSTI)

Classified STI Products Classified STI Products Print page Print page Email page Email page The Atomic Energy Act of 1954, as amended, and Executive Order 13526 serves as the basis for identifying classified information generated by the Department. Classified information is defined as certain information that the United States Government has determined requires protection against unauthorized disclosure for reasons of national security (i.e., Restricted Data, Formerly Restricted Data, and National Security Information). Caveats and special control markings are placed on documents to identify special handling or dissemination requirements, or to assist in describing the type of information involved. (Refer to CMPC Marking Resource, Examples of Acceptably Marked Classified or Controlled Matter (PDF, 5.1MB)

284

Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances  

E-Print Network (OSTI)

When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a file server virtual machine running on the same physical host and export it to other virtual machines running on the same host. We implement this private file server virtual machine using a modified version of an NFS server installed in a virtual machine under various virtualization environments such as Xen and VMware. We also demonstrate that by placing the user’s applications in a virtual machine rather than directly on the base machine we can provide near instant recovery of system configuration information. We quantify the costs of this architecture by comparing benchmarks running directly on a base operating system and accessing data in a local filesystem to those running in a guest operating system and accessing data in an NFS partition mounted from a file server virtual machine. We find that for Xen the overhead of read intensive workloads is at most 5 % and for write intensive workloads the overhead is at most 24%. For system benchmarks that stress CPU and memory performance, we see no noticeable degradation.

Jeanna N. Matthews; Jason J. Herne; Todd M. Deshane; Patty A. Jablonski; Leslie R. Cherian; Mike T. Mccabe

2005-01-01T23:59:59.000Z

285

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

286

Collaboration Structure and Information Dilemmas in Biotechnology: Organizational Boundaries as Trust Production  

E-Print Network (OSTI)

Disclosure by deposit eliminates the inherent difficulty in disclosing the art used to obtain the invention

Zucker, Lynne G.; Brewer, Marilynn B.; Darby, Michael R.; Peng, Yusheng

1994-01-01T23:59:59.000Z

287

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network (OSTI)

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

288

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

289

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

290

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Chien, Andrew A.

291

[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches  

Science Conference Proceedings (OSTI)

In this paper, we suggest handling security in embedded systems by introducing a small architectural change. We propose the use of a non-deterministic branch instruction to generate non-determinism in the execution of encryption algorithms. Non-determinism ... Keywords: embedded system security, side-channel attacks, hiding countermeasure

Pedro Malagon, Juan-Mariano de Goyeneche, Marina Zapater, Jose M. Moya

2010-01-01T23:59:59.000Z

292

False data injection attacks against state estimation in electric power grids  

Science Conference Proceedings (OSTI)

A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, ... Keywords: Power grids, attack, state estimation

Yao Liu; Peng Ning; Michael K. Reiter

2011-05-01T23:59:59.000Z

293

Not-a-Bot: improving service availability in the face of botnet attacks  

Science Conference Proceedings (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic ...

Ramakrishna Gummadi; Hari Balakrishnan; Petros Maniatis; Sylvia Ratnasamy

2009-04-01T23:59:59.000Z

294

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

295

Contactless electromagnetic active attack on ring oscillator based true random number generator  

Science Conference Proceedings (OSTI)

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some ... Keywords: EM injections, IEMI, TRNGs, active attacks, ring oscillators

Pierre Bayon; Lilian Bossuet; Alain Aubert; Viktor Fischer; François Poucheret; Bruno Robisson; Philippe Maurine

2012-05-01T23:59:59.000Z

296

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid is a new type of energy-based cyber physical system (CPS) that will provide reliable, secure, and efficient energy transmission and distribution. The way to secure the distributed energy routing process that efficiently utilizes the distributed ... Keywords: Smart grid, Distributed energy routing, False data injection attacks, Energy distribution

Jie Lin; Wei Yu; Xinyu Yang; Guobin Xu; Wei Zhao

2012-04-01T23:59:59.000Z

297

A Look In the Mirror: Attacks on Package Managers Author Names Removed for Anonymous Submission  

E-Print Network (OSTI)

for security. There is no protection of package metadata or the root metadata. Package Metadata An attacker can of the package in the package meta- data protects the package from tampering. Packages Resistance to metadata, the package metadata is protected from tam- pering. Packages The signature on the root metadata prevents

Hartman, John H.

298

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain  

E-Print Network (OSTI)

In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and flow measure. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time. NS-2 network simulator on Linux platform is used as simulation testbed. Simulation results show that our proposed solution gives a drastic improvement in terms of detection rate and false positive rate. However, the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads as far as monitoring and analysis of traffic at single point connecting victim is concerned. To address this problem, a distributed...

Gupta, B B; Misra, Manoj; 10.1145/1523103.1523203

2012-01-01T23:59:59.000Z

299

Iago attacks: why the system call API is a bad untrusted RPC interface  

Science Conference Proceedings (OSTI)

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted application's state. Under such ... Keywords: iago attacks, overshadow, system call

Stephen Checkoway; Hovav Shacham

2013-04-01T23:59:59.000Z

300

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

The Small and Silent Force Multiplier: A Swarm UAV--Electronic Attack  

Science Conference Proceedings (OSTI)

At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) ... Keywords: Electronic attack, Electronic warfare, Swarm UAV, UAS, UAV, Unmanned Aircraft Systems, Unmanned aerial vehicle

Polat Cevik; Ibrahim Kocaman; Abdullah S. Akgul; Barbaros Akca

2013-04-01T23:59:59.000Z

302

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

303

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation  

E-Print Network (OSTI)

Frequency and intensity of Internet attacks are rising with an alarming pace. Several technologies and concepts were proposed for fighting distributed denial of service (DDoS) attacks: traceback, pushback, i3, SOS and Mayday. This paper shows that in the case of DDoS reflector attacks they are either ineffective or even counterproductive. We then propose a novel concept and system that extends the control over network traffic by network users to the Internet using adaptive traffic processing devices. We safely delegate partial network management capabilities from network operators to network users. All network packets with a source or destination address owned by a network user can now also be controlled within the Internet instead of only at the network user's Internet uplink. By limiting the traffic control features and by restricting the realm of control to the "owner" of the traffic, we can rule out misuse of this system. Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, new ways of collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.

Thomas Dübendorfer; Matthias Bossardt; Bernhard Plattner

2005-01-01T23:59:59.000Z

304

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

305

Regulating Greenhouse Gas 'Leakage': How California Can Evade the Impending Constitutional Attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation. (author)

Potts, Brian H.

2006-06-15T23:59:59.000Z

306

Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

Brian H. Potts

2006-06-15T23:59:59.000Z

307

The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure  

SciTech Connect

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

2006-08-28T23:59:59.000Z

308

Natural Gas Vented and Flared - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Beginning with ...

309

Refinery Net Production of Ethane - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

310

Foreign Crude by Tank Cars (Rail) - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

311

Delaware Imports of Residual Fuel - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

312

Catalytic Hydrotreating/Desulfurization - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Idle refineries ...

313

Refinery Net Production of Isobutane - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

314

Vermont Imports of Residual Fuel - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

315

Natural Gas Aquifers Storage Capacity - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Existing fields ...

316

Colorado Natural Gas Plant Processing - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

317

Montana Natural Gas Plant Processing - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

318

Information for Department Employees and Program Offices | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Information for Department Employees and Program Offices Information for Department Employees and Program Offices Information for Department Employees and Program Offices Copyrights A copyright is a federal right owned by every author to exclude others from reproducing, adapting, distributing, performing in public or displaying in public a work created by that author. However, works prepared by government employees as part of their official duties are not subject to copyright protection in the United States. See www.copyright.gov or www.cendi.gov for more information. For general guidance on the use of copyrighted materials by DOE employees please see our guidance on Use of Copyrighted Materials by Government Employees. The Office also reviews and prepares speaker release for DOE employees and counsel Departmental elements on non-disclosure

319

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

320

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks  

E-Print Network (OSTI)

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Padmavathi, Dr G

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Arizona Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

322

Crude Oil Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

323

Crude Oil Domestic Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

324

Average Residential Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

325

Ohio Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

326

Florida Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

327

Natural Gas Citygate Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

328

Natural Gas Exports Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

329

Connecticut Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

330

Midwest (PADD 2) Refinery - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

331

Massachusetts Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

332

Imports of Crude Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

333

Colorado Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

334

Texas Natural Gas Summary - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

335

Wisconsin Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

336

Average Commercial Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

337

Natural Gas Wellhead Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

338

Pennsylvania Natural Gas Summary - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

339

Washington Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

340

Michigan Natural Gas Summary - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Louisiana Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

342

Utah Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

343

Wyoming Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

344

Fuel Ethanol Oxygenate Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Totals may not equal sum ...

345

California Natural Gas Summary - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

346

Crude Oil Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: All PAD District totals ...

347

Liquefied Petroleum Gases Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

348

Distillate Fuel Oil Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

349

Maryland Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

350

Vermont Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

351

Products Imports from Poland - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

352

Products Imports from Brazil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

353

Residual Fuel Oil Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

354

Ethane/Ethylene Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

355

Kansas Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

356

International Energy Statistics - Energy Information Administration  

U.S. Energy Information Administration (EIA)

--- = Not applicable (s) = Value is too small for the number of decimal places shown NA = Not available W = Data withheld to avoid disclosure

357

Alberta/EZ Policies | Open Energy Information  

Open Energy Info (EERE)

Scotia Ontario Prince Edward Island Quebec Saskatchewan Environmental Regulations Generation Disclosure Yes StateProvince This act requires that every energy enterprise file...

358

Commercial Jet Fuel Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Beginning in 1993, motor ...

359

Natural Gas Imports Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

360

Refinery Operable Capacity - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Totals may not equal sum ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Natural Gas Industrial Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

362

Maine Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

363

Texas Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

364

Indiana Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

365

Petroleum Coke Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

366

GHGMI-Training Courses | Open Energy Information  

Open Energy Info (EERE)

GHGMI-Training Courses GHGMI-Training Courses Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GHGMI-Training Courses Agency/Company /Organization: Greenhouse Gas Management Institute (GHGMI) Sector: Climate Focus Area: Non-renewable Energy, Energy Efficiency, Forestry, Agriculture Topics: GHG inventory Resource Type: Training materials User Interface: Website Website: ghginstitute.org/education/courses/ Cost: Paid GHGMI-Training Courses Screenshot References: GHGMI-Training Courses[1] Logo: GHGMI-Training Courses Courses include: 101 Introduction to Climate Change 102 Introduction to Carbon Markets 201 Basics of Organizational GHG Accounting 202 Basics of Project-Level GHG Accounting 211 GHG Information Management Systems 251 Corporate Climate Change Risk Disclosure: Investor CDP

367

The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis  

SciTech Connect

This paper develops a bottom-up approach that focuses on behavioral responses in estimating the total economic impacts of the September 11, 2001, World Trade Center (WTC) attacks. The estimation includes several new features. First, is the collection of data on the relocation of firms displaced by the attack, the major source of resilience in muting the direct impacts of the event. Second, is a new estimate of the major source of impacts off-site -- the ensuing decline of air travel and related tourism in the U.S. due to the social amplification of the fear of terrorism. Third, the estimation is performed for the first time using Computable General Equilibrium (CGE) analysis, including a new approach to reflecting the direct effects of external shocks. This modeling framework has many advantages in this application, such as the ability to include behavioral responses of individual businesses and households, to incorporate features of inherent and adaptive resilience at the level of the individual decision maker and the market, and to gauge quantity and price interaction effects across sectors of the regional and national economies. We find that the total business interruption losses from the WTC attacks on the U.S. economy were only slightly over $100 billion, or less than 1.0% of Gross Domestic Product. The impacts were only a loss of $14 billion of Gross Regional Product for the New York Metropolitan Area.

Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois; Asay, Gary [University of Southern California

2009-01-01T23:59:59.000Z

368

Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.  

SciTech Connect

ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

D.R. Coyle; D.C. Booth: M.S. Wallace

2005-12-01T23:59:59.000Z

369

Development of prototype guidelines for risk management against terror attack in the tourism industry: a Delphi study  

E-Print Network (OSTI)

The purpose of the study was to gather strategies and factors from tourism security professionals from which terrorism risk management policies can be developed. This study utilized the Delphi method in order to provide structure for the group process. Twelve tourism security experts made up the panel completing three rounds of questionnaires via the email based Delphi technique. This research identified fifty-four strategies to reduce the propensity of terror attack at a tourism venue. Those strategies were divided into four levels of priority based on criticality and feasibility. The fifty-four strategies were grouped into nine subordinate categories. The subordinate categories were related to Training, Communications/ Liaison, Planning/ Assessment, Background Checks, ID Badges/ Secure Entrance, Specialty Security Units, Architectural Design, Media Cooperation, and Technology Based strategies. Alongside the strategies are a collection of comments by the experts regarding strengths, weaknesses, and any barriers to implementation pertaining to the individual strategy. Tourism risk managers, security personnel, and insurance underwriters can all use the results in reducing the opportunity for a terrorist attack at a tourism venue. Major research findings from this study included: 1. The strategy receiving the highest criticality ranking over all other strategies involves training first responders on their role in circumventing the success of terrorists. 2. The subordinate category Communication/ Liaison contains the largest number of strategies indicating the significance of this category among experts. 3. The subordinate category of Specialty Security Units contains the second highest number of strategies indicating the importance of the topic among experts. 4. All of the technology based strategies fell into the lowest priority level. Based on the findings of this study, researcher recommendations include: 1. The guidelines developed in this study should be used by operators of tourism venues to make the best use of limited resources. 2. National or international conferences should be established to further discuss these issues. 3. A greater number of communications mediums should be established to facilitate the exchange of ideas and experiences between affected professionals. 4. Insurance providers should use this information to establish validated guidelines so that, if prospective clients adhered to the recommendations, a reduction in premiums could be offered. 5. Other entities may benefit from this study, such as public school systems, the energy production industry, hospital systems, and pipeline systems.

Smith, Clifford Keith

2003-05-01T23:59:59.000Z

370

SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER DISCLOSURE FILE NO. DI-10-1231: ALLEGATIONS REGARDING WESTERN AREA POWER ADMINISTRATION'S DESERT SOUTHWEST REGION, OAS-SR-11-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER DISCLOSURE FILE NO. DI-10-1231: ALLEGATIONS REGARDING WESTERN AREA POWER ADMINISTRATION'S DESERT SOUTHWEST REGION, OAS-SR-11-01 The U.S. Office of Special Counsel requested the Department investigate a whistleblower disclosure that employees at the Western Area Power Administration's Desert Southwest Region engaged in conduct that constituted violation of law, rule or regulation; gross mismanagement; and gross waste of funds. Specifically, the disclosure alleged that Western had (a) improperly provided 90 megawatts per hour of free electric transmission to a full-service energy provider; and (b) violated Federal Energy Regulatory Commission Orders by continuing to allow the energy provider to receive free transmission. Our review did not substantiate the allegations.

371

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

Science Conference Proceedings (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

372

Protecting Buildings From a Biological or Chemical Attack: actions to take  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

373

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network (OSTI)

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

374

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune,  

E-Print Network (OSTI)

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune 55455 {pwang,tyra,dchantin,malchow,foo,hopper,kyd}@cs.umn.edu ABSTRACT The Kad network

Kim, Dae-Shik

375

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL; Abercrombie, Robert K [ORNL

2012-01-01T23:59:59.000Z

376

Residential Energy Disclosure (Hawaii)  

Energy.gov (U.S. Department of Energy (DOE))

A residential property owner is required to disclose electricity costs for the most recent three-month period in which the property was occupied as a condition of selling it. No proof or copies of...

377

US Equities Disclosures  

U.S. Energy Information Administration (EIA) Indexed Site

0.10 0.20 0.30 0.40 0.50 0.60 0.70 0.80 0 3,000 6,000 9,000 12,000 15,000 18,000 South Korea China India GDP per capita, US Autos per House Hold A history of GDP (real) per...

378

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

379

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

380

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

SciTech Connect

This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

2009-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

382

Inform Editors  

Science Conference Proceedings (OSTI)

Inform editorial board Inform Editors inform Magazine algae algal AOCS biomass business chemistry cottonseed date detergents fats filing first history inform inform Magazine international inventor law magazine member members monthly news oil oils

383

Subscription Information  

Science Conference Proceedings (OSTI)

Inform subscription rates. Subscription Information inform Magazine algae algal AOCS biomass business chemistry cottonseed date detergents fats filing first history inform inform Magazine international inventor law magazine member members monthly

384

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

385

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

386

Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments  

DOE Green Energy (OSTI)

Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

1993-09-01T23:59:59.000Z

387

THIS PRODUCT CONTAINS CONFIDENTIAL INFORMATION AND TRADE SECRETS OF SUN MICROSYSTEMS, INC. USE, DISCLOSURE OR REPRODUCTION IS PROHIBITED WITHOUT THE PRIOR EXPRESS WRITTEN PERMISSION OF SUN MICROSYSTEMS,  

E-Print Network (OSTI)

This distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo, Netra, Solaris, Sun Ray, Sun StorEdge, Sun StorageTek, SunSolve, and the Butterfly logo are trademarks or registered trademarks of Sun Microsystems, Inc., and its subsidiaries, in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon architecture developed by Sun Microsystems, Inc. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. This product is covered and controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists is strictly prohibited. Use of any spare or replacement CPUs is limited to repair or one-for-one replacement of CPUs in products exported in compliance with U.S.

unknown authors

2009-01-01T23:59:59.000Z

388

Inform App  

Science Conference Proceedings (OSTI)

Access INFORM anytime with our free app available on iPad, iPhone, Android and Kindle. Inform App Inform App        

389

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

NLE Websites -- All DOE Office Websites (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

390

Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism  

E-Print Network (OSTI)

A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

391

On wormhole attacks in underwater sensor networks: A two-tier localization approach  

E-Print Network (OSTI)

Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper we show that underwater denial-of-service attack imposes great threats to any UWSN. Without proper countermeasures, underwater sensor networking is a mission impossible. We propose a localization based approach to answer the challenge. In our design, DUB and DDB, a pair of efficient single-round distance measuring schemes, are critical building blocks to realize our approach inspite of constrained node capability and floating node mobility. In addition, to cope with low/medium node mobiltiy, we propose a two-tier localization scheme to identify short-range wormholes instantly, and long-haul wormholes within a limited latency. Our simulation and implementation confirm the effectiveness of our design. I.

Jiejun Kong; Zhengrong Ji; Weichao Wang; Mario Gerla; Rajive Bagrodia

2004-01-01T23:59:59.000Z

392

Utah Natural Gas Consumption by End Use - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Gas volumes ...

393

Total Supplemental Supply of Natural Gas - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

394

Natural Gas Plant Stocks of Isobutane - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

395

Ohio Natural Gas Consumption by End Use - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Gas volumes ...

396

Everett, MA LNG Imports from Algeria - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: See Definitions ...

397

Texas Natural Gas Consumption by End Use - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Gas volumes ...

398

Yemen Overview - Energy Information Administration  

U.S. Energy Information Administration (EIA)

decline in the country's aging fields and frequent attacks on its oil infrastructure. According to the Oil & Gas Journal, ...

399

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

Science Conference Proceedings (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

400

On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs  

Science Conference Proceedings (OSTI)

Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to protect the intellectual property and to prevent fraud, ... Keywords: FPGA, bitstream encryption, side-channel attacks, triple des

Amir Moradi; Alessandro Barenghi; Timo Kasper; Christof Paar

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

402

North Dakota Natural Gas Prices - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

403

Product Supplied for Lubricants - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Data may not add to ...

404

Utah Prices, Sales Volumes & Stocks - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

405

Natural Gas Futures Prices (NYMEX) - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are based on ...

406

U.S. Imports from Puerto Rico - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

407

Crude Oil Exports by Destination - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

408

Exports of Finished Motor Gasoline - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: RBOB with Ether and RBOB ...

409

Finished Motor Gasoline Exports - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

410

Petroleum Coke Imports from Azerbaijan - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

411

U.S. Imports from Kazakhstan - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

412

U.S. Imports from Latvia - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

413

Ohio Prices, Sales Volumes & Stocks - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

414

Liquefied Natural Gas Imports (Summary) - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

415

Rocky Mountain (PADD 4) Refinery - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

416

East Coast (PADD 1) Leases - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

417

U.S. Imports from Iran - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

418

Refinery Inputs of Crude Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

419

Imports of Distillate Fuel Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: RBOB with Ether and RBOB ...

420

Stocks of Distillate Fuel Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Imports of Crude Oil, Commercial - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

422

Imports of Total Motor Gasoline - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: RBOB with Ether and RBOB ...

423

Liquefied Natural Gas Exports (Summary) - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

424

U.S. Imports from Ecuador - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

425

Crude Oil Imports from Chile - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

426

U.S. Imports from Peru - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

427

U.S. Imports from Bolivia - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

428

Wisconsin Prices, Sales Volumes & Stocks - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

429

Crude Oil Imports from Argentina - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

430

Lubricants Imports from Argentina - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

431

U.S. Weekly Product Supplied - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

432

Natural Gas Futures Prices (NYMEX) - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are based on ...

433

Propane/Propylene Net Production - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

434

Number of Natural Gas Consumers - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Sales consumers buy ...

435

Stocks of Reformulated Gasoline - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Stocks include those ...

436

Natural Gas Electric Power Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

437

U.S. Imports from Spain - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

438

Crude Oil Imports from Indonesia - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

439

U.S. Imports from Indonesia - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

440

U.S. Imports from Venezuela - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

U.S. Imports from Aruba - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

442

Special Naphthas Imports from Venezuela - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

443

U.S. Imports from Poland - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

444

U.S. Imports from Belarus - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

445

International Energy Statistics - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

--- = Not applicable (s) = Value is too small for the number of decimal places shown NA = Not available W = Data withheld to avoid disclosure

446

U.S. Proved Nonproducing Reserves - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Includes only those ...

447

U.S. Imports from Pakistan - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

448

Residuum Refinery Stocks by Type - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

449

East Coast (PADD 1) Total Stocks - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

450

Stocks of SPR Crude Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Stocks include those ...

451

Midwest (PADD 2) Total Stocks - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

452

MTBE Pipeline Stocks by Type - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil stocks in the ...

453

Stocks of Distillate Fuel Oil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Stocks include those ...

454

U.S. Lubricants Imports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

455

Stocks of Propane/Propylene - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

456

U.S. Imports from Costa Rica - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

457

U.S. Imports from Denmark - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

458

Crude Oil Days of Supply - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

459

Stocks of Total Motor Gasoline - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Stocks include those ...

460

Vermont Prices, Sales Volumes & Stocks - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

U.S. Imports from Iraq - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

462

U.S. Imports from Tunisia - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

463

U.S. Imports from Algeria - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

464

U.S. Imports from Persian Gulf - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

465

Connecticut Natural Gas Prices - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

466

U.S. Imports from Brazil - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

467

Conventional Gasoline Imports from China - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

468

U.S. Weekly Supply Estimates - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

469

Imports of Total Motor Gasoline - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Finished motor gasoline ...

470

Stocks of Finished Motor Gasoline - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Stocks include those ...

471

U.S. Imports from Germany - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

472

U.S. Imports from France - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

473

Colorado Prices, Sales Volumes & Stocks - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Retail prices and Prime ...

474

New York Natural Gas Prices - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

475

U.S. Imports from Vietnam - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

476

U.S. Imports from Korea, South - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

477

U.S. Imports from All Countries - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

478

U.S. Imports from Taiwan - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

479

Kerosene-Type Jet Fuel Production - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Beginning in 1993, motor ...

480

U.S. Natural Gas Imports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices for LNG ...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Biomass-Based Diesel Exports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Crude oil exports are ...

482

U.S. Imports from Greece - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

483

U.S. Imports from Syria - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

484

Illinois Natural Gas Prices - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

485

U.S. Imports from Canada - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

486

South Dakota Midgrade Gasoline Prices - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Values shown for the ...

487

South Dakota Natural Gas Prices - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

488

U.S. Imports from Mexico - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

489

New Jersey Natural Gas Summary - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

490

Refinery Yield of Petroleum Coke - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Totals may not equal ...

491

Petroleum Coke Imports from Egypt - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

492

U.S. Petroleum Coke Imports - Energy Information Administration  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: *Countries listed under ...

493

Texas Natural Gas Prices - U.S. Energy Information Administration ...  

U.S. Energy Information Administration (EIA)

-No Data Reported; --= Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Notes: Prices are in ...

494

Information Handling Plan For The Mixed Oxide Fuel Fabrication Facility  

E-Print Network (OSTI)

responses to the NRC's Request for Additional Information (RAI), and a revision to the Classified Matter Protection Plan (CMPP) for the Mixed Oxide Fuel Fabrication Facility (MFFF). Enclosure (1) provides the detailed responses to the Reference (A) RAIs, and indicates corresponding changes to the CMPP. Enclosure (2) provides a List of Effective Pages for the revised CMPP. Enclosure (3) is the revised CMPP itself; it is a page revision with respect to the previous revision of Reference (C). Enclosure (4) lists substantive changes in addition to those resulting from the RAIs. Changes resulting from the RAI responses, as well as other changes, are denoted by vertical lines in the right margin and revised pages have a current revision date. The enclosures herein concern protection of classified matter in accordance with 10 CFR 2.390(d), and should be withheld from public disclosure.

Shaw Areva; Mox Services

2008-01-01T23:59:59.000Z

495

Microsoft Word - m470.4-4aChg1Final10-12-10  

Office of Legacy Management (LM)

OF CLASSIFIED MATTER. a. Disclosure of Classified Information. In the event an emergency situation necessitates the intentional disclosure of classified information to...

496

Information Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Science Information Science1354608000000Information ScienceSome of these resources are LANL-only and will require Remote Access.NoQuestions? 667-5809library@lanl.gov...

497

User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information User Information Print User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Includes information about submitting a...

498

Informed Traders  

E-Print Network (OSTI)

A model is introduced in which there is a small agent who is more susceptible to the flow of information in the market than the general market participant, and who tries to implement strategies based on the additional information. In this model market participants have access to a stream of noisy information concerning the future return of an asset, whereas the informed trader has access to a further information source which is obscured by an additional noise that may be correlated with the market noise. The informed trader uses the extraneous information source to seek statistical arbitrage opportunities, while at the same time accommodating the additional risk. The amount of information available to the general market participant concerning the asset return is measured by the mutual information of the asset price and the associated cash flow. The worth of the additional information source is then measured in terms of the difference of mutual information between the general market participant and the informe...

Brody, Dorje C; Friedman, Robyn L; Hughston, Lane P

2008-01-01T23:59:59.000Z

499

About Inform  

Science Conference Proceedings (OSTI)

AOCS member magazine that provide international news on fats, oils, surfactants, detergents, and related material. inform About Inform Publications aocs articles book books cdrom cdroms detergents echapters fats inform international journal journ

500

Fire initiation and spread in urban areas due to nuclear attack  

SciTech Connect

Calculation of fire development in urban areas is a critical step in estimating the global effects of nuclear warfare with regard to smoke production and transport. As part of the first phase of a program to improve our ability to calculate fire starts and spread in urban areas, we have performed a parameter sensitivity analysis using the three codes originally developed for civil defense planning by the IIT Research Institute. We have added graphics and made slight improvements to the codes and applied them to the representation of the San Jose urban area used in the Five-City Study of the late 1960s. For a chosen reference attack scenario, we have varied parameters and compared the results to those of a representative baseline case. The parameters varied included: atmospheric visibility, lowest of the various critical ignition energies of window coverings, shading of windows by trees and awnings, extent of blast extinguishment of fires, secondary ignitions, window glass transmittance, specific firebrand generation rate, firebrand distribution range, windspeed, building densities, specific fuel loadings, and window sizes. 13 references, 10 figures, 5 tables.

Reitter, T.A.; Takata, A.N.; Kang, S.W.

1984-09-01T23:59:59.000Z