Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Generation Disclosure | Open Energy Information  

Open Energy Info (EERE)

Disclosure Disclosure Jump to: navigation, search Some states require electric utilities to provide their customers with specific information about the electricity that the utility supplies. This information, which generally must be shared with customers periodically, usually includes the utility's fuel mix percentages and emissions statistics. In states with restructured electricity markets, generation disclosure policies are designed to help consumers make informed decisions about the electricity and suppliers they choose. A few states that have not fully restructured their electricity markets require generation disclosure by utilities. [1] Generation Disclosure Incentives CSV (rows 1 - 40) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

2

T-578: Vulnerability in MHTML Could Allow Information Disclosure |  

Broader source: Energy.gov (indexed) [DOE]

8: Vulnerability in MHTML Could Allow Information Disclosure 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory (2501696) CVE-2011-0096 SecurityTracker Alert ID: 1025003 Bugtraq ID: 46055 IMPACT ASSESSMENT: Moderate Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain

3

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

2: IBM WebSphere Commerce User Information Disclosure 2: IBM WebSphere Commerce User Information Disclosure Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability October 2, 2012 - 6:00am Addthis PROBLEM: IBM WebSphere Commerce User Information Disclosure Vulnerability PLATFORM: WebSphere Commerce Versions 6.0.0.0 to 6.0.0.11 WebSphere Commerce Versions 7.0.0.0 to 7.0.0.6 ABSTRACT: A vulnerability in WebSphere Commerce could allow disclosure of user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium Discussion: A remote unauthenticated attacker could exploit a security vulnerability in WebSphere Commerce to expose user personal data. The attack can be performed manually and the effort required is comparatively low.

4

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

5

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

6

U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: Bugzilla LDAP Injection and Information Disclosure 1: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities September 5, 2012 - 6:00am Addthis PROBLEM: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability reference LINKS: Bugzilla Homepage Bugzilla Security Advisory Bugtraq ID: 55349 Secunia Advisory SA50433 CVE-2012-3981 CVE-2012-4747 IMPACT ASSESSMENT: Medium Discussion: A vulnerability and a security issue have been reported, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data. 1) Input passed via the username is not properly escaped before being used

7

Carbon Disclosure Project | Open Energy Information  

Open Energy Info (EERE)

Disclosure Project Disclosure Project Jump to: navigation, search Name Carbon Disclosure Project Place London, United Kingdom Zip EC1R 0NE Product A secretariat for 143 institutional investors with USD 20 trn under management, it aims to encourage the development of a common emissions measurement methodology and to facilitate its integration into general investment analysis. References Carbon Disclosure Project[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Carbon Disclosure Project is a company located in London, United Kingdom . References ↑ "Carbon Disclosure Project" Retrieved from "http://en.openei.org/w/index.php?title=Carbon_Disclosure_Project&oldid=343232

8

U-181: IBM WebSphere Application Server Information Disclosure  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere Application Server Information Disclosure 1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information. Reference Links: Secunia Advisory 49352 CVE-2012-2170 Vendor Advisory IMPACT ASSESSMENT: High Discussion: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input

9

HIPAA: Accounting of Disclosures Guidance Document A disclosure is a release, transfer, access to, or divulging of information outside of OHSU. In general,  

E-Print Network [OSTI]

HIPAA: Accounting of Disclosures Guidance Document A disclosure is a release, transfer, access to be tracked. See http://www.ohsu.edu/cc/hipaa/ads.shtml for more information about the ADS system. See http not need to be tracked. INCLUDED IN THE ACCOUNTING The following disclosures must be recorded using

Chapman, Michael S.

10

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

11

U-181: IBM WebSphere Application Server Information Disclosure...  

Energy Savers [EERE]

this vulnerability using unspecified attack vectors to inject script in a victim's web browser within the security context of the hosting Web site. Impact: Exposure of...

12

The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions  

Science Journals Connector (OSTI)

This study examined the relationship between the evaluation of risk, trust and disclosure of personal information in young peoples' online interactions. A series of 18 focus groups were conducted with young people aged 9-19years old. The results suggested ... Keywords: Adolescence, Internet, Risk, Trust

Jo Bryce; James Fraser

2014-01-01T23:59:59.000Z

13

Modeling attacker-defender interactions in information networks.  

SciTech Connect (OSTI)

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

Collins, Michael Joseph

2010-09-01T23:59:59.000Z

14

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

15

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

16

Energy Disclosure and Leasing Standards: Best Practices  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on Energy Disclosure and Leasing Standards: Best Practices.

17

Voluntary disclosure of intellectual capital in the Brazilian context: an investigation informed by the international context  

Science Journals Connector (OSTI)

This study investigates whether and how Brazilian companies disclose Intellectual Capital (IC) in their Annual Reports (ARs) and whether this voluntary disclosure behaves in a way similar to that in the international context. The study examines the ARs of the 25 top Brazilian open organisations (Social Capital) listed at BOVESPA (Sao Paulo Stock Exchange) on 31 December 2004. The 'content analysis' technique (Guthrie et al., 1999) was used together with Sveiby's classificatory framework (1997). The study revealed a: high incidence of voluntary IC disclosure in ARs of Brazilian organisations; trend towards disclosure in qualitative (narrative) terms; high frequency of External Capital (EC) as an IC category; similarity in the results obtained both in the Brazilian and the international contexts, particularly as regards similar studies in Australia and Sri Lanka: reporting EC is more in favour in the three contexts with differences regarding the most reported element.

Sandra Rolim Ensslin; Fernando Nitz De Carvalho

2007-01-01T23:59:59.000Z

18

Green Power Network: Environmental Disclosure Policies  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

govern_purch govern_purch Community Choice Aggregation Disclosure Policies Green Power Policies Net Metering Policies Environmental Disclosure Policies A number of states have adopted environmental disclosure policies, requiring electricity suppliers to provide information on fuel sources and, in some cases, emissions associated with electricity generation. The policies have been adopted in states with retail competition as well as in states with traditionally regulated electricity markets. Summaries of state environmental disclosure policies are provided below under the categories full, partial, or proposed. The term partial disclosure requirements refers to policies that are not mandatory, do not apply to all retail electricity suppliers, or do not result in direct disclosure to consumers.

19

Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization  

E-Print Network [OSTI]

(GDI) as information describing the dynamic membership of a group application, such as the number the service during a time interval. In many multicast applications, GDI is confidential and should of the GDI to competitors could enable them to analyze the statistical behavior of the audience and help them

Sun, Yan Lindsay

20

Fuel Mix Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Disclosure Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State District of Columbia Program Type Generation Disclosure Provider Washington State Department of Commerce Washington's retail electric suppliers must disclose details regarding the fuel mix of their electric generation to customers. Electric suppliers must provide such information in a standard format annually to customers. In addition, most larger electric suppliers must provide at least two additional times annually a publication that contains the standard disclosure label, a customer service phone number to request the disclosure label or a reference to an electronic version of the disclosure label. (Small utilities and mutual light and power companies must provide the disclosure label at least annually to customers in the form of a

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerabilit...  

Broader source: Energy.gov (indexed) [DOE]

of sensitive information. Solution: Refer to IBM Security Bulletin 1612484 for patch, upgrade or suggested workaround information. Addthis Related Articles U-181: IBM...

22

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Minnesota Program Type Generation Disclosure Provider Minnesota Department of Commerice In September 2002, the Minnesota Public Utilities Commission (PUC) issued an order requiring the state's regulated electric utilities to disclose to customers details on the fuel mix and emissions of electric generation. Utilities must provide this information to customers in a standard format twice annually. Utilities may distribute this information to customers electronically. Disclosure information must also be filed with the PUC. In addition, in 2009, the Minnesota Pollution Control Agency began to transition to an inventory data management system that consolidates

23

Research deciphers HIV attack plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights...

24

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Broader source: Energy.gov (indexed) [DOE]

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

25

Fuel Mix Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix Disclosure Fuel Mix Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State Colorado Program Type Generation Disclosure Provider Colorado Public Utilities Commission In January 1999, the Colorado Public Utility Commission (PUC) adopted regulations requiring the state's utilities to disclose information regarding their fuel mix to retail customers. Utilities are required to provide this information as a bill insert or as a separate mailing twice annually, in April and October of every year. The PUC provides a suggested format for the disclosure. Fuel mix percentages are to be based on the power supply mix for the previous calendar year. Supporting documentation concerning the calculations used to determine the power supply mix percentages must be submitted to the PUC for approval.

26

Online Disclosure of Personally Identifiable Information with Strangers: Effects of Public and Private Sharing  

Science Journals Connector (OSTI)

......disclose more intimate information in Internet relationships (Parks and Floyd, 1996...already know each other, and use the Internet as one way of keeping their existing...online translation tool since they were not good at English. One respondent from condition......

Jayant Venkatanathan; Vassilis Kostakos; Evangelos Karapanos; Jorge Gonalves

2014-11-01T23:59:59.000Z

27

Environmental Disclosure Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Environmental Disclosure Program Environmental Disclosure Program Environmental Disclosure Program < Back Eligibility Utility Program Info State New York Program Type Generation Disclosure Provider New York State Department of Public Service The New York Public Service Commission (PSC) requires all electric utilities, energy service companies, jurisdictional municipal electric utilities and jurisdictional cooperative electric utilities to disclose details regarding the fuel mix and emissions of the supplier's electric generation to customers. This information must be provided to retail customers in a standard format every 6 months. The PSC created New York's Environmental Disclosure Program via an order issued in December 1998. This program has been modified several times since it was established. A November 2008 PSC order reduced the frequency of the

28

OMB Burden Disclosure Statement  

Broader source: Energy.gov (indexed) [DOE]

71.1 OMB Control Number 71.1 OMB Control Number (09/2012) (Classification) OMB Burden Disclosure Statement 1910-1800 Public reporting burden for this collection of information is estimated to average 10 (minutes) per response, including the time for reviewing instructions, searching exist ing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comme nts regarding this estimate or any other aspect of this information, including suggestions for reducing this burden, to Information, Records, and Resource Management, MA-41-GTN, Paperwork Reduction Project (1910-1800), U.S. Department of Energy, Washington, DC 20874-1290; and to the Office of Management and Budget (OMB), Paperwork Reduction Project (1910-1800),Washington, DC 20503.

29

Advanced Topics for the Portfolio Manager Initiative: Energy Disclosure Policy Implementation  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Energy Disclosure Policy Implementation

30

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

31

Environmental Information Disclosure  

Broader source: Energy.gov [DOE]

New Jerseys 1999 electric utility restructuring law requires electricity suppliers to disclose to customers details regarding the fuel mix and emissions of the suppliers electric generation....

32

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Massachusetts Program Type Generation Disclosure Provider Executive Office of Energy and Environmental Affairs Massachusetts's 1997 electric utility restructuring legislation authorized the Massachusetts Department of Telecommunications and Energy (DTE)* to require certain electricity providers to disclose details on their fuel mix and emissions to end-use customers. In February 1998, the DTE issued final rules requiring competitive suppliers and distribution companies providing standard offer generation service or default generation service to provide this information to customers quarterly and upon request. * In 2007, the Massachusetts Department of Telecommunications and Energy

33

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

34

Cost Accounting Standards Board Disclosure Statement (Form DS-2)  

E-Print Network [OSTI]

Cost Accounting Standards Board Disclosure Statement (Form DS-2) University of California, Irvine Revision Number 2, Effective Date April 1, 2012 #12;i COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT AND CERTIFICATION C-1 Part I General Information I-1 Part II Direct Costs II-1 Part III Indirect Costs III-1 Part IV

Loudon, Catherine

35

Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings  

Broader source: Energy.gov [DOE]

This presentation is part of the SEE Action Series and provides information on Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings

36

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

and Emissions Disclosure and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State District of Columbia Program Type Generation Disclosure Provider DC Public Service Commission Under regulations adopted by the D.C. Public Service Commission, all electricity suppliers and electricity companies operating in the District of Columbia must report to the Commission every six months the fuel mix of electricity sold and the emissions produced. The fuel mix report must be in a format similar to the information provided by the PJM Environmental Information Services (PJM EIS). Electricity suppliers and electricity companies must also provide a fuel mix report to customers twice annually, within the June and December billing cycles. Emissions information must be disclosed every six months on

37

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

You are here You are here Home » Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Virginia Program Type Generation Disclosure Provider Virginia State Corporation Commission Virginia's 1999 electric industry restructuring law requires the state's electricity providers to disclose -- "to the extent feasible" -- fuel mix and emissions data regarding electric generation. Legislation in 2007 and 2008 related to Electric Utility Regulation amended the restructuring laws, but still require emissions and fuel mix disclosure. Information must be provided to customers and to the Virginia State Corporation Commission (SCC) at least once annually. If any portion of this information is unavailable, the electricity provider must file a report

38

Watermarking Attack: Security of WSS Techniques Francois Cayre1  

E-Print Network [OSTI]

carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal. This approach is certainly not the only one but secret disclosure is a very powerful hack: it gives the access of the communication channel at the lowest distortion price to hack content. The key idea of this security analysis

Boyer, Edmond

39

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Michigan Program Type Generation Disclosure Provider Michigan Public Service Commission Michigan's Customer Choice and Electric Reliability Act of 2000 (P.A. 141) requires electric suppliers to disclose to customers details related to the fuel mix and emissions, in pounds per megawatt-hour (MWh) of electric generation. Electric suppliers must provide this information to customers twice annually in a standardized, uniform format. The Michigan Public Service Commission (MPSC) staff must calculate the regional electricity generation and environmental characteristics and make it available to be used by the state's generation providers. The web site above describes the

40

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Ohio Program Type Generation Disclosure Provider Public Utilities Commission of Ohio Ohio's 1999 electric industry restructuring law requires the state's electricity suppliers to disclose details regarding their fuel mix and emissions to customers. Electric utilities and competitive retail electric service providers of retail electric generation service must provide this information to their customers in a standard format several times per year. The Ohio Public Utilities Commission (PUCO) adopted rules in 2000 to implement this policy; the rules have been amended subsequently. There are separate rules for electric utilities providing a standard offer for retail

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

Maine's 1997 restructuring legislation directed the state Public Utility Commission (PUC) to establish environmental disclosure rules for retail electric billing. The PUC rules require utilities to...

42

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

As part of the state's 1997 electric utility restructuring legislation, Illinois established provisions for the disclosure of fuel mix and emissions data. All electric utilities and alternative...

43

DISCLOSURE OF LOBBYING ACTIVITIES  

Gasoline and Diesel Fuel Update (EIA)

OF LOBBYING ACTIVITIES OF LOBBYING ACTIVITIES Approved by OMB Complete this form to disclose lobbying activities pursuant to 31 U.S.C. 1352 0348-0046 (See reverse for public burden disclosure.) 1. Type of Federal Action: 2. Status of Federal Action: 3. Report Type: a. contract a. bid/offer/application a. initial filing b. grant b. initial award b. material change c. cooperative agreement c. post-award For Material Change Only: d. loan year _________ quarter _________ e. loan guarantee date of last report ______________ f. loan insurance 4. Name and Address of Reporting Entity: 5. If Reporting Entity in No. 4 is a Subawardee, Enter Name

44

Lobbyist Disclosure Form - Silicon Valley | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Lobbyist Disclosure Form - Silicon Valley.pdf More Documents & Publications Lobbyist Disclosure Form - AltEn Lobbyist Disclosure Form - First Solar Interested Parties - Shipp...

45

Fuel Mix and Emissions Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

You are here You are here Home » Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Utility Program Info State Maryland Program Type Generation Disclosure Provider Maryland Public Service Commission Maryland's 1999 electric utility restructuring legislation requires all electric companies and electricity suppliers to provide customers with details regarding the fuel mix and emissions of electric generation. Emissions data must be expressed in terms of pounds per megawatt-hour (MWh). This information must be provided to customers every six months and annually to the Maryland Public Service Commission (PSC). Past reports are available in Case No. 8738 through the [http://webapp.psc.state.md.us/Intranet/Casenum/caseform_new.cfm? PSC's

46

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

47

Annual Confidential Financial Disclosure Report (OGE 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

1999-10-01T23:59:59.000Z

48

Annual Confidential Financial Disclosure Report (OGE 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential disclosure requirements. These requirements apply to career GS (GM) employees.

2002-10-01T23:59:59.000Z

49

Annual Confidential Financial Disclosure Report (OGE 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

2000-10-01T23:59:59.000Z

50

Contact Information | Princeton Plasma Physics Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Careers Human Resources Environment, Safety & Health Procurement Division Technology Transfer Current Projects Patents Disclosures Contact Information Forms Furth Plasma...

51

E-Print Network 3.0 - attacks draft resolution Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(and our attacks) to four real-world PRNGs. We close Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 8 Cryptanalytic Attacks on...

52

Disclosures | Princeton Plasma Physics Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disclosures Disclosures No. Title Inventors M-864 "Display of Tournament Bracket" Inventors Eliot Feibush, Michael Knyszek, Matthew Lotocki, Jared Miller, Andrew Zwicker. M-863 "Fueling method for small, steady-state, aneutronic FRC fusion reactors" Inventors Samuel A. Cohen, Daren Stotler, Michael Buttolph M-862 " A Heterodyne Laser-induced Fluorescence Technique to Determine Simultaneously the Bulk and Time Varying Molecule Velocity Distribution." Inventors Ahmed Diallo, Stephane Mazouffre.The method's primary goal is to determine simultaneously the bulk a M-861 "Increasing Solar Panel Efficiency And Reliability By Evaporative Cooling" Inventors..--.. Lewis Meixler, Charles Gentile, Patricia Hillyer, Dylan Carpe, Jason Wang, Caroline Brooks

53

Energy Use Disclosure Summary Sheet The following disclosure is comprised of three  

E-Print Network [OSTI]

a rating.The EUI is a unit of measurement that describes a building's energy use. EUI is comprised of three documents that are generated by the EPA's ENERGY STAR® measurement Energy Use Disclosure Summary Sheet Overview The following disclosure

54

Fuel Mix Disclosure  

Broader source: Energy.gov [DOE]

In April 1998, the Pennsylvania Public Utility Commission (PUC) adopted rules requiring retail electricity suppliers to "respond to reasonable requests made by consumers for information concerning...

55

Paducah DUF6 Conversion Final EIS - Appendix H: Contractor Disclosure Statement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Paducah DUF Paducah DUF 6 Conversion Final EIS APPENDIX H: CONTRACTOR DISCLOSURE STATEMENT Disclosure Statement H-2 Paducah DUF 6 Conversion Final EIS Disclosure Statement H-3 Paducah DUF 6 Conversion Final EIS APPENDIX H: CONTRACTOR DISCLOSURE STATEMENT Argonne National Laboratory (ANL) is the contractor assisting the U.S. Department of Energy (DOE) in preparing the environmental impact statement (EIS) for depleted UF 6 conversion. DOE is responsible for reviewing and evaluating the information and determining the appropriateness and adequacy of incorporating any data, analyses, or results in the EIS. DOE determines the scope and content of the EIS and supporting documents and will furnish direction to ANL, as appropriate, in preparing these documents. The Council on Environmental Quality's regulations (40 CFR 1506.5(c)), which have

56

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

57

Registered_Lobbyist_Contact_Disclosure_Form.pdf | Department...  

Broader source: Energy.gov (indexed) [DOE]

egisteredLobbyistContactDisclosureForm.pdf More Documents & Publications Lobbyist Disclosure Form - AltEn Interested Parties - Shipp Interested Parties - Smith Dawson & Andrews...

58

Annual Confidential Financial Disclosure Report (SF 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to persons employed at the GS-15 level and below, except for Schedule C appointees.

1995-10-13T23:59:59.000Z

59

Annual Confidential Financial Disclosure Report (OGE 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees. (Replaces DOE N 326.7).

2001-10-01T23:59:59.000Z

60

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Fuel Mix Disclosure  

Broader source: Energy.gov [DOE]

Hawaii requires the states retail electric suppliers to disclose details regarding the fuel mix of their electric generation to retail customers. Such information must be provided on customers...

62

PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES  

E-Print Network [OSTI]

i PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES #12;PUBLIC INTEREST DISCLOSURE POLICY AND PROCEDURES 2 Contents 1. AUTHORISATION OF PROCEDURES 3 2. INTRODUCTION 3 2.1. Statement of commitment 3 2.2. Relationship to other Bureau policies 4 2.3. Application of procedures 4 3. RESPONSIBILITIES AND OBLIGATIONS 4

Greenslade, Diana

63

Fuel Mix Disclosure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fuel Mix Disclosure Fuel Mix Disclosure Fuel Mix Disclosure < Back Eligibility Utility Program Info State Delaware Program Type Generation Disclosure Provider Delaware Public Service Commission Delaware's 1999 restructuring law (HB 10) authorized the state Public Service Commission (PSC) to develop environmental disclosure requirements and consumer protection standards for green power marketing. The PSC's rules require all electric suppliers to disclose to the commission aggregate proportions of fuel resource mix for the electricity supplied to customers in Delaware for each quarter. In addition, electric suppliers must disclose their fuel resource mix to retail electric customers annually via bill inserts and "each other quarter' on the supplier's web site or by customer request. A standard label is not required; however, the reports

64

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

65

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

66

Confidential Financial Disclosure Report (OGE Form 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

2004-09-20T23:59:59.000Z

67

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy Savers [EERE]

Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted...

68

Confidential Financial Disclosure Reports (OGE 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The directive establishes requirements and responsibilities for Departmental elements and employees regarding filing Confidential Financial Disclosure Reports (OGE Form 450) in accordance with the Ethics in Government Act of 1978, as amended.

2008-12-09T23:59:59.000Z

69

Energy Disclosure and Leasing Standards: Best Practices  

Broader source: Energy.gov (indexed) [DOE]

joining the meeting To limit background noise, please put your phone or audio on mute. Energy Disclosure and Leasing Standards 2 | TAP Webinar eere.energy.gov The Parker Ranch...

70

Disclosure of Permitted Communication Concerning Regional Standards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

71

Disclosures due to Health Care Reform Changes Disclosure of Grandfather Status  

E-Print Network [OSTI]

Disclosures due to Health Care Reform Changes Disclosure of Grandfather Status UCSD Medical Center of the Affordable Care Act that apply to other plans. Grandfathered health plans must comply with certain other believes this health plan coverage is a "grandfathered health plan" under the Patient Protection

Gleeson, Joseph G.

72

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

73

Efficient template attacks  

E-Print Network [OSTI]

joint MD , d joint LINEAR. 6 Evaluation of Methods We evaluated the efficiency of many template-attack variants on a real hard- ware platform, comparing all the compression methods from Table 110 and all 9 MATLAB, single core CPU with 3794 MIPS. 10 We... implementing template attacks. Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts at: http://www.cl.cam.ac.uk/research/security/datasets/grizzly/ Acknowledgement: Omar Choudary is a...

Choudary, Omar; Kuhn, Markus G.

2014-01-01T23:59:59.000Z

74

Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Plug-in Electric Plug-in Electric Vehicle (PEV) Information Disclosure to someone by E-mail Share Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Facebook Tweet about Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Twitter Bookmark Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Google Bookmark Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Delicious Rank Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on Digg Find More places to share Alternative Fuels Data Center: Plug-in Electric Vehicle (PEV) Information Disclosure on AddThis.com... More in this section... Federal State Advanced Search

75

Seven Deadliest Wireless Technologies Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, ...

Brad Haines

2010-03-01T23:59:59.000Z

76

Seven Deadliest Unified Communications Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified ...

Dan York

2010-06-01T23:59:59.000Z

77

Environmental Disclosure Requirements by State … August 2002  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Disclosure Requirements by State - August 2002 Environmental Disclosure Requirements by State - August 2002 State Disclosure Requirement Scope Frequency Distribution Effective Date Authority Legislation/ Regulation Verification Requirement Notes Full Disclosure Requirements Arkansas Standards to be set for disclosure of environmental impacts Electric service providers TBD TBD TBD Legislature 1999 Act 1556; Rules not yet developed TBD Restructuring delayed until 2003. California Fuel mix required in standard format. Electric service providers Quarterly Bill insert, offers, and written promotional materials (except ads) 1999 Legislature Title 20, Article 5, California Code of Regulation Report to Commission annually with supporting documentation. Suppliers not making specific claims may disclose system mix. Colorado Fuel mix. Standard format is suggested.

78

Zero-knowledge against quantum attacks  

E-Print Network [OSTI]

This paper proves that several interactive proof systems are zero-knowledge against quantum attacks. This includes a few well-known classical zero-knowledge proof systems as well as quantum interactive proof systems for the complexity class HVQSZK, which comprises all problems having "honest verifier" quantum statistical zero-knowledge proofs. It is also proved that zero-knowledge proofs for every language in NP exist that are secure against quantum attacks, assuming the existence of quantum computationally concealing commitment schemes. Previously no non-trivial proof systems were known to be zero-knowledge against quantum attacks, except in restricted settings such as the honest-verifier and common reference string models. This paper therefore establishes for the first time that true zero-knowledge is indeed possible in the presence of quantum information and computation.

John Watrous

2005-11-03T23:59:59.000Z

79

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

80

CORPORATE DISCLOSURE OF ENVIRONMENTAL CAPITAL EXPENDITURES: A TEST OF ALTERNATIVE THEORIES  

E-Print Network [OSTI]

CORPORATE DISCLOSURE OF ENVIRONMENTAL CAPITAL EXPENDITURES: A TEST OF ALTERNATIVE THEORIES Charles capital expenditure; environmental disclosure; environmental regulation; legitimacy theory; materiality DISCLOSURE OF ENVIRONMENTAL CAPITAL EXPENDITURES: A TEST OF ALTERNATIVE THEORIES Introduction The United

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMUs are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

82

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

83

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

84

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure  

Broader source: Energy.gov (indexed) [DOE]

6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie 6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30, 2013 - 4:33am Addthis PROBLEM: Two vulnerabilities have been reported in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system. PLATFORM: Apache 2.0.x Apache HTTP Server 2.x ABSTRACT: Two vulnerabilities have been reported in Apache HTTP Server REFERENCE LINKS: CVE-2012-0053 CVE-2013-1862 http://secunia.com/advisories/54320/ IMPACT ASSESSMENT: Medium DISCUSSION: protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400)

85

Attachment to Registered Lobbyist Disclosure Form: R  

Broader source: Energy.gov (indexed) [DOE]

Registered Lobbyist Disclosure Form: R. Paul Detwiler Registered Lobbyist Disclosure Form: R. Paul Detwiler April 17, 2009 10:10 - 11:15 am At the request of the staff of Pennsylvania State Sen. Jim Ferlo, I attended a meeting of the Pittsburgh Green Innovators to answer logistical questions regarding the availability of Recovery Act funding for energy efficiency and renewable energy projects in Pittsburgh. The meeting was attended by elected officials, their staffs, a representative of a private foundation and others; it focused on a particular project -- renovation of a former vocational school campus in Pittsburgh. The meeting was also attended by Charles J. Kolling, Jr., who identified himself as a registered lobbyist in response to a question I posed to those in attendance. My remarks were limited to logistical matters

86

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

87

E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory...  

Office of Environmental Management (EM)

Disclosure Record) PIA, Idaho National Laboratory More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho...

88

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

As part of Texass 1999 electric utility restructuring legislation, the states retail electric providers are required to disclose certain information in the form of a standardized Electricity...

89

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

Rhode Island requires all entities that sell electricity in the state to disclose details regarding the fuel mix and emissions of their electric generation to end-use customers. This information...

90

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

91

Manufacturers' View on Benchmarking and Disclosure  

U.S. Energy Information Administration (EIA) Indexed Site

Association of Electrical and Association of Electrical and Medical Imaging Equipment Manufacturers Manufacturing Solutions for Energy Efficiency in Buildings Patrick Hughes Policy Director, High Performance Buildings National Electrical Manufacturers Association The Association of Electrical and Medical Imaging Equipment Manufacturers What is NEMA? The Association of Electrical Equipment and Medical Imaging Manufacturers Which policies encourage energy efficiency in buildings? Energy Savings Performance Contracts Tax Incentives Shaheen- Portman Benchmarking and Disclosure Bullitt Center Seattle, Washington The Association of Electrical Equipment and Medical Imaging Manufacturers Energy Savings Performance Contracts ESPCs pay for efficiency upgrades with

92

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

93

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

94

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

95

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

96

Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations  

Broader source: Energy.gov (indexed) [DOE]

Hazardous and Nonhazardous Solid Waste Applicant Disclosure Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations (Mississippi) Hazardous and Nonhazardous Solid Waste Applicant Disclosure Regulations (Mississippi) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Mississippi Program Type

97

A fundamental threat to quantum cryptography: gravitational attacks  

E-Print Network [OSTI]

An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

R. Plaga

2006-03-26T23:59:59.000Z

98

Disclosure of Permitted Communication Concerning Fossil Fuel Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077

99

Leveraging Portfolio Manager for Disclosure and Green Leasing Practices  

Broader source: Energy.gov [DOE]

A talk about developing paths and implementing rating and disclosure policies for the commercial building sector, giving a state, local and federal overview of these types of policies and where theyre in play.

100

Lobbyist Disclosure Form - AltEn | Department of Energy  

Energy Savers [EERE]

and Eric Bursch, OFW Law legislative assistant representing AltEn, discussed an AltEn biofuels project. Lobbyist Disclosure Form - AltEn.pdf More Documents & Publications Lobbyist...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Situational correlates of disclosure of child sexual abuse  

E-Print Network [OSTI]

SITUATIONAL CORRELATES OF DISCLOSURE OF CHILD SEXUAL ABUSE A Thesis by ELIZABETH STIRLING WILEY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 2003 Major Subject: Psychology SITUATIONAL CORRELATES OF DISCLOSURE OF CHILD SEXUAL ABUSE A Thesis by ELIZABETH STIRLING WILEY Submitted to Texas A&M University...

Wiley, Elizabeth Stirling

2005-02-17T23:59:59.000Z

102

Disclosure of asset valuations in corporate annual reports  

E-Print Network [OSTI]

DISCLOSURE OF ASSET VALUATIONS IN CORPORATE ANNUAL REPORTS A Thesis Charles 3. Ponder Approved as to style and content by: Head of Department and Chairman of Committee January 1955 Ll!3RARY A A M COLLEGE OF TEXAS DISCLOSURE OF ASSET... January 1955 Ma)or Subject: Accounting DISCXDSEm OP A88ET VAWATIONS IN COllPQRATE ANNSAI REPORTS IXI Nature of the Probles Xmnmtories Marbetable Seoarities Xavestseuts PAGE 15 V PixeA Assets VII Iataugible Assets Concise isa Bibliograyhy...

Ponder, Charles Bedford

2012-06-07T23:59:59.000Z

103

An Attack on Centrifugal Costs  

E-Print Network [OSTI]

AN ATTACK ON CENTRIFUGAL COSTS j P. ~,t~~c1ier Mwra~ I Mons'anto ' Alvin, 'ie~as I ABSTRACT Energy conservation in small and medium horse power industrial centrifugal power users has re ceived very little attention to date. Monsanto...

Murray, P. F.

104

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

105

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

106

The information gap in corporate annual reports: evidence from Egypt  

Science Journals Connector (OSTI)

This study explores whether an information gap exists for six types of corporate disclosure in Egypt, where International Accounting Standards (IAS) apply but penalties for non-compliance are limited. It also investigates whether low compliance with mandatory disclosure can be explained by low levels of demand for this type of information among local financial analysts. The results identify a significant gap between actual disclosure practices of companies for various types of disclosure and market perceptions of this practice. Our findings also suggest that low compliance with disclosure requirements in Egypt is not driven by low levels of demand from local financial analysts, because these items of information are perceived as useful for investment decision making.

Omaima A.G. Hassan; Gianluigi Giorgioni; Peter Romilly; David M. Power

2012-01-01T23:59:59.000Z

107

Modeling attacks on physical unclonable functions  

E-Print Network [OSTI]

We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm ...

Ulrich, Ruhrmair

108

How Credit Market Conditions Impact the Effect of Voluntary Disclosure on Firms' Cost of Debt Capital  

E-Print Network [OSTI]

(abundant) suggesting that they value voluntary disclosure from borrowers differentially across credit market regimes. I draw upon the economic and finance literature on credit rationing to test whether the effects of voluntary disclosure on firms' cost...

Scott, Bret

2012-10-19T23:59:59.000Z

109

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

110

BESC Submits 32 Gene Disclosures for Patents | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News Careers Work with ORNL About ORNL Visiting ORNL Events and Conferences Highlights Success Stories Contact Us Index Home | ORNL | Highlights SHARE BESC submits 32 gene disclosures for future patents July 01, 2012 Plant geneticist Wellington Muchero examines phenotypic traits of Populus transgenic lines grown in a greenhouse. The Bioenergy Science Center (BESC) at Oak Ridge National Laboratory (ORNL) is preparing invention disclosures for 32 different genes that can help improve the yield of ethanol from cellulosic biomass. These genes or their variants function to overcome recalcitrance-difficulty in breaking down cellulosic biomass to release sugars. Several members of ORNL's Biosciences Division are submitting disclosures: 16 genes by Wellington Muchero, 10 genes by Udaya Kalluri, and

111

Benchmarking and Disclosure: Lessons from Leading Cities | ENERGY STAR  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Benchmarking and Disclosure: Lessons from Leading Cities Benchmarking and Disclosure: Lessons from Leading Cities Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources

112

LOAN INFORMATION DISCLOSURE RETURN THIS FORM TO: Student Account Assistance  

E-Print Network [OSTI]

references must include a complete name, address, and phone number; include a cell phone number and email address Phone (include area code) Cell phone (include area code) Employer Employer's phone number address Phone (include area code) Cell phone (include area code) Employer Employer's phone number

Amin, S. Massoud

113

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network [OSTI]

and its predecessor EIA-759), the monthly utility electricEIA data (EIA-906 and EIA-759) is imputed for smaller

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

114

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network [OSTI]

fuels (renewables, hydroelectric) represent approximately 9for clean sources like hydroelectric and renewables. As theuse of renewable and hydroelectric generation. Results also

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

115

U-200: Red Hat Directory Server Information Disclosure Security...  

Broader source: Energy.gov (indexed) [DOE]

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

116

Mandatory Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network [OSTI]

. All authors wish to thank seminar participants at the AERE Sessions at the AEA meetings Economists, the AERE sessions at the AAEA meetings, and the ISNIE conference for helpful comments. Special

Delmas, Magali

117

Information Disclosure Policies: Evidence from the Electricity Industry  

E-Print Network [OSTI]

thank seminar participants at the AERE Sessions at the AEAResource Economists, the AERE sessions at the AAEA meetings,thank seminar participants at the AERE Sessions at the AEA

Delmas, Magali A; SHIMSHACK, JAY P; Montes, Maria J.

2007-01-01T23:59:59.000Z

118

Annual Confidential Financial Disclosure Report (OGE Form 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. Cancels DOE N 326.13.

2007-12-20T23:59:59.000Z

119

The original of this document contains information which is subject...  

Broader source: Energy.gov (indexed) [DOE]

*The original of this document contains information which is subject to withholding from disclosure under 5 U.S. C. 552. Such material has been deleted from this copy and...

120

Practical Attacks on Proximity Identification Systems  

E-Print Network [OSTI]

DEFCON ­ eavesdropped RFID at 20 m Confusion ?? RFID type Definition of distances Experimental setup skimming) Relay Attacks Practical Attacks on Proximity Identification Systems ­ p. #12;"Proximity from distance dE Further considerations dRT , Reader Token communication dTR, Token Reader

Hancke, Gerhard

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

122

Injection Technologies for Fault Attacks on Microprocessors  

Science Journals Connector (OSTI)

The fault injection technique we will analyze in detail in Sect.16.3, is the constant under-powering of a computing device. By running the chip with a depleted power supply, the attacker is able to insert transi...

Alessandro Barenghi; Guido M. Bertoni; Luca Breveglieri

2012-01-01T23:59:59.000Z

123

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

124

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

125

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

126

Request from City of Alexandria for Public Disclosure of Documents Related  

Broader source: Energy.gov (indexed) [DOE]

from City of Alexandria for Public Disclosure of Documents from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Docket No. EO-05-01: On behalf of the City of Alexandria, Virginia ("Alexandria"), we submit this request for public disclosure of documents and materials related to Order No. 202-05-3, dated December 20, 2005, in the above-referenced Department of Energy docket and public participation in the implementation of this Order. Alexandria is deeply concerned with this Order and its consequences, both intended and unintended. Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 More Documents & Publications Comments on Department of Energy's Emergency Order To Resume Limited

127

Information sharing for distributed intrusion detection systems  

Science Journals Connector (OSTI)

In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems ... Keywords: Anomaly detection, Denial of service attack, Distributed intrusion detection, Information sharing, Reflector attack

Tao Peng; Christopher Leckie; Kotagiri Ramamohanarao

2007-08-01T23:59:59.000Z

128

PHOENIX NATURAL GAS LIMITED PRICE DETERMINATION REFERENCE Disclosures of interest  

E-Print Network [OSTI]

Member disclosures Martin Cave (Group Chairman) is a joint academic director of a Brussels-based think tank on regulation called CERRE (www.cerre.eu). This has occupied about ten days per year, mostly attending seminars in Brussels with regulators and regulatees. Another joint academic director is Prof C Waddams. They have not collaborated on any research projects, but he has chaired a panel which she was on. He has co-written a general book, or textbook, on regulation, which includes chapters on price control. The index lists three brief references to energy regulation: Baldwin, Cave &

Richard Taylor

2012-01-01T23:59:59.000Z

129

When Utility Bills Attack! | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

130

Responding to chemical attack. Final report  

SciTech Connect (OSTI)

In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

Bagley, R.W.

1991-02-11T23:59:59.000Z

131

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

132

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

133

Quantifying the Attack Surface of a Web Application Thomas Heumann, Jorg Keller Sven Turpe  

E-Print Network [OSTI]

qualitative and quantitative indicators. We propose a multi- dimensional metric for the attack surface of web Introduction Measuring security properties is challenging yet necessary. The need to make informed decisions implies necessity, while the complex and sometimes counter-intuitive nature of security makes measuring

Keller, Jörg

134

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore  

E-Print Network [OSTI]

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore Computer Laboratory consumption of a normal ¢¡£ Read-only Memory(ROM) is simulated in HSPICE. Randomness is later inserted to mask the data-dependent information leakage. A dual-rail version of the ROM is then presented

Moore, Simon

135

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Ning, Peng

136

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power transmis the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Reiter, Michael

137

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

138

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

139

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer ...

Ruhrmair, Ulrich

140

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

operation Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and...

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary  

Broader source: Energy.gov [DOE]

The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public Financial Disclosure Report (OGE 278) filed by the President, the Vice President, and any officer...

142

Annual Confidential Financial Disclosure Report (OGE Form 450 or 450-A)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice address the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designate EJ, EK, and EN.

2003-09-29T23:59:59.000Z

143

Effect of board independence on incentive compensation and compensation disclosure : evidence from Europe  

E-Print Network [OSTI]

My thesis examines how the lack of board-of-director independence affects the structure and disclosure of executive compensation. I find that European companies with more insiders on their boards grant their executives ...

Muslu, Volkan

2005-01-01T23:59:59.000Z

144

Emotional Disclosure Through Journal Writing: Telehealth Intervention for Maternal Stress and MotherChild Relationships  

Science Journals Connector (OSTI)

This study examines emotional disclosure through the activity of journaling as a means of coping with maternal stress associated with parenting a child with disruptive behaviors. Through a randomized control ...

Rondalyn V. Whitney; Gigi Smith

2014-12-01T23:59:59.000Z

145

Dialing Back Disclosure: Best Practices for Balancing Cooperation and Client Interests  

E-Print Network [OSTI]

) requires that parties "meet and confer" regarding issues related to the disclosure of ESI, but the Rule's motion for protective order). 5 Id. See The Sedona Conference®,The Sedona Conference® Cooperation

Oard, Doug

146

Of Jordanian BanksExtent of Disclosure in the annual Reports Ahmed Al-Jayousi  

E-Print Network [OSTI]

1 Abstract Of Jordanian BanksExtent of Disclosure in the annual Reports By Ahmed Al-Jayousi Supervisor Dr. Munir Lutfi Co- Supervisor Dr. Nedal Al-Fayoumi This study aimed to examine the Extent

147

Fatal Chimpanzee Attack in Loango National Park, Gabon  

E-Print Network [OSTI]

Fatal Chimpanzee Attack in Loango National Park, Gabon Christophe Boesch & Josephine Head & Nikki a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found or habituation. Keywords chimpanzees . fatal attack . gabon . intergroup conflict Introduction Chimpanzee social

148

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

149

The Effects of Firm Size, Corporate Governance Quality, and Bad News on Disclosure Compliance  

E-Print Network [OSTI]

://link.springer.com/article/10.1007%2Fs11142-011-9153-8>. Open Access Version: http://kuscholarworks.ku.edu/dspace/. Electronic copy available at: http://ssrn.com/abstract=955922 The effects of firm size, corporate governance quality, and bad news on disclosure compliance... Governance Quality, and Bad News on Disclosure Compliance. Review of Accounting Studies. Publisher's Official Version: Fs11142-011-9153-8>. Open Access Version: http://kuscholarworks.ku.edu/dspace/. Electronic...

Ettredge, Michael L.; Johnstone, Karla; Stone, Mary S.; Wang, Qian

2011-01-01T23:59:59.000Z

150

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

151

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

152

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

153

Cyber Incident Information | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

154

Housing & Residence Education Disclosure of Fire Safety Standards and Measures 1 Campus Fire Safety Right-to-Know  

E-Print Network [OSTI]

Housing & Residence Education Disclosure of Fire Safety Standards and Measures 1 Campus Fire Safety and death resulting from each fire. #12;Housing & Residence Education Disclosure of Fire Safety Standards) -- HVAC fan motor burned up -- Alpha Chi Omega -- 3/13/10 $1,500 (Greek) -- Futon mattress caught fire

Fang, Yuguang "Michael"

155

Housing & Residence Education Disclosure of Fire Safety Standards and Measures 1 Campus Fire Safety Right-to-Know  

E-Print Network [OSTI]

Housing & Residence Education Disclosure of Fire Safety Standards and Measures 1 Campus Fire Safety and death resulting from each fire. #12;Housing & Residence Education Disclosure of Fire Safety Standards) -- Grease Fire -- Beaty Towers -- 9/10/10 $100 (Greek) -- HVAC fan motor burned up -- Alpha Chi Omega -- 3

Slatton, Clint

156

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

157

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia

2014-01-01T23:59:59.000Z

158

Signs of a Heart Attack - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletter & Updates > Safety Meeting Toolkits > Signs of a Heart Attack Newsletter & Updates Health News & InsideOut Newsletter Pandemic Preparedness Diabetes Ergonomic Awareness...

159

Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in  

Broader source: Energy.gov (indexed) [DOE]

Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds The Department of Energy has a policy that individuals with a conflict of interest cannot participate in the technical review of procurement proposals. This certification must be completed by individuals prior to their participation in the pre-application and/or proposal review processes. 1. I will not participate in the review of any pre-application or proposal involving a particular matter that would have a direct and predictable effect on any person, company or organization with which I have a

160

Information Flow for Secure Distributed Applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Information flow for secure distributed applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

162

Attacking Systems ecurity vulnerabilities related to buffer overruns  

E-Print Network [OSTI]

Attacking Systems S ecurity vulnerabilities related to buffer overruns account for the largest exploits that take ad- vantage of the vulnerability to attack a system. The traditional approach and even security profession- als seemingly assume that all buffer overrun exploits operate in a similar

Sekar, R.

163

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

164

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

165

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks  

E-Print Network [OSTI]

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J by an implementation of the relay attack that has been tested on live systems. Once designers appreciate the risk to the smartcard standard, based on a distance bounding protocol, which provides adequate resistance to the relay

Xu, Wenyuan

166

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

167

On the algebraic attack against summation type keystream generators  

Science Journals Connector (OSTI)

The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.

Md. Iftekhar Salam; Hoon-Jae Lee

2012-01-01T23:59:59.000Z

168

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

169

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

170

Determinants of parental satisfaction with a child's disclosure of a gay or lesbian sexual orientation  

E-Print Network [OSTI]

This study was an attempt to begin to understand the phenomenon of coming out from the parental perspective. Specifically, it focused on the factors contained within a childâ??s disclosure of his or her sexual orientation and their impact on a...

Miller, Andrew D

2006-10-30T23:59:59.000Z

171

Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

2007-01-03T23:59:59.000Z

172

B.C. Invention Disclosure Guidelines Do you want to get royalty money from your research?  

E-Print Network [OSTI]

B.C. Invention Disclosure Guidelines Do you want to get royalty money from your research, and bring in licensing royalty sharing with inventors. If you feel your research has any commercial value royalty! Please contact OTTL Director Dr. Jason Wen at jason.wen@bc.edu or (617) 552-1682 and Dr. Jill

Huang, Jianyu

173

Title 20, California Code of Regulations Article 5. Electricity Generation Source Disclosure  

E-Print Network [OSTI]

facility, the sum capacity of which does not exceed 30 megawatts. (4) Solar. For purposes1 Title 20, California Code of Regulations Article 5. Electricity Generation Source Disclosure that a retail seller offers to sell to consumers in California under terms and conditions specific to an offer

174

Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. (Note: It replaces DOE N 326.11, which expired 9-29-05.)

2005-09-30T23:59:59.000Z

175

Selecting the Number of Imputed Datasets When Using Multiple Imputation for Missing Data and Disclosure Limitation  

E-Print Network [OSTI]

Selecting the Number of Imputed Datasets When Using Multiple Imputation for Missing Data and disclosure limitation simultaneously. First, fill in the missing data to generate m completed datasets, then replace confidential values in each completed dataset with r imputations. I investigate how to select m

Reiter, Jerome P.

176

Understanding smart data disclosure policy success: the case of Green Button  

Science Journals Connector (OSTI)

Open data policies are expected to promote innovations that stimulate social, political and economic change. In pursuit of innovation potential, open data has expanded to wider environment involving government, business and citizens. The US government ... Keywords: Green Button, energy efficiency, innovation, open data, smart disclosure

Djoko Sigit Sayogo; Theresa A. Pardo

2013-06-01T23:59:59.000Z

177

PoisonAmplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. ...

Jialong Zhang; Chao Yang; Zhaoyan Xu; Guofei Gu

2012-09-01T23:59:59.000Z

178

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

179

Does topological information matter for power grid vulnerability?  

Science Journals Connector (OSTI)

Power grids which are playing an important role in supporting the economy of a region as well as the life of its citizens could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists their attack strategies might be different. This paper groups power grid information into four levels: no information purely topological information (PTI) topological information with generator and load nodes (GLNI) and full information (including component physical properties and flow parameters information) and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information including PTI GLNI and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples results show that for small attacks with p ? ? ?0.1 CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity then CPI has the largest cost-based information value.

2014-01-01T23:59:59.000Z

180

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

E-Print Network 3.0 - attacks influence driving Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

182

Complex Attack Analysis and Safeguard Selection: a Cost-Oriented Approach.  

E-Print Network [OSTI]

??When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vulnerability. Rather, they achieve their goals by composing attacks and (more)

TANG, SUK WAH CRISTINA

2009-01-01T23:59:59.000Z

183

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware...

Jialong Zhang; Chao Yang; Zhaoyan Xu

2012-01-01T23:59:59.000Z

184

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack the key deriva- tion of IPsec

Paris-Sud XI, Université de

185

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec the confidentiality of other Internet standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack

Fouque, Pierre-Alain

186

Fatal Chimpanzee Attack in Loango National Park, Gabon  

Science Journals Connector (OSTI)

In some populations, chimpanzees engage in lethal aggression within and between social units. We report a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found a...

Christophe Boesch; Josephine Head; Nikki Tagg

2007-10-01T23:59:59.000Z

187

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

188

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

189

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

190

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

191

About EIA - Policies - U.S. Energy Information Administration (EIA)  

Gasoline and Diesel Fuel Update (EIA)

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The Freedom of Information Act, commonly known as the FOIA, was enacted by Congress in 1966 to give the American public improved access to the Federal Government's records. The Electronic Freedom of Information Act Amendments of 1996 expanded the scope of the FOIA to encompass electronic records and require the creation of "electronic reading rooms" to make records more easily and widely available to the public. However, FOIA does set forth nine exemptions under which records (or parts of records) may be exempt from public disclosure. This includes materials exempted from disclosure by other statutes as well as confidential, commercial, and financial information. What types of materials are available without filing a FOIA request?

192

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1, we have built a simulation model using OPNET simulation package, where the attack agents create as in the non-attacked condition. Keywords: Network Security, Denial-of-Service Attack, TCP Flooding, Router

Merat, Francis L.

193

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

194

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars  

E-Print Network [OSTI]

to certain types of relay attacks 1 . Our attack allowed to open and start the car while the true distanceRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris.francillon, boris.danev, srdjan.capkun}@inf.ethz.ch Abstract We demonstrate relay attacks on Passive Keyless Entry

195

Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems  

SciTech Connect (OSTI)

Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

Bri Rolston

2005-09-01T23:59:59.000Z

196

Annual Confidential Financial Disclosure Report (OGE Form 450)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice amends DOE N 326.14 to add exemptions for NNSA employees who are now in pay bands. DOE N 326.14 contains information on who must file, when and where to file.

2008-02-25T23:59:59.000Z

197

Golden Reading Room: FOIA Proactive Disclosures and Contracts  

Office of Energy Efficiency and Renewable Energy (EERE)

Below are electronic versions of Golden Field Office Reading Room documents that were created after November 1, 1996, per the requirements of the Electronic Freedom of Information Act Amendment of...

198

NON-DISCLOSURE AGREEMENT Page 1 of 7  

E-Print Network [OSTI]

as permitted under this Agreement or otherwise in writing by the Discloser; (b) to safeguard such Confidential to safeguard such Confidential Information from unauthorized access, use, and misappropriation and to notify

199

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

200

An online attack against Wiesner's quantum money  

E-Print Network [OSTI]

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Andrew Lutomirski

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Analysis and Defense of Emerging Malware Attacks  

E-Print Network [OSTI]

propose a new scheme, which is named as informed active probing, for large-scale P2P malware analysis and detection. In further, our internet-wide evaluation shows our active probing scheme can successfully detect malicious P2P malware and its...

Xu, Zhaoyan

2014-05-28T23:59:59.000Z

202

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

203

Engineering On-Chip Thermal Attacks  

E-Print Network [OSTI]

we make it? · Temperature profile on an FPGA over 1 day · On-chip temperature measurement · We 2006 #12;Can information be more covert? · Detecting Temperature events on an FPGA · SNR of 24-hour ­Processing load · Digital RO cannot be alias-free tTs fs 2fs f #12;Our communications system f f Heat Source

Schaumont, Patrick

204

Price Disclosure, Marginal Abatement Cost Information and Market Power in a Bilateral GHG Emissions Trading Experiment  

Science Journals Connector (OSTI)

Against the global warming, the discussion on how to control the total amount of greenhouse gases (GHGs) has started among countries in the ... which was the first agreement on the quantified GHG emission limita...

Yoichi Hizen; Tatsuyoshi Saijo

2002-01-01T23:59:59.000Z

205

SAN FRANCISCO CAMPUS POLICY GOVERNING DISCLOSURE OF INFORMATION FROM STUDENT RECORDS  

E-Print Network [OSTI]

, test scores and other academic records, general counseling and advising records, disciplinary records interpretations of those laws and to protect the student's right of privacy as guaranteed by the Constitution

Mullins, Dyche

206

Disclosure of Energy Operating Cost Information: A Silver Bullet for Overcoming the Energy-Efficiency Gap?  

Science Journals Connector (OSTI)

Consumers frequently act contrary to rational economic theory by overvaluing an initially higher purchase price while heavily discounting future energy operating costs. One opportunity to help limit the scale ......

Stefanie Lena Heinzle

2012-03-01T23:59:59.000Z

207

Session H--NEPA Disclosure of Air Quality Impacts--Ahuja, Perrot USDA Forest Service Gen. Tech. Rep. PSW-GTR-189. 2008.  

E-Print Network [OSTI]

Session H--NEPA Disclosure of Air Quality Impacts--Ahuja, Perrot USDA Forest Service Gen. Tech. Rep. PSW-GTR-189. 2008. . 193 National Environmental Policy Act Disclosure of Air Quality Impacts air quality and has the potential to impact human health and quality of life. Public concern about

Standiford, Richard B.

208

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

209

Energy Attacks and Defense Techniques for Wireless Systems  

E-Print Network [OSTI]

systems, where energy is the most critical constraint to life- time and reliability. We for the first time propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden Security Keywords Wireless security, hardware Trojan, leakage energy 1. INTRODUCTION Wireless communication

Potkonjak, Miodrag

210

Generalized watermarking attack based on watermark estimation and perceptual remodulation  

E-Print Network [OSTI]

on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise image statistics to perform the best watermark removal or damage. The proposed attack is based and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; b) watermark alteration

Genève, Université de

211

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

212

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

213

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

214

Measuring Topological Robustness of Networks under Sustained Targeted Attacks  

Science Journals Connector (OSTI)

In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network ... Keywords: complex networks, robustness, social networks

Mahendra Piraveenan; Shahadat Uddin; Kon Shing Kenneth Chung

2012-08-01T23:59:59.000Z

215

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

216

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

that could deplete IMD resources (e.g., battery power) quickly. The RD attacks could reduce the lifetime are powered by a non-rechargeable battery and replacing the battery requires surgery. Re-charging an IMD from an external RF electromagnetic source causes thermal effects in the organs and thus is not recommended. Unlike

Wu, Jie

217

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

218

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

219

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

220

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network [OSTI]

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

222

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

223

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......of dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...Support System for Nuclear Emergency Management...Hazard Release Risk Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

224

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...potentially security sensitive...System for Nuclear Emergency...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

225

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

226

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

227

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

228

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

229

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle

Diem, Claus

230

Certification and Accreditation Process for Information Systems Including National Security Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

231

Governments' and Terrorists' Defense and Attack in a T-Period Game  

Science Journals Connector (OSTI)

We analyze how a government allocates its resources between attacking to downgrade a terrorist's resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government's asset and defending ... Keywords: conflict, contest success function, dynamics, game theory, multiple-period game, terror capacity, terrorism, threat

Kjell Hausken; Jun Zhuang

2011-03-01T23:59:59.000Z

232

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato  

E-Print Network [OSTI]

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

233

An attack on CFB mode encryption as used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to determine 16 bits of any block of plaintext with about 215 oracle ... Keywords: OpenPGP, chosen-ciphertext attacks, cipher-feedback mode, encryption

Serge Mister; Robert Zuccherato

2005-08-01T23:59:59.000Z

234

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

235

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering  

E-Print Network [OSTI]

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks without stuttering. The attack takes around O(285 ) CPU clocks with 278 keystream observations. Keywords

236

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

237

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

238

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

239

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ... Keywords: Attacker intent and strategy modeling, attack strategy inference, game theory

Peng Liu; Wanyu Zang; Meng Yu

2005-02-01T23:59:59.000Z

240

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Ice slurry technology can save heart attack victims, surgery patients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

242

Argonne applied mathematicians use INCITE awards to attack energy problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

243

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

244

Secondary Prevention after Ischemic Stroke or Transient Ischemic Attack  

Science Journals Connector (OSTI)

...-pressure lowering depend on the particular class of antihypertensive drugs or simply on the antihypertensive effect of all such drugs remains controversial, although most of the evidence appears to support the latter. The PROGRESS trial showed a greater reduction in the risk of stroke and other vascular... This article reviews recommended strategies to reduce the risk of a subsequent stroke in patients with a history of transient ischemic attack (TIA) or stroke.

Davis S.M.; Donnan G.A.

2012-05-17T23:59:59.000Z

245

Factors contributing to resistance of cotton to pink bollworm attack  

E-Print Network [OSTI]

cage used in the anti?biosis s t u d y . . . . . . . . . . . . . . . . 5 ? 0 Appendix II. Figure 1* Pink bollworm emergence data, College Station, Texas ,19f?6-195>8. . 1^2 FACTORS CONTRIBUTING TO RESISTANCE OF COTTON TO PINK BOLLWORM ATTACK... hybrids resulting from crosses of aphid- resistant and susceptible cantaloupes were resistant and that the F2 progeny were three-fourths resistant and one- fourth susceptible* This typical Mendellan ratio indicates that resistance was due to a single...

Williams, Robert Kenneth

2013-10-04T23:59:59.000Z

246

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

247

User-centric identity as a service-architecture for eIDs with selective attribute disclosure  

Science Journals Connector (OSTI)

Unique identification and secure authentication of users are essential processes in numerous security-critical areas such as e-Government, e-Banking, or e-Business. Therefore, many countries (particularly in Europe) have implemented national eID solutions ... Keywords: Austrian eID, authentication, citizen card, cloud computing, identity management, privacy, public cloud, selective attribute disclosure

Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer

2014-06-01T23:59:59.000Z

248

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon  

E-Print Network [OSTI]

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon populations. Module 1 The Psychological Effects of Terror 1. Terror as a Strategy of Psychological Warfare against the Masses 2. Mental Health

Rhode Island, University of

249

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

250

The effect of self-disclosure and empathic responding on intimacy: testing an interpersonal process model of intimacy using an observational coding system  

E-Print Network [OSTI]

the evidence for the interpersonal process model of intimacy described by Reis and Shaver (1988), which proposes that self-disclosure and empathic responding are the basis of intimate interactions. The sample consisted of 108 community couples who completed...

Mitchell, Alexandra Elizabeth

2007-09-17T23:59:59.000Z

251

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

252

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

253

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

254

Global Framework for Climate Risk Exposure | Open Energy Information  

Open Energy Info (EERE)

Framework for Climate Risk Exposure Framework for Climate Risk Exposure Jump to: navigation, search Tool Summary Name: Global Framework for Climate Risk Exposure Agency/Company /Organization: United Nations Environment Programme Topics: Finance, Co-benefits assessment, Market analysis Resource Type: Publications, Guide/manual Website: www.unepfi.org/fileadmin/documents/global_framework.pdf Global Framework for Climate Risk Exposure Screenshot References: Global Framework for Climate Risk Exposure[1] Summary "A group of leading institutional investors from around the world released the Global Framework for Climate Risk Disclosure-a new statement on disclosure that investors expect from companies-in October 2006. Investors require this information in order to analyze a company's business risks and opportunities resulting from climate change, as well as

255

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

256

Cyber Security Incidents, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

257

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

258

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table... are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table...

Ramanathan, Anu

2012-06-07T23:59:59.000Z

259

E-Print Network 3.0 - amyloid oxidative attack Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: amyloid oxidative attack Page: << < 1 2 3 4 5 > >> 1 Brain Research Reviews 43 (2003) 164178 www.elsevier.comlocatebrainresrev Summary: to...

260

Effect of Tricalcium Silicate Content on Expansion in Internal Sulfate Attack.  

E-Print Network [OSTI]

??The purpose of this study was to determine the cementitious parameters and placement temperature that impact internal sulfate attack in concrete. Concrete structures make up (more)

Whitfield, Troy T.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

262

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

263

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

264

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

265

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

266

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

267

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

268

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

269

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

270

Measurement of attacks and interferences with health care in conflict: validation of an incident reporting tool for attacks on and interferences with health care in eastern Burma  

Science Journals Connector (OSTI)

Attacks on health care in armed conflict and other civil disturbances, including those on health workers, health facilities, patients and health transports, represent a critical yet often overlooked violation ...

Rohini J Haar; Katherine HA Footer; Sonal Singh; Susan G Sherman

2014-11-01T23:59:59.000Z

271

An ab initio investigation into the SN2 reaction: Frontside attack versus backside attack in the reaction of F? with CH3F  

Science Journals Connector (OSTI)

The energy hypersurface for the attack of fluoride ion on methyl fluoride has been explored with ab initio LCAO-SCF calculations at a split-valence basis set level. Transition states for frontside and backside at...

H. Bernhard Schlegel; Kurt Mislow; Fernando Bernardi

1977-01-01T23:59:59.000Z

272

Executive Order 12968 Access to Classified Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

273

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

274

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

275

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

276

Digital image watermarking resistant to geometric and removal attacks in the wavelet transform domain  

E-Print Network [OSTI]

,2]. The watermark is embedded in the image additively, in the difficulty. g · Translation · Row and column removalDigital image watermarking resistant to geometric and removal attacks in the wavelet transform watermarking scheme resistant to various commonly used removal attacks. g p y watermark image will still

Qi, Xiaojun

277

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

Bencsáth, Boldizsár

278

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

Düntsch, Ivo

279

Framework for using grocery data for early detection of bio-terrorism attacks  

E-Print Network [OSTI]

Framework for using grocery data for early detection of bio-terrorism attacks #3; Anna Goldenberg 15213 anya@cmu.edu October 16, 2001 Abstract Early detection of epidemics and bio-terrorism attacks. The main goal of this project is to investigate the possibility of detecting epidemics and bio-terrorism

Goldenberg, Anna

280

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H, the TCP poriion of the bandwidth can be protected. In simulation study, thefilter successfily blocked 99 SYN flooding may be blocked on the server side [1][2][6], the link bandwidth exhaustion attack must

Chao, Jonathan

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

282

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad ... Keywords: attack prediction, computer security, game theory

Peng Liu; Wanyu Zang

2003-10-01T23:59:59.000Z

283

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

284

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

285

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-08-03T23:59:59.000Z

286

A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks  

SciTech Connect (OSTI)

The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

2008-02-01T23:59:59.000Z

287

THE ANALYSYS OF INFORMATION IMPACTS IN COORDINATING DEFENCE AGAINST MALICIOUS ATTACKS FOR INTERCONNECTED  

E-Print Network [OSTI]

and the physical behaviors of power systems. Secondly, system operators are assumed able to perform certain-ordination of Transmission of Electricity) operation handbook [6]. Meanwhile, multi-agent systems (MAS) have been widely FOR INTERCONNECTED POWER SYSTEMS Ettore Bompard George Gross Roberto Napoli Fei Xue Politecnico di Torino University

Gross, George

288

INFORMATION SECURITY ATTACK TREE MODELING An Effective Approach for Enhancing Student Learning  

E-Print Network [OSTI]

the engineering principle of Failure Mode and Effect Analysis (FMEA). The main goal of this principle, the project plan can be created more realistically. FMEA techniques [1] help to identify failure potential

289

Quantifying information leakage in document redaction  

Science Journals Connector (OSTI)

In this paper, we examine ways in which sensitive information might leak through the process of redaction. Such attacks apply known methods from document image analysis and natural language processing to recover text thought to have been obliterated ... Keywords: character shape coding, classified documents, document analysis, document redaction

Daniel Lopresti; A. Lawrence Spitz

2004-11-01T23:59:59.000Z

290

Scaling property and opinion model for interevent time of terrorism attack  

E-Print Network [OSTI]

The interevent time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows it follows a scale-free property. In order to understand the dynamic mechanism of such statistic feature, an opinion dynamic model with memory effect is proposed on a two-dimension lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter of the system reaches a critical value. Ultimately, the model reproduces the same statistical property as the empirical data and gives a good understanding of terrorism attack.

Zhu, Jun-Fang; Wang, Bing-Hong

2009-01-01T23:59:59.000Z

291

An information theoretic framework for web inference detection  

Science Journals Connector (OSTI)

Document redaction is widely used to protect sensitive information in published documents. In a basic redaction system, sensitive and identifying terms are removed from the document. Web-based inference is an attack on redaction systems whereby the redacted ... Keywords: document redaction, inference detection, information theory, web-based inference detection

Hoi Le Thi; Reihaneh Safavi-Naini

2012-10-01T23:59:59.000Z

292

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

293

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

294

Optimal power grid protection through a defenderattackerdefender model  

Science Journals Connector (OSTI)

Abstract Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defenderattackerdefender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attackerdefender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defenderattackerdefender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

Wei Yuan; Long Zhao; Bo Zeng

2014-01-01T23:59:59.000Z

295

E-Print Network 3.0 - attack model development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: for the development of realistic models of DoS traffic, can be packaged as an automated tool to aid in rapid response... to detect and re- spond to attacks quickly....

296

An Attack on CFB Mode Encryption as Used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP...15 oracle queries for the initial setup work and 215 oracle queries for each block. S...

Serge Mister; Robert Zuccherato

2006-01-01T23:59:59.000Z

297

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

298

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks  

Science Journals Connector (OSTI)

Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet. Its distributed and cooperative nature makes i...

Angelo Furfaro; Pasquale Pace; Andrea Parise

2014-01-01T23:59:59.000Z

299

Antibiosis and Preferences as Factors in the Resistance of Certain Cottons to Pink Bollworm Attack  

E-Print Network [OSTI]

of resistance in this host-parasite relationship. There are sevezal economicaUy important paste attacking cotton. Resistant qualities have been demonstrated 1n certain varieties aga1nst sevezal of these pasta. Isely (1935) reported that cotton bo...

Reed, David Kent

1960-01-01T23:59:59.000Z

300

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Ettringite Fly ash Microstructural studies Sulfate attack a b s t r a c t A conventional solution in reducing of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Proactive Intrusion Prevention and Response via Attack Graphs Steven Noel and Sushil Jajodia  

E-Print Network [OSTI]

triage and after-the-fact remediation. This chapter examines proactive methods of attack risk reduction for optimal countermeasures. This chapter describes the latest advances in an innovative proactive approach

Noel, Steven

302

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

303

Financial Conflict of Interest Information Financial Conflict of Interest Information  

E-Print Network [OSTI]

requires that sponsored travel be included in the disclosure, regardless of value. This does not, however their disclosure within 30 days of the occurrence of a new reportable financial interest(s). In order to maintain University, requires mandatory Training for all "Investigators" meaning "the project director or principal

Raina, Ramesh

304

A National Survey of Stress Reactions after the September 11, 2001, Terrorist Attacks  

Science Journals Connector (OSTI)

...population represented in the March 2001 Current Population Survey, our sample slightly overrepresented women, non-Hispanic whites, and persons with higher levels of education and household income, which is typical of samples selected by means of random-digit dialing. As a sensitivity analysis, we repeated... After the September 11 terrorist attacks, Americans experienced symptoms of psychological stress. This survey of U.S. adults performed just five days after the attacks quantifies the extent of the stress reactions.

Schuster M.A.; Stein B.D.; Jaycox L.H.

2001-11-15T23:59:59.000Z

305

A Study on Wi-Fi Hacking Attack Using Web  

Science Journals Connector (OSTI)

Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. The...

Jin-Young Song; Dea-Woo Park

2011-01-01T23:59:59.000Z

306

Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes  

SciTech Connect (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hall, Dr. Linda [ENVIRON International Corporation; Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

307

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

308

Classified STI Products | Scientific and Technical Information Program  

Office of Scientific and Technical Information (OSTI)

Classified STI Products Classified STI Products Print page Print page Email page Email page The Atomic Energy Act of 1954, as amended, and Executive Order 13526 serves as the basis for identifying classified information generated by the Department. Classified information is defined as certain information that the United States Government has determined requires protection against unauthorized disclosure for reasons of national security (i.e., Restricted Data, Formerly Restricted Data, and National Security Information). Caveats and special control markings are placed on documents to identify special handling or dissemination requirements, or to assist in describing the type of information involved. (Refer to CMPC Marking Resource, Examples of Acceptably Marked Classified or Controlled Matter (PDF, 5.1MB)

309

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

310

Attacking Tor through Unpopular Ports Muhammad Aliyu Sulaiman  

E-Print Network [OSTI]

Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia muhalisu@kfupm.edu.sa Sami Zhioua Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran of relays (Tor node and Tor relay are used interchangeably in this paper). No one of these The authors would

Almulhem, Ahmad

311

Trojan-horse attacks threaten the security of practical quantum cryptography  

E-Print Network [OSTI]

A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

Nitin Jain; Elena Anisimova; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-06-23T23:59:59.000Z

312

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

313

Information for Department Employees and Program Offices | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information for Department Employees and Program Offices Information for Department Employees and Program Offices Information for Department Employees and Program Offices Copyrights A copyright is a federal right owned by every author to exclude others from reproducing, adapting, distributing, performing in public or displaying in public a work created by that author. However, works prepared by government employees as part of their official duties are not subject to copyright protection in the United States. See www.copyright.gov or www.cendi.gov for more information. For general guidance on the use of copyrighted materials by DOE employees please see our guidance on Use of Copyrighted Materials by Government Employees. The Office also reviews and prepares speaker release for DOE employees and counsel Departmental elements on non-disclosure

314

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

315

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

316

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

317

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

318

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack  

Science Journals Connector (OSTI)

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-06-24T23:59:59.000Z

319

Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack  

E-Print Network [OSTI]

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-02-01T23:59:59.000Z

320

Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation  

SciTech Connect (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. We show that - for protocols that use quantum channels of any dimension and completely characterize them by state tomography - the noise threshold for classical advantage distillation of a specific kind is substantially lower than the threshold for quantum entanglement distillation if the eavesdropper can perform powerful coherent attacks. In marked contrast, earlier investigations had shown that the thresholds are identical for incoherent attacks on the same classical distillation scheme. It remains an open question whether other schemes for classical advantage distillation have higher thresholds for coherent eavesdropping attacks.

Kaszlikowski, Dagomir; Lim, J.Y.; Englert, Berthold-Georg [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Kwek, L.C. [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); National Institute of Education, Nanyang Technological University, Singapore 639798 (Singapore)

2005-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Predicting the effect of climate change on wildfire behavior and initial attack success  

SciTech Connect (OSTI)

This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

2007-12-01T23:59:59.000Z

322

Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems  

E-Print Network [OSTI]

Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2007-04-24T23:59:59.000Z

323

Interested in More Information?  

E-Print Network [OSTI]

of depression/anxiety may increase risk of heart attack · Depression symptoms and cardiac symptoms may be difficult to distinguish. · Depression may occur after a heart attack · Untreated depression may worsen symptoms of heart conditions · Treating depression after a heart attack may improve treatment response

324

GHGMI-Training Courses | Open Energy Information  

Open Energy Info (EERE)

GHGMI-Training Courses GHGMI-Training Courses Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GHGMI-Training Courses Agency/Company /Organization: Greenhouse Gas Management Institute (GHGMI) Sector: Climate Focus Area: Non-renewable Energy, Energy Efficiency, Forestry, Agriculture Topics: GHG inventory Resource Type: Training materials User Interface: Website Website: ghginstitute.org/education/courses/ Cost: Paid GHGMI-Training Courses Screenshot References: GHGMI-Training Courses[1] Logo: GHGMI-Training Courses Courses include: 101 Introduction to Climate Change 102 Introduction to Carbon Markets 201 Basics of Organizational GHG Accounting 202 Basics of Project-Level GHG Accounting 211 GHG Information Management Systems 251 Corporate Climate Change Risk Disclosure: Investor CDP

325

Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks Lan Wang, Qishi Wu, Yaoqing Liu  

E-Print Network [OSTI]

, yliu6}@memphis.edu Abstract--A recent trend in Internet denial-of-service attacks is to distribute of the Internet makes DoS defense a very challenging task. The goal of our work is to protect legitimate flows on hosts, as those hosts controlled by attackers are going to abuse the trust. In this paper, we flesh out

Wang, Lan

326

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States  

E-Print Network [OSTI]

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2

Wang, Hai

327

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry Abstract--This paper explores distributed smart grid attack strategies to destabilize power system

Kundur, Deepa

328

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Broader source: Energy.gov (indexed) [DOE]

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

329

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter  

E-Print Network [OSTI]

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

Cao, Xiaojun (Matt)

330

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid  

E-Print Network [OSTI]

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid Wenkai Wang, Qiao Cai Department, Stevens Institute of Technology, Hoboken, NJ 07030 Abstract--The power grid network is a complex of power grid in terms of cascading failures caused by node failures. Specifically, we define three metrics

Sun, Yan Lindsay

331

Dynamic pharming attacks and locked same-origin policies for web browsers  

Science Journals Connector (OSTI)

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based ... Keywords: pharming, same-origin policy, web authentication

Chris Karlof; Umesh Shankar; J. D. Tygar; David Wagner

2007-10-01T23:59:59.000Z

332

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

333

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

334

A Proposal of QLearning to Control the Attack of a 2D Robot Soccer Simulation Team  

Science Journals Connector (OSTI)

This document presents a novel approach to control the attack behavior of a team of simulated soccer playing robot of the Robocup 2D category. The presented approach modifies the behavior of each player only when in the state "controlling the ball". ... Keywords: Simulated robot soccer, machine learning, learning, Q-Learning algorithm

Jose Rodrigo Ferreira Neri; Maicon Rafael Zatelli; Carlos Henrique Farias dos Santos; Joao Alberto Fabro

2012-10-01T23:59:59.000Z

335

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve  

E-Print Network [OSTI]

Engineering, University College Cork Email: {andrewb,liam,francisc}@rennes.ucc.ie LIRMM, CNRS - Univ, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy. The protected double and add algorithm provides a simple solution to this problem but is costly in terms

Paris-Sud XI, Université de

336

The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC  

E-Print Network [OSTI]

Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

California at Davis, University of

337

"How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks  

E-Print Network [OSTI]

"How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

Gelman, Andrew

338

Trojan horse attack free fault-tolerant quantum key distribution protocols  

Science Journals Connector (OSTI)

This work proposes two quantum key distribution (QKD) protocols--each of which is robust under one kind of collective noises--collective-dephasing noise and collective-rotation noise. Due to the use of a new coding function which produces error-robust ... Keywords: Collective noise, GHZ state, Quantum cryptography, Quantum key distribution, Trojan horse attack

Chun-Wei Yang; Tzonelih Hwang

2014-03-01T23:59:59.000Z

339

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

340

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

disturbances. I. INTRODUCTION The smart grid promises increased capacity, security and re- liability through smart grid is challenging on several fronts. Asset own- ers must understand how to best prioritize reliability metrics are then employed to characterize the effects of the attack. Such approaches are valuable

Kundur, Deepa

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin  

E-Print Network [OSTI]

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O¨urich, Switzerland srdjan.capkun@inf.ethz.ch Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses

342

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)  

E-Print Network [OSTI]

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack Abstract A widespread security claim of the Bitcoin system, presented in the original Bitcoin white, as the distributed Bitcoin network is ideally supposed to be. Propagation of the at- tacker's block can

343

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

344

A Denial of Service Attack against Fair Computations using Bitcoin Deposits  

E-Print Network [OSTI]

A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

345

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...a powdery form. Once...of poorly crystalline calcium silicate...and well-crystalline phases...containment of nuclear waste. Applying...conducted in accelerated conditions...attack. Chemical Reaction in...matrix, the chemical reactions with...because of aging of the binding...confirming the form of the...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

346

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...was associated with the formation of ettringite crystals [Ca 6 Al 2 (OH) 12 (SO 4 ) 3...bacillus. During sulfate attack, ettringite is often formed from the monosulfate...the aluminate ions in the formation of ettringite. The reaction to generate ettringite...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

347

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and lim- ited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

348

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

349

Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective  

E-Print Network [OSTI]

with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

Politècnica de Catalunya, Universitat

350

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed  

E-Print Network [OSTI]

detection is an essential to minimize the damage of distributed denial of services (DDoS) attacks. However of the flooding traffic [13, 20]. Unfortunately, damages have already been caused when consequences are observed Experimentation and Test, in conjunction with USENIX Security Symposium, Boston, MA. August 6-7, 2007

Chen, Yu

351

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks*  

E-Print Network [OSTI]

can work cooperatively to raise early warning to avoid catastrophic damages. This paper proposes) mechanism to enable early detection of DDoS attacks on community networks. We want to detect flooding. * Manuscript submitted on March 10, 2006 to the IEEE International Symposium on Collaborative Technologies

Chen, Yu

352

Practical Attacks on Proximity Identification Systems (Short Paper) Gerhard P. Hancke  

E-Print Network [OSTI]

of relay and eavesdropping attacks on RFID de- vices they don't always describe implementations or show 1 a contactless smart card system and simulated the distances achievable for readertoken and tokenreader communication in the context of a relay at- tack. As discussed in section 2, RFID is a general term for any near

Hancke, Gerhard

353

Distributed Internet-based Load Altering Attacks against Smart Power Grids  

E-Print Network [OSTI]

to cause circuite overflow or other malfunctions and damage the power system equipments. To gain insights-intrusion attempt may target any sector in a power system: generation, distribution and control, and consumption as shown in Fig. 1. A Type I cyber-attack targets power plants and aims in disrupting or taking over

Mohsenian-Rad, Hamed

354

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network [OSTI]

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Zhou, Yuanyuan

355

INFORMATION SECURITY:  

Science Journals Connector (OSTI)

......of the top four risks to the UK. The...used as a form of political protest. The UK...the 650 million investment through the National...the considerable investment by the government...and development, risk analysis, policy...attacks, as a form of political protest, has become......

Cyber Security Skill Shortages

2012-01-01T23:59:59.000Z

356

Alcohol Quantity and Type on Risk of Recurrent Gout Attacks: An Internet-based Case-crossover Study  

Science Journals Connector (OSTI)

AbstractObjectives Although beer and liquor have been associated with risk of incident gout, wine has not. Yet anecdotally, wine is thought to trigger gout attacks. Further, how much alcohol intake is needed to increase the risk of gout attack is not known. We examined the quantity and type of alcohol consumed on risk of recurrent gout attacks. Methods We conducted a prospective Internet-based case-crossover study in the US among participants with gout and who had at least one attack during the 1 year of follow-up. We evaluated the association of alcohol intake over the prior 24 hours as well as the type of alcoholic beverage with risk of recurrent gout attack, adjusting for potential time-varying confounders. Results This study included 724 participants with gout (78% men, mean age 54 years). There was a significant dose-response relationship between amount of alcohol consumption and risk of recurrent gout attacks (P gout attack was 1.36 (95% confidence interval [CI], 1.00-1.88) and 1.51 (95% CI, 1.09-2.09) times higher for >1-2 and >2-4 alcoholic beverages, respectively, compared with no alcohol consumption in the prior 24 hours. Consuming wine, beer, or liquor was each associated with an increased risk of gout attack. Conclusions Episodic alcohol consumption, regardless of type of alcoholic beverage, was associated with an increased risk of recurrent gout attacks, including potentially with moderate amounts. Individuals with gout should limit alcohol intake of all types to reduce the risk of recurrent gout attacks.

Tuhina Neogi; Clara Chen; Jingbo Niu; Christine Chaisson; David J. Hunter; Yuqing Zhang

2014-01-01T23:59:59.000Z

357

NRT is currently for adults (18 or older) and not approved for use in pregnancy or for persons with active chest pain or a recent heart attack.  

E-Print Network [OSTI]

with active chest pain or a recent heart attack. Nicotine Replacement Therapy What strength do I use? What

MacAdam, Keith

358

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

SciTech Connect (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

359

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems  

Science Journals Connector (OSTI)

Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attacknamely, the time-shift attackagainst a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (?4%) to break the security of the system. Eves success is due to the well-known detection efficiency loophole in the experimental testing of Bells inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2008-10-28T23:59:59.000Z

360

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Broader source: Energy.gov (indexed) [DOE]

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users |  

Broader source: Energy.gov (indexed) [DOE]

5: HP IBRIX X9000 Storage Discloses Information to Remote Users 5: HP IBRIX X9000 Storage Discloses Information to Remote Users U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users October 5, 2012 - 6:00am Addthis PROBLEM: HP IBRIX X9000 Storage Discloses Information to Remote Users PLATFORM: Version(s): IBRIX X9000; 6.1.196, 6.1.210, 6.1.228, 6.1.243, 6.1.247, 6.1.249, 6.1.251 ABSTRACT: A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. reference LINKS: HP Security Bulletin: c03510876 SecurityTracker Alert ID: 1027590 CVE-2012-3266 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted JLS-compressed image file that, when loaded by the target user, will trigger a heap overflow in the

362

Effect of aerodynamic uncertainties on unconventional lateral control at high angle of attack  

E-Print Network [OSTI]

EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATERAL CONTROL AT HIGH ANGLE OF ATTACK A Thesis by BOB GENSEN ELLER Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December 1987 Major Subject: Aerospace Engineering EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATEHAI CONTROL AT HIGH ANGI. E (&F A'I'TACK A Thesis by BOB GENSEN ELLER Approved as to style and content by: Donald T...

Eller, Bob Gensen

1987-01-01T23:59:59.000Z

363

SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER DISCLOSURE FILE NO. DI-10-1231: ALLEGATIONS REGARDING WESTERN AREA POWER ADMINISTRATION'S DESERT SOUTHWEST REGION, OAS-SR-11-01  

Broader source: Energy.gov (indexed) [DOE]

SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER SPECIAL INQUIRY ON OFFICE OF SPECIAL COUNSEL WHISTLEBOLOWER DISCLOSURE FILE NO. DI-10-1231: ALLEGATIONS REGARDING WESTERN AREA POWER ADMINISTRATION'S DESERT SOUTHWEST REGION, OAS-SR-11-01 The U.S. Office of Special Counsel requested the Department investigate a whistleblower disclosure that employees at the Western Area Power Administration's Desert Southwest Region engaged in conduct that constituted violation of law, rule or regulation; gross mismanagement; and gross waste of funds. Specifically, the disclosure alleged that Western had (a) improperly provided 90 megawatts per hour of free electric transmission to a full-service energy provider; and (b) violated Federal Energy Regulatory Commission Orders by continuing to allow the energy provider to receive free transmission. Our review did not substantiate the allegations.

364

Protecting Buildings From a Biological or Chemical Attack: actions to take  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

365

Project liberty: a public health response to New Yorkers' mental health needs arising fromthe World Trade Center terrorist attacks  

Science Journals Connector (OSTI)

The September 11th terrorist attacks had a dramatic impact on the mental health of millions of Americans. The impact was particularly severe in New York City and surrounding areas within commuting distance of the...

Mr. Chip J. Felton MSW

2002-09-01T23:59:59.000Z

366

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network [OSTI]

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

367

Are markets for vulnerabilities effective?  

Science Journals Connector (OSTI)

Current reward structures in security vulnerability disclosure may be skewed toward benefitting nefarious usage of vulnerability information rather than responsible disclosure. Recently suggested market-based mechanisms offer incentives to responsible ... Keywords: information security, information technology policy, vulnerability disclosure

Sam Ransbotham; Sabyaschi Mitra; Jon Ramsey

2012-03-01T23:59:59.000Z

368

Information Cartography 1 Information Cartography  

E-Print Network [OSTI]

Information Cartography 1 Information Cartography · The use of Geographic Information Systems (GIS) to visualize non- geographic data · Utilizes Geographic Information Science to develop models and organize information--not an art form · Used to build information maps. Information maps consist of a landscape (base

Old, L. John

369

A multidimensional approach to information security risk management using FMEA and fuzzy theory  

Science Journals Connector (OSTI)

Abstract Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure.

Maisa Mendona Silva; Ana Paula Henriques de Gusmo; Thiago Poleto; Lcio Camara e Silva; Ana Paula Cabral Seixas Costa

2014-01-01T23:59:59.000Z

370

Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking  

E-Print Network [OSTI]

and Ramamohanarao [18] propose a marking scheme wherein routers mark the packets with a adjusted probability. The packet marking probability is inversely proportional to the number of hops of the router from the source of the packet. The marking probability..., Peng, Leckie and Ramamohanarao [18] propose a mark- ing probability, pd = 1/d, where d is the distance (number of hops) of the router from the source of the packet. Assume an attack path of length k. By this we mean that there are k routers...

Dube, Raghav

2005-02-17T23:59:59.000Z

371

Dynamic safeguard assessment of terror attacks using system dynamics method for nuclear power plants  

Science Journals Connector (OSTI)

For the minimisation of the damage in possible terror attacks on the nuclear power plants and other nuclear facilities, a dynamic assessment is performed in the aspects of nuclear safeguard. The incidents against nuclear facilities are modelled by the time-step scenario. Several cases are explained for the illicit trafficking of radioactive material. The dynamic simulation is examined by the system dynamics method. In the modelling, there are three major models that include the nuclear insider terror, the reaction control and the nuclear forensic steps. The risk increases slowly and decreases rapidly in the result. This is the similar pattern of the September 2001 terror where many lives were lost.

Tae-Ho Woo; Un-Chul Lee; Yun-Il Kim

2010-01-01T23:59:59.000Z

372

Prediction of forces and moments on finned bodies at high angle of attack in transonic flow  

SciTech Connect (OSTI)

This report describes a theoretical method for the prediction of fin forces and moments on bodies at high angle of attack in subsonic and transonic flow. The body is assumed to be a circular cylinder with cruciform fins (or wings) of arbitrary planform. The body can have an arbitrary roll (or bank) angle, and each fin can have individual control deflection. The method combines a body vortex flow model and lifting surface theory to predict the normal force distribution over each fin surface. Extensive comparisons are made between theory and experiment for various planform fins. A description of the use of the computer program that implements the method is given.

Oberkampf, W. L.

1981-04-01T23:59:59.000Z

373

Evaluating the exploration efficiency of oil and gas firms using SFAS 69 supplemental disclosures  

Science Journals Connector (OSTI)

Investors and other users of financial statements often analyze financial statement information to evaluate the exploration efficiency of oil and gas firms. One approach commonly employed is to calculate an average per-unit cost of finding and developing oil and gas reserves using data disclosed by oil and gas firms in the footnotes to their financial statements. These average finding costs ratios, while widely used, are by no means universally accepted as providing meaningful insight into the exploration efficiency and potential profitability of an oil and gas firm. In fact, a number of financial analysts who specialize in oil and gas firms have argued that these finding costs ratios in fact provide no useful insights into how well a company has done. The purpose of our paper is to evaluate the usefulness of these finding costs measures as indicators of exploration efficiency and potential profitability. Our approach involves comparing the statistical association between various finding costs measures to a benchmark measure of exploration efficiency derived from a Cobb-Douglas regression. We also compare these finding costs measures to two commonly used financial statement measures of profitabilityreturn on sales and return on assetsto evaluate whether finding costs are useful as indicators of profitability. Our results indicate that finding costs ratios calculated from readily available financial statement data provide useful insight into both exploration efficiency and the potential profitability of an oil and gas firm. Our findings are important because they provide empirical evidence useful in resolving a debate within the financial analyst community concerning the utility of these finding costs ratios.

Charles E. Boynton IV; Jeffery P. Boone; Teddy L. Coe

1999-01-01T23:59:59.000Z

374

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect (OSTI)

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: Decision-making, prioritization, and command and control Public health/medical services Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: Local representation in the Joint Field Office (JFO) JFO transition to the Long-Term Recovery Office Process for prioritization of needs Process for regional coordination Prioritization - process and federal/military intervention Allocation of limited resources Re-entry decision and consistency Importance of maintaining a healthy hospital system Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. Insurance coverage for both private businesses and individuals Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the programs efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

375

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect (OSTI)

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

376

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

Science Journals Connector (OSTI)

Background This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N=235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Methods Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. Results After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR=1.22, 95% CI=1.141.30), angina or CHD (OR=1.29, 95% CI=1.191.39) and heart attack (OR=1.19, 95% CI=1.101.30). Effects were present for both men and women. Conclusions Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Michael Hendryx; Keith J. Zullig

2009-01-01T23:59:59.000Z

377

Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks  

Science Journals Connector (OSTI)

Abstract Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are these models to capture the real performance is an interesting topic. This paper selects two typical complex network based models, including a purely topological model (PTM) and a betweenness based model (BBM), as well as a direct current power flow model (DCPFM), to simulate the topology-based and flow-based vulnerability of power grid under degree, betweenness, maximum traffic and importance based intentional attacks. The relationships of vulnerability results from different models are analyzed and discussed for model comparisons. Taking IEEE 300 power grid with line capacity set proportional to tolerant parameter tp as example, the results show that there exists a critical node attack intensity A I = 0.147 , above which the three models produce almost identical topology-based vulnerability results under each attack strategy at any t p ? 1 , while producing identical flow-based vulnerability results from PTM and DCPFM occurs at A I > 0.147 , and A I > 0.73 for BBM and DCPFM, which indicates that the PTM can better approach the DCPFM for flow-based vulnerability analysis under intentional attacks. Similar results are also found for intentional edge attacks and other power grids.

Min Ouyang; Lijing Zhao; Zhezhe Pan; Liu Hong

2014-01-01T23:59:59.000Z

378

T-582: RSA systems has resulted in certain information being extracted from  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

379

Information Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Science Information Science1354608000000Information ScienceSome of these resources are LANL-only and will require Remote Access.NoQuestions? 667-5809library@lanl.gov...

380

THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING  

E-Print Network [OSTI]

THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING A DISSERTATION Computer security is a critical problem impacting every segment of social life. Recent research has shown attacks. With hardware support, DIFT can provide comprehensive protection to unmodified application

Kozyrakis, Christos

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing  

E-Print Network [OSTI]

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack. In this paper, we aim to automate this process and enable fast, patch-level pro- tection generation

Locasto, Michael E.

382

Information Technology Management ((Information Security))  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

383

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

384

The probability of Mark-I containment failure by melt-attack of the liner  

SciTech Connect (OSTI)

This report is a followup to the work presented in NUREG/CR-5423 addressing early failure of a BWR Mark I containment by melt attack of the liner, and it constitutes a part of the implementation of the Risk-Oriented Accident Analysis Methodology (ROAAM) employed therein. In particular, it expands the quantification to include four independent evaluations carried out at Rensselaer Polytechnic Institute, Argonne National Laboratories, Sandia National Laboratories and ANATECH, Inc. on the various portions of the phenomenology involved. These independent evaluations are included here as Parts II through V. The results, and their integration in Part I, demonstrate the substantial synergism and convergence necessary to recognize that the issue has been resolved.

Theofanous, T.G.; Yan, H. [California Univ., Santa Barbara, CA (United States). Dept. of Chemical and Nuclear Engineering; Podowski, M.Z. [Rensselaer Polytechnic Inst., Troy, NY (United States). Dept. of Nuclear Engineering and Engineering Physics] [and others

1993-11-01T23:59:59.000Z

385

INFORMATION & COMMUNICATION  

E-Print Network [OSTI]

of information and communication technologies in development that draws on Amartya Sen's capabilities approach

Jackson, Daniel

386

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...  

Broader source: Energy.gov (indexed) [DOE]

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact...

387

Fuel Mix Disclosure  

Broader source: Energy.gov [DOE]

In March 1999, the Florida Public Service Commission issued an order requiring the state's investor-owned electric utilities, which serve about 80% to 85% of the state's electric customers, to...

388

Residential Energy Disclosure (Hawaii)  

Broader source: Energy.gov [DOE]

A residential property owner is required to disclose electricity costs for the most recent three-month period in which the property was occupied as a condition of selling it. No proof or copies of...

389

US Equities Disclosures  

U.S. Energy Information Administration (EIA) Indexed Site

Nabors Industries Noble Drilling Precision Drilling PHI Rowan Companies Schlumberger Smith International Transocean Offshore Weatherford Int'l NuVista Energy Oilexco OPTI Canada...

390

Fuel Mix Disclosure  

Broader source: Energy.gov [DOE]

California's retail electricity suppliers must disclose to all customers the fuel mix used in the generation of electricity. Utilities must use a standard label created by the California Energy...

391

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio  

E-Print Network [OSTI]

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB were high. · Widespread attack of white fringe trees have not been reported. · These findings indicate

Ginzel, Matthew

392

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee  

E-Print Network [OSTI]

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan Web services depends on advertisement: they charge for prime screen real estate, and focus a great a pollution attack, that allows third parties to alter the customized content the services return to users who

Snoeren, Alex

393

Chief Information Officer Chairman, Information  

E-Print Network [OSTI]

Chief Information Officer Chairman, Information Technology Division Cleveland Clinic C. Martin Harris, MD, MBA C. Martin Harris, M.D., M.B.A., is the Chief Information Officer and Chairman of the Information Technology Division of Cleveland Clinic in Cleveland, Ohio. Dr. Harris' interest and expertise

Loudon, Catherine

394

Freedom of Information Act Information  

E-Print Network [OSTI]

Freedom of Information Act 2000 Information Request Form Reference no of request Please read the guidance accompanying this form and refer to the University's Freedom of Information publication scheme (http://www.admin.cam.ac.uk/univ/information/foi/foi_publication_scheme.pdf) before making

Talbot, James P.

395

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS -MANUSCRIPT 1 Taxonomy of Attacks for Agent-based Smart  

E-Print Network [OSTI]

, distributed and dynamic environment. Taxonomy of attacks is an effective tool in systematically classifying fuels or the energy is retrieved from the nuclear reaction, wind, water dams, the solar radiation, etc of agent-based smart grids as an effective tool to provide a structured framework. The proposed idea

Pota, Himanshu Roy

396

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

SciTech Connect (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

397

1460 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 7, JULY 2014 Data Framing Attack on State Estimation  

E-Print Network [OSTI]

attack, cyber security, smart grid. I. INTRODUCTION AFEATURE of any future smart grid is the promise such that the control center will remove useful measurements that would otherwise be used by the state estimator degree controlling only half of a critical set of measurements that are needed to make a system

Tong, Lang

398

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid Oliver Kosut, Member, IEEE, Liyan Jia, Robert J. Thomas, Life Fellow, IEEE, and Lang Tong grid security. I. INTRODUCTION F UTURE smart grids will likely to be more tightly inte- grated

Tong, Lang

399

Energy Losses Due to Vortex Shedding from the Lower Edge of a Vertical Plate Attacked by Surface Waves  

Science Journals Connector (OSTI)

...Vertical Plate Attacked by Surface Waves M. Stiassnie E. Naheer Irina Boguslavsky...The ratio between the flux of the energy taken out by the vortex generation process , and the incoming wave energy flux , is shown to be given by where...

1984-01-01T23:59:59.000Z

400

E-Print Network 3.0 - attacks outcomes lessons Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of - Department of Electrical and Computer Engineering, Performability Engineering Research Group Collection: Computer Technologies and Information Sciences 4 Manuscript....

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

AnKLe: detection automatique d'attaques par divergence d'information  

E-Print Network [OSTI]

AnKLe: d´etection automatique d'attaques par divergence d'information Emmanuelle Anceaume1 and Yann, nous proposons AnKLe (pour Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), un´er´e. AnKLe combine des techniques d'´echantillonnage et des m´ethodes de th´eorie de l'information. Il est

Paris-Sud XI, Université de

402

Information Accountability  

E-Print Network [OSTI]

Ease of information flow is both the boon and the bane of large-scale, decentralized systems like the World Wide Web. For all the benefits and opportunities brought by the information revolution, with that same revolution ...

Weitzner, Daniel J.

2007-06-13T23:59:59.000Z

403

E-Print Network 3.0 - affordability Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Collection: Computer Technologies and Information Sciences 16 Disclosures due to Health Care Reform Changes Disclosure of Grandfather Status Summary: and Affordable Care Act (the...

404

E-Print Network 3.0 - afford superior protection Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technologies and Information Sciences ; Engineering 2 Disclosures due to Health Care Reform Changes Disclosure of Grandfather Status Summary: believes this health plan...

405

Concentrating Information  

E-Print Network [OSTI]

We introduce the concentrated information of tripartite quantum states. For three parties Alice, Bob and Charlie, it is defined as the maximal mutual information achievable between Alice and Charlie via local operations and classical communication performed by Charlie and Bob. The gap between classical and quantum concentrated information is shown to be an operational figure of merit for a state merging protocol involving shared mixed states and no distributed entanglement. We derive upper and lower bounds on the concentrated information, and obtain a closed expression for arbitrary pure tripartite states in the asymptotic setting. In this situation, one-way classical communication is shown to be sufficient for optimal information concentration.

Alexander Streltsov; Soojoon Lee; Gerardo Adesso

2014-10-23T23:59:59.000Z

406

Information Handling: Keeping Chemists Informed  

Science Journals Connector (OSTI)

... be a member from the start, and the Office for Scientific and Technical Information (OSTI) will be represented by an observer. The objective is to provide a comprehensive information ...

1968-09-28T23:59:59.000Z

407

ContactInformation Contact Information  

E-Print Network [OSTI]

's only fully accredited institute of higher learning offering graduate education in the field of Steel Institute of Ferrous Technology(GIFT) Admissions Timeline Semester Begins Application Deadline September 1ContactInformation Contact Information For More Information We look forward to receiving your

Sung, Wokyung

408

Protecting grids from cross-domain attacks using security alert sharing mechanisms  

Science Journals Connector (OSTI)

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to as multi-administrative domain networks. Each domain might have its own security policy and may not want to share its security data with less-protected networks, making it more complex to ensure the security of such networks and protecting them from cross-domain attacks. We propose a Security Event Manager (SEM) called the Grid Security Operation Center (GSOC), which facilitates IT security managers in giving a view of the security of the whole grid network without compromising confidentiality of security data. To do so, GSOC provides a security evaluation of each administrative domain (AD) and a parametric security alert sharing scheme. Alert sharing can then be tuned in order to meet local security policy rules.

Raheel Hassan Syed; Maxime Syrame; Julien Bourgeois

2013-01-01T23:59:59.000Z

409

Surface attack on metals in the presence of liquid metals. Final report  

SciTech Connect (OSTI)

A study was undertaken to evaluate liquid metals as electrical collectors in contact with solid metal alloys. Surface attack of the liquid metal on the solid metal is expected to be a major challenge to the development of a credible system. Low-melting-temperature metals and alloys of the fusible type are to be utilized for a collector that will operate in the 200-500 F range, with emphasis towards the lower end. Solid metals have been selected for experimental work based on their electrical properties and minimal potential reaction with the candidate liquid-metal alloys. Material properties of both liquid and solid metals were reviewed to identify initial material combinations for evaluation. Thorough literature searches were conducted to obtain as much pertinent physical-property and metallurgical data as possible, prior to actual experimental work. Process and material modelling was adopted to select candidate materials for both solids and liquids. Consideration of practical requirements for the eventual collectors is an integral part of the study. Work effort has concentrated on apparatus construction, evaluation and a program of testing to obtain screening data on materials selected and the chosen test method. Results have identified limitations of the test unit design and maximum current loads under test conditions with experimental current collectors. Candidate electrode materials have been exposed in low-melting fusible alloys for direct-dissolution data.

Beal, R.E.

1986-04-10T23:59:59.000Z

410

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

411

information Conference  

Science Journals Connector (OSTI)

information Conference ... The 1958 International Conference on Scientific Information will be held in Washington, D. C, in November 1958. ... Since papers that are accepted must be printed and circulated to the participants not later than July 1958, it is urged that anyone interested in submitting a paper write to the secretariat immediately, at International Conference of Scientific Information, National Academy of Sciences, 2101 Constitution Ave., Washington 25, D. C. ...

1957-12-09T23:59:59.000Z

412

Computational fluid dynamics study of wind turbine blade profiles at low Reynolds numbers for various angles of attack  

Science Journals Connector (OSTI)

Airfoil data are rarely available for Angles Of Attack (AOA) over the entire range of 180. This is unfortunate for the wind turbine designers because wind turbine airfoils do operate over this entire range. In this paper an attempt is made to study the lift and drag forces on a wind turbine blade at various sections and the effect of angle of attack on these forces. Aerodynamic simulations of the steady flow past two-dimensional wind-turbine blade-profiles developed by the National Renewable Energy Laboratory (NREL) at low Reynolds number will be performed. The aerodynamic simulation will be performed using Computational Fluid Dynamics (CFD) techniques. The governing equations used in the simulations are the Reynolds-Average-Navier-Stokes (RANS) equations. The simulations at different wind speeds will be performed on the S809 and the S826 blade profiles. The S826 blade profile is considered in this study because it is the most suitable blade profile for the wind conditions in Egypt in the site of Gulf El-Zayt on the red sea. Lift and drag forces along with the angle of attack are the important parameters in a wind turbine system. These parameters determine the efficiency of the wind turbine. The lift and drag forces are computed over the entire range of AOA of 180 at low Reynolds numbers. The results of the analysis showed that the AOA between 3 and 8 have high Lift/Drag ratio regardless of the wind speed and the blade profile. The numerical results are compared with wind tunnel measurements at the available limited range of the angle of attack. In addition the numerical results are compared with the results obtained from the equations developed by Viterna and Janetzke for deep stall. The comparisons showed that the used CFD code can accurately predict the aerodynamic loads on the wind-turbine blades.

2012-01-01T23:59:59.000Z

413

Technical information  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

Home> Commercial Buildings Home> Technical Information > Estimation of Standard Errors Estimation of Standard Errors Sampling error is the difference between the survey estimate...

414

Vendor Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Vendors businessassetsimagesbusiness-icon.jpg Vendor Information As a premier national research and development laboratory, LANL seeks to do business with qualified companies...

415

Operations Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Standards BPA Operations Information (OPI) Transmission Services operates and plans for regional and national system needs. Transmission Services coordinates system operation and...

416

Ordering Information  

Gasoline and Diesel Fuel Update (EIA)

Federal, State, local, and foreign governments, EIA survey respondents, and the media. For further information, and for answers to questions on energy statistics, please...

417

TITLE: Business Associate Addendum The Health Insurance Portability and Accountability Act of 1996 (HIPAA) limits the use and disclosure  

E-Print Network [OSTI]

· Practice management · Accreditation services · Legal services · Quality assurance · Information system, vendor or service provider that will have access PHI. PURPOSE : The Privacy Rule requires that a Covered Entity obtain satisfactory assurances from its business associates that the business associate will only

Columbia University

418

PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY  

SciTech Connect (OSTI)

Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

Flach, G.

2009-12-11T23:59:59.000Z

419

Registration Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Registration Information Registration Information Registration Information Focusing on methods and computational tools used to help sequence, assemble, and finish genomes, including new sequencing technologies. Contact Chris Detter (505) 665-3024 Email Registration is limited to 150 participants so please register ASAP if you plan to attend. There is no deadline for registration. To register, please send an e-mail to Chris Detter with your contact information: Name Citizenship status. Institution information. Area(s) of specific interest. Do you plan to submit an abstract by March 30th? Within 48 hrs of registering you will be sent an e-mail confirmation number that you should include on your abstract if you are submitting one. To submit an abstract, please refer to the Abstract Submission guidelines.

420

Conclusions of the International RILEM TC 186-ISA Workshop on Internal Sulfate Attack and Delayed Ettringite Formation (46 September 2002, Villars, Switzerland)  

Science Journals Connector (OSTI)

A RILEM technical committee on Internal Sulfate Attack (TC 186-ISA) was established in 1996. In the ensuing years considerable research was carried out, which helped to clarify the scientific knowledge surroundin...

K. Scrivener; J. P. Skalny

2005-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

422

Spacetime information  

Science Journals Connector (OSTI)

In usual quantum theory, the information available about a quantum system is defined in terms of the density matrix describing it on a spacelike surface. This definition must be generalized for extensions of quantum theory which neither require, nor always permit, a notion of state on a spacelike surface. In particular, it must be generalized for the generalized quantum theories appropriate when spacetime geometry fluctuates quantum mechanically or when geometry is fixed but not foliable by spacelike surfaces. This paper introduces a four-dimensional notion of the information available about a quantum systems boundary conditions in the various sets of decohering, coarse-grained histories it may display. This spacetime notion of information coincides with the familiar one when quantum theory is formulable in terms of states on spacelike surfaces but generalizes this notion when it cannot be so formulated. The idea of spacetime information is applied in several contexts: When spacetime geometry is fixed the information available through alternatives restricted to a fixed spacetime region is defined. The information available through histories of alternatives of general operators is compared to that obtained from the more limited coarse grainings of sum-over-histories quantum mechanics that refer only to coordinates. The definition of information is considered in generalized quantum theories. We consider as specific examples time-neutral quantum mechanics with initial and final conditions, quantum theories with nonunitary evolution, and the generalized quantum frameworks appropriate for quantum spacetime. In such theories complete information about a quantum system is not necessarily available on any spacelike surface but must be searched for throughout spacetime. The information loss commonly associated with the evolution of pure states into mixed states in black hole evaporation is thus not in conflict with the principles of generalized quantum mechanics.

James B. Hartle

1995-02-15T23:59:59.000Z

423

General Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ASD General Information ASD General Information APS Resources & Information A list of useful links for APS staff and users. APS Technical Publications Links to APS technical publications. APS Publications Database The official and comprehensive source of references for APS-related journal articles, conference papers, book chapters, dissertations, abstracts, awards, invited talks, etc. Image Library A collection of APS images. Responsibilities & Interfaces for APS Technical Systems Descriptions of the responsibilities of APS technical groups and how they interface with one another. APS Procedures Operational procedures for the APS. APS Specifications Specifications and approvals for upgrades or changes to existing APS hardware and software. APS Radiation Safety Policy & Procedures Committee Minutes

424

U.S. Energy Information Administration / 2012 Uranium Marketing Annual Report  

U.S. Energy Information Administration (EIA) Indexed Site

Uranium Marketing Annual Report Uranium Marketing Annual Report 2012 Uranium Marketing Annual Report Release Date: May 16, 2013 Next Release Date: May 2014 Purchase Contract Type (Signed in 2012) Quantity of Deliveries Received in 2012 Weighted-Average Price Contracts for Deliveries in 2012 Spot W W 31 Long-Term W W 3 Total 12,346 55.16 34 Table 8. Contracts signed in 2012 by owners and operators of U.S. civilian nuclear power reactors by contract type thousand pounds U 3 O 8 equivalent; dollars per pound U 3 O 8 equivalent W = Data withheld to avoid disclosure of individual company data. Notes: Totals may not equal sum of components because of independent rounding. Weighted-average prices are not adjusted for inflation. Source: U.S. Energy Information Administration, Form EIA-858 "Uranium Marketing Annual Survey" (2012)

425

All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION  

Broader source: Energy.gov (indexed) [DOE]

0.2 0.2 (08-93) All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) OMB Control No. 1910-0400 OMB Burden Disclosure on Last Page SECTION A - GENERAL 1. PROGRAM/PROJECT IDENTIFICATION NO. 2. PROGRAM/PROJECT TITLE 3. NAME AND ADDRESS SECTION B - CALCULATION OF FEDERAL AWARD Cost Classification Use Only for Revisions Latest Approved Amount Adjustment + or (-) Total Amount Required 1. Administration Expense 2. Preliminary Expense 3. Land, Structures, Right-of-way 4. Architectural Engineering Basic Fees 5. Other Architectural Engineering Fees 6. Project Inspection Fees 7. Land Development 8. Relocation Expenses 9. Relocation Payments to Individuals and Businesses 10. Demolition and Removal 11. Construction and Project Improvement

426

Information Resources  

Broader source: Energy.gov [DOE]

We've organized links and information on solar energy technologies and the SunShot Initiative to make it easier for you to find what you're looking for.

427

Information Causality  

E-Print Network [OSTI]

We review the literature on Information Causality. Since it's for a book, we don't think an abstract will be needed at all, so we have written this one just for the sake of the arXiv.

Marcin Paw?owski; Valerio Scarani

2011-12-06T23:59:59.000Z

428

Informed Chemists  

Science Journals Connector (OSTI)

... of communication into local chemistry departments and already working in the documentation field ? Does OSTI not know that British university libraries already act as local agents for other computerized information ...

R. J. DANNATT

1967-10-14T23:59:59.000Z

429

A Data-Centric Approach to Insider Attack Detection in Database Systems  

E-Print Network [OSTI]

Petropoulos2 , Hung Q. Ngo2 , and Shambhu Upadhyaya2 1 Information Security, Amazon.com Inc., Seattle WA 98104, USA, smathew@amazon.com, 2 Computer Science and Engineering, University at Buffalo, Buffalo NY 14260, USA, (mpertropo, hungngo, shambhu)@buffalo.edu Abstract. The insider threat against database

Ngo, Hung Q.

430

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

using IEEE test systems. Our results indicate that security protection of the electric power grid must@cs.unc.edu ABSTRACT A power grid is a complex system connecting electric power generators to consumers through power.5 [Management of Computing and Information Systems]: Security and Protection; E.m [Data]: Miscella- This work

Ning, Peng

431

RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON  

E-Print Network [OSTI]

-terrorist disruptions of electric power systems An analysis of selected data from the National Memorial Institute data about disruptions to the electric power grid provide useful information that can be used as inputs squares 1. Introduction Disruptions to the power grid are an ongoing concern for risk management

Wang, Hai

432

Information Request  

Broader source: Energy.gov (indexed) [DOE]

November 25, 2008 November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel Management and Disposal Act" submitted to Congress March 6, 2007 3. State-by-State Maps that outline each state's electricity generation mix, commercial spent nuclear fuel inventories, and payments into the Nuclear Waste Fund The additional information on the history of the use of engineered barriers will be

433

Local Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Local Information Local Information Local Information Welcome to Golden, Colorado, the location of the 2014 Electrical Safety Workshop. Visiting NREL The National Renewable Energy Laboratory (NREL) has research facilities and offices at several locations in Golden, Colorado (near Boulder), and in Washington, D.C. In Golden, you'll find the NREL Education Center, along with many of our research laboratories and administrative offices. The National Wind Technology Center is a separate facility located about 5 miles south of Boulder. Read more » Transportation NREL is accessible via bus on the Regional Transportation District (RTD) Route 20 from Aurora and Denver. Route 20 travels along 20th Avenue and ends at the NREL Education Center. Visit the RTD Web site or call 303-299-6000 to plan your trip or for more

434

Hospital Information System  

Science Journals Connector (OSTI)

Ahospital information system is an information system for processing data, information and knowledge in hospital ...

2008-01-01T23:59:59.000Z

435

postgraduate information  

E-Print Network [OSTI]

, biomedical engineering and technology, clean energy, water and the environment, complex systems and materialspostgraduate guide 2014 information technology and management #12;"The knowledge and skills Technology has been an excellent investment in my own development and will be crucial to realising my future

Scholz, Bernhard

436

Information International  

E-Print Network [OSTI]

. Orientation 17 Section 4 ­ Miscellaneous information 18 A. Dates of future academic sessions 18 B. Contact Checklist Back Cover Contents EUROPEAN NATIONALS/RESIDENTS NEED TO READ THE WHOLE OF ALL SECTIONS MARKED NON-EUROPEAN NATIONALS/RESIDENTS NEED TO READ THE WHOLE OF ALL SECTIONS MARKED SECTIONS MARKED SHOULD BE READ BY ALL

Petriu, Emil M.

437

Information Repository  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Information Repository Documents 3 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 14, 2013 Class 1 Permit Modifications and NMED Responses Class 1 Modification, August 29, 2013 WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088. (1. revise a course outline; 2. revise table and panel figures to include Panel 7; 3. update description related to Type B Packages; and 4. update TRUPACT-II and HalfPACT figures) JE Kieling, NMED dated October 13, 2013 Fee Assessment Class 1 Permit Modification WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088-TSDF (Revise a Course Outline; Revise Table and Panel Figures to Include Panel 7; Update Descriptions Related to Type B Packages; and Update TRUPACT-ll and HalfPACT Figures) JM Kieling, NMED dated September 23, 2013

438

Informal Report  

Office of Scientific and Technical Information (OSTI)

W-^^ LA-8034-MS ^ - W-^^ LA-8034-MS ^ - - ^ / Informal Report "c o O o -*-* "co > Specific Heat and Thermal Conductivity of Explosives, Mixtures, and Plastic-Bonded Explosives Determined Experimentally \mm ^ts\ LOS ALAMOS SCIENTIFIC LABORATORY Post Office Box 1663 Los Alamos. New Mexico 87545 DISTR!DU7irM o r TdiS BGGbT.lENT IS UNLIMITED DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency Thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately

439

Transmission Information  

E-Print Network [OSTI]

(symbols/s) information rate: R = Rs ·H (bits/s) . Code each symbol by log 2 q bits (BCD), then data rate Rs · log 2 q > R, unless source is equal probable pi = 1/q, 1 # i # q . How to code symbols in an e that the signal exhibits some form of redundancy, which should be exploited when the signal is coded

Chen, Sheng

440

Transmission Information  

E-Print Network [OSTI]

Memoryless source with independent symbols (code each symbol by log 2 q bits is called binary coded decimal (BCD)) mi, pi 1 # i # q # # # # BCD: log 2 q (bits/symbol) symbol rate Rs (symbols/s) data bit rate: Rs/symbol) Information rate R = Rs ·H (bits/s) . How to code symbols to achieve e#ciency (data bit rate = R)? 14 #12

Chen, Sheng

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8, 2012 8, 2012 U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. October 5, 2012 U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. October 4, 2012 U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. October 3, 2012 U-273: Multiple vulnerabilities have been reported in Wireshark

442

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

443

Data:97581665-437d-4ba1-bc4a-a8d09453e719 | Open Energy Information  

Open Energy Info (EERE)

7581665-437d-4ba1-bc4a-a8d09453e719 7581665-437d-4ba1-bc4a-a8d09453e719 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Reliant Energy Retail Services LLC Effective date: 2012/09/09 End date if known: Rate name: POLR (Residential Service) Sector: Residential Description: This price disclosure is based on minimum service prices- your average price for electricity will vary according to your usage and the components shown in the LSP rate formula below: LSP Rate (in $ per KWh) = (Non-bypassable charges + LSP customer charge + LSP energy charge)/kWh Source or reference: http://www.puc.texas.gov/consumer/electricity/polr/TCC_Res.pdf

444

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

445

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

446

Information erasure  

Science Journals Connector (OSTI)

Landauers principle states that in erasing one bit of information, on average, at least kBT ln(2) energy is dissipated into the environment (where kB is Boltzmanns constant and T is the temperature of the environment at which one erases). Here, Landauers principle is microscopically derived without direct reference to the second law of thermodynamics. This is done for a classical system with continuous space and time, with discrete space and time, and for a quantum system. The assumption made in all three cases is that during erasure the bit is in contact with a thermal reservoir.

Barbara Piechocinska

2000-05-17T23:59:59.000Z

447

INFORMAL REPORT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

q?% q?% LA-5031 -MS INFORMAL REPORT krs $ 1 0 s N o t e on Inverse Bremsstrahlung in Strong E!ect:omGgnetic c;alPl I j a l a m o s scientific laboratory of the University of California LOS A L A M O S , NEW MEXICO 8 7 5 4 4 U N I T E D S T A T E S A T O M I C E N E R G Y C O M M I S S I O N a This report was prepared as an account of work sponsored by the United States Government. Neither the United States nor the United States Atomic Energy Commission, nor any of their employees, nor any of their contrac- tors, subcontractors, or their employees, makes any warranty, express or im- plied, or assumes any legal liability or responsibility for the accuracy, com- pleteness or usefulness of any information, apparatus, product or process dis- closed, or represents that its use would not infringe privately owned rights.

448

Lignin | Open Energy Information  

Open Energy Info (EERE)

Lignin Lignin Jump to: navigation, search Lignin.jpg What is Lignin? Lignin is the fiber in our food, the thing that makes vegetables crunchy and firm. It is a polymer found extensively in the cell walls of all woody plants, Lignin, one of the most abundant natural polymers, constitutes one-fourth to one-third of the total dry weight of trees. It combines with hemicellulose materials to help bind the cells together and direct water flow. Lignin is formed by removal of water from sugars to create aromatic structures. These reactions are not reversible. Lignin resists attack by most microorganisms, and anaerobic processes tend not to attack the aromatic rings at all. Aerobic breakdown of lignin is slow and may take many days. Lignin is nature's cement along with hemicellulose to exploit

449

REQUEST FOR INFORMATION Student Information System  

E-Print Network [OSTI]

REQUEST FOR INFORMATION Student Information System This form is to be used by those requesting information from the Registrar's Office. Federal privacy regulations require strict monitoring of access to student information. PERSONS OR ORGANIZATIONS MUST DEMOSTRATE THAT THE INFORMATION IS NEEDED

Thaxton, Christopher S.

450

predictive information, multi-information, and binding  

E-Print Network [OSTI]

predictive information, multi-information, and binding information Samer Abdallah and Mark Plumbley.1 ­ December 9, 2010 Abstract We introduce an information theoretic measure of dependency between multiple random variables, called `binding information' and compare it with several previously proposed measures

Plumbley, Mark

451

Personal Information Request Request for Personal Information  

E-Print Network [OSTI]

Personal Information Request Request for Personal Information Request for Correction of Personal Information Personal information on this form is collected under Newfoundland and Labrador's Access to Information and Protection of Privacy (ATIPP) Act and will be used to respond to a request for, or correction

deYoung, Brad

452

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information  

SciTech Connect (OSTI)

To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analysts world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

2008-06-04T23:59:59.000Z

453

Appears in WEWoRC 2005 -Western European Workshop on Research in Cryptology, Lecture Notes in Informatics (LNI) P-74 (2005) 53-63. Gesellschaft fur Informatik. State Recovery Attacks on Pseudorandom Generators  

E-Print Network [OSTI]

Generators Andrey Sidorenko and Berry Schoenmakers Eindhoven University of Technology P.O. Box 513, 5600 MB an important class of attacks on pseudo- random generators. In this paper we analyze resistance of pseudorandom generators against these attacks in terms of concrete security. We show that security of the Blum- Micali

Schoenmakers, Berry

454

Geneial Information  

Office of Legacy Management (LM)

--- _____ --- _____ ii3 ' 6 f Geneial Information su-u+./ I The Commission maintains a residue storage area known as the Airport Site at Robertson, l Missouri. This site is located immediately north of the St. Louis Municipal Airport and east of the McIknnell Aircraft Corporation Plant on Rr~wn Road in St. Louis County. Consent to use and occupy the 21.7 acre tract was obtalned by the Manhattan Dlstrlot on Marsh 2, 19&6. T!ltle uas auqubed to the property on Janwry 3, 1947 by condemnation proceeding8 for ~%20,000. It was aerquired for the purpose of storing residues fxvm the llestrehan Street Refinery and the Metal Plant at Plant 4. A coveredcoarrrete storage pad &t x 250' was constructed for storing drums. A concrete pit 202' x 42* x 16' was constructed to store radium bearing residues (K-6). Ihe area was enclosed with a chaiu-

455

Historical. Information.  

Office of Legacy Management (LM)

Historical. Information. Historical. Information. ~ H.. 1 . General Project Rulison Manager' s Report, April. 1973 DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available original document. PROJECT RULISON MANAGER'S R E P O R T APRIL 197.3 UNITED STATES ATOMIC ENERGY COMMISSION NEVADA OPERATIONS OFFICE Las Vegas, Nevada PREFACE , The R u l i s o n ' p r o j e c t , d e t o n a t e d September 1 0 , 1969, 'was t h e second n u c l e a r . d e t o n a t i o n designed t o d e t e r m i n e t h e economic and t e c h n i c a l f e a s i b i l i t y . of u s i n g n u c l e a r e x p l o s i v e s t o s t i m u l a t e an underground, low-productivity n a t u r a l gas r e s e r v o i r . The p r o j e c t was p a r t of t h e Atomic Energy Commission's (AEC) Plowshare program f o r d e v e l o p i n g p e a c e f u l a p p l i c a t i o n of n u c l e a r e x p l

456

Equipment Certification | Open Energy Information  

Open Energy Info (EERE)

Equipment Certification Equipment Certification Jump to: navigation, search Policies requiring renewable energy equipment to meet certain standards serve to protect consumers from buying inferior equipment. These requirements not only benefit consumers; they also protect the renewable energy industry by making it more difficult for substandard systems to reach the market. [1] Equipment Certification Incentives CSV (rows 1 - 19) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active Canada Oil and Gas Operations Act (Canada) Environmental Regulations Equipment Certification Fees Generating Facility Rate-Making Generation Disclosure Industry Recruitment/Support Safety and Operational Guidelines Siting and Permitting Canada Commercial Construction Developer

457

Information Technology and Libraries  

E-Print Network [OSTI]

Sue Chesley Perry 196 INFORMATION TECHNOLOGY AND LIBRARIES |LITA - Library & Information Technology Association). Two of the 190 INFORMATION TECHNOLOGY AND LIBRARIES |

Hubble, Ann; Murphy, Deborah A.; Perry, Susan Chesley

2011-01-01T23:59:59.000Z

458

Geographic Information System (GIS)  

Science Journals Connector (OSTI)

The geographic information system is abranch of health information system and public health information system ...developed for the capture, storage, manipulation, analysis, and visualization of geographic ...

2008-01-01T23:59:59.000Z

459

High tech criminal threats to the national information infrastructure  

Science Journals Connector (OSTI)

National information infrastructure (NII), vital to the nation's security and economic stability, comprises both physical and electronic infrastructures. Information and communications technologies (ICT) form the backbone of many aspects of the NII and reliance on ICT has created many new risks. Cyberthreats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. This paper examines the technology-related risks associated with the NII and provides examples of existing incidents and areas in which new threats might emerge. To be able to mitigate these risks, it remains crucial to understand infrastructure interdependencies and to establish public-private partnerships to ensure that weaknesses in systems are not able to be exploited.

Kim-Kwang Raymond Choo

2010-01-01T23:59:59.000Z

460

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

T-637: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI ,  

Broader source: Energy.gov (indexed) [DOE]

7: VMSA-2011-0009 VMware hosted product updates, ESX patches 7: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI , Client update resolve multiple T-637: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI , Client update resolve multiple June 6, 2011 - 3:04pm Addthis PROBLEM: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI , Client update resolve multiple PLATFORM: Supported Platforms VMSA-2011-0009 ABSTRACT: This patch provides a fix for the following three security issues in the VMware Host Guest File System (HGFS). None of these issues affect Windows based Guest Operating Systems. CVE-2011-2146 Mount.vmhgfs Information Disclosure, information disclosure via a vulnerability that allows an attacker with access to the Guest to determine if a path exists in the Host filesystem and whether it is a file or directory regardless of permissions.

462

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

81 - 23090 of 26,764 results. 81 - 23090 of 26,764 results. Article DOE Extends Public Comment Period for the Draft Uranium Leasing Program Programmatic Environmental Impact Statement The U.S. Department of Energy (DOE) today announced that the public comment period for the Draft Uranium Leasing Program Programmatic Environmental Impact Statement (ULP PEIS) has been extended to May 31, 2013. http://energy.gov/nepa/articles/doe-extends-public-comment-period-draft-uranium-leasing-program-programmatic Article V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks Two vulnerabilities were reported in HP Service Manager http://energy.gov/cio/articles/v-146-hp-service-manager-bugs-permit-cross-site-scripting-and-information-disclosure Download Enforcement Letter, National Security Technologies, LLC- May 21,

463

U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013  

U.S. Energy Information Administration (EIA) Indexed Site

Coke and Breeze Production at Coke Plants Coke and Breeze Production at Coke Plants (thousand short tons) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Table 3. Coke and Breeze Production at Coke Plants (thousand short tons) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Year to Date Census Division April - June 2013 January - March 2013 April - June 2012 2013 2012 Percent Change Middle Atlantic w w w w w w East North Central 2,303 2,314 2,365 4,617 4,754 -2.9 South Atlantic w w w w w w East South Central w w w w w w U.S. Total 4,152 4,098 4,104 8,249 8,233 0.2 Coke Total 3,954 3,841 3,863 7,795 7,721 1.0 Breeze Total 198 257 241 455 512 -11.2 w = Data withheld to avoid disclosure. Note: Total may not equal sum of components because of independent rounding. Source: U.S. Energy Information Administration (EIA), Form EIA-5, 'Quarterly Coal Consumption Report - Coke Plants.'

464

U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013  

U.S. Energy Information Administration (EIA) Indexed Site

1. Coke and Breeze Stocks at Coke Plants by Census Division 1. Coke and Breeze Stocks at Coke Plants by Census Division (thousand short tons) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Table 41. Coke and Breeze Stocks at Coke Plants by Census Division (thousand short tons) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Census Division June 30, 2013 March 31, 2013 June 30, 2012 Percent Change (June 30) 2013 versus 2012 Middle Atlantic w w w w East North Central 724 510 509 42.1 South Atlantic w w w w East South Central w w w w U.S. Total 914 690 674 35.6 Coke Total 757 573 594 27.5 Breeze Total 157 117 80 95.2 w = Data withheld to avoid disclosure. Note: Total may not equal sum of components because of independent rounding. Source: U.S. Energy Information Administration (EIA), Form EIA-5, 'Quarterly Coal Consumption and Quality Report - Coke Plants

465

National Environmental Information Infrastructure  

E-Print Network [OSTI]

National Environmental Information Infrastructure: Reference Architecture Contributing Information Infrastructure: Reference Architecture v1.1 Environmental Information Programme Publication Series: Reference Architecture, Environmental Information Programme Publication Series, document no. 4, Bureau

Greenslade, Diana

466

An Information Calculus for Information Retrieval  

E-Print Network [OSTI]

An Information Calculus for Information Retrieval C.J. van Rijsbergen Computing Science Department not whistle it in mathematics either' Introduction In the beginning there was information, later there was probability, and very much later there was logic. Information is and always has been an elusive concept

Jose, Joemon M.

467

Information Governance Freedom of Information Request Form  

E-Print Network [OSTI]

Information Governance Freedom of Information Request Form foi@salford.ac.uk http://www.infogov.salford.ac.uk Details of the applicant Name: Address: Post code: Tel. No.: Email: Description of information requested Please provide a description of the information you would like to receive, please be as specific

Romano, Daniela

468

PUBLIC INFORMATION ANNEX I -PUBLIC INFORMATION  

E-Print Network [OSTI]

ANNEX I PUBLIC INFORMATION #12;ANNEX I - PUBLIC INFORMATION 11/12/2013 v. 2.0 Page I-1 PROMULGATION STATEMENT Annex I: Public Information, and contents within, is a guide to how the University maintains public information during an incident. The Annex is written in support of the Texas A&M University (TAMU

469

Geographic Information System | Open Energy Information  

Open Energy Info (EERE)

Geographic Information System Geographic Information System Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Geographic Information System Details Activities (24) Areas (11) Regions (4) NEPA(0) Exploration Technique Information Exploration Group: Data and Modeling Techniques Exploration Sub Group: Data Techniques Parent Exploration Technique: Data Techniques Information Provided by Technique Lithology: Any mapable information Stratigraphic/Structural: Any mapable information Hydrological: Any mapable information Thermal: Any mapable information Cost Information Low-End Estimate (USD): 70.007,000 centUSD 0.07 kUSD 7.0e-5 MUSD 7.0e-8 TUSD / hour Median Estimate (USD): 80.008,000 centUSD 0.08 kUSD 8.0e-5 MUSD 8.0e-8 TUSD / hour High-End Estimate (USD): 150.0015,000 centUSD

470

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

In 2001, Nevada enacted legislation requiring the states electric utilities to provide details regarding the fuel mix and emissions of electric generation to their customers. Utilities must...

471

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

Oregon's 1999 electric utility restructuring legislation requires electricity companies and electric service suppliers to disclose details regarding their fuel mix and emissions of electric...

472

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

Under Connecticuts restructuring law (P.A. 98-28), electric suppliers and electric distribution companies must disclose annually to the Public Utilities Regulatory Authority (PURA) and to...

473

info disclosure-rocky mts  

Broader source: Energy.gov (indexed) [DOE]

site is tritium. Impacted media. Affected media include surface and subsurface soils, air, and ground- water. Forest resources on the slopes adjacent to the site have also been...

474

Fuel Mix and Emissions Disclosure  

Broader source: Energy.gov [DOE]

Iowa adopted regulations in 2003 that generally require rate-regulated electric utilities to disclose to customers the fuel mix and estimated emissions, in pounds per megawatt-hour (MWh), of...

475

Climate Registry Information System | Open Energy Information  

Open Energy Info (EERE)

Climate Registry Information System Climate Registry Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Registry Information System Agency/Company /Organization: The Climate Registry Sector: Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Online calculator User Interface: Website Website: www.theclimateregistry.org/climate-registry-information-system-cris/ Web Application Link: www.theclimateregistry.org/climate-registry-information-systhttps://ww Cost: Free References: General Reporting Protocol[1] The Climate Registry Information System (CRIS) is the official online greenhouse gas calculation, reporting, and verifcation tool for The Climate Registry, a North American registry through which members voluntarily

476

7 Copyright 2013, The Joint Commission For further information  

E-Print Network [OSTI]

. Reporting Period: July 2011 - June 2012 ACE inhibitor or ARB for LVSD* Heart attack patients who receive of heart attack patients who have problems with the heart pumping enough blood to the body were prescribed medicines to improve the heart's ability to pump blood. 100% 98% 100% 96% Aspirin at arrival* Heart attack

Kim, Duck O.

477

Information Annual Report  

E-Print Network [OSTI]

Information Technology Services 2012­13 Annual Report #12;#12;Contents Administrative Information ______117 Telecommunications and Networking Services __151 #12;#12;5 ITS 2012-13 Administrative Information Services INFORMATION TECHNOLOGY SERVICES Administrative Information Services 2012­13 Annual Report

Maroncelli, Mark

478

U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013  

U.S. Energy Information Administration (EIA) Indexed Site

Average Price of Coal Receipts at Coke Plants by Census Division Average Price of Coal Receipts at Coke Plants by Census Division (dollars per short ton) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Table 24. Average Price of Coal Receipts at Coke Plants by Census Division (dollars per short ton) U.S. Energy Information Administration | Quarterly Coal Report, April - June 2013 Year to Date Census Division April - June 2013 January - March 2013 April - June 2012 2013 2012 Percent Change Middle Atlantic w w w w w w East North Central 157.29 176.84 199.70 166.21 198.26 -16.2 South Atlantic w w w w w w East South Central w w w w w w U.S. Total 157.26 171.51 191.48 163.85 190.51 -14.0 w = Data withheld to avoid disclosure. Note: Average price is based on the cost, insurance, and freight (c.i.f. value). Total may not equal sum of components because of independent rounding.

479

Information theory based on nonadditive information content  

Science Journals Connector (OSTI)

We generalize Shannons information theory in a nonadditive way by focusing on the source coding theorem. The nonadditive information content we adopted is consistent with the concept of the form invariance structure of the nonextensive entropy. Some general properties of the nonadditive information entropy are studied, in addition, the relation between the nonadditivity q and the codeword length is pointed out.

Takuya Yamano

2001-03-23T23:59:59.000Z

480

Medical (Visual) Information Retrieval  

Science Journals Connector (OSTI)

This text gives a broad overview of the domain of visual medical information retrieval and medical information analysis/search in general. The goal is to describe the specifics of medical information analysis ...

Henning Mller

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information disclosure attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

FEDERAL INFORMATION PROCESSING STANDARD  

E-Print Network [OSTI]

March 2004 FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 199, STANDARDS FOR SECURITY Information Technology Laboratory National Institute of Standards and Technology A new Federal Information Processing Standard (FIPS), recently approved by the Secretary of Commerce, will help federal agencies

482

Office for Information  

Science Journals Connector (OSTI)

... information services in science is growing steadily. The Office for Scientific and Technical Information (OSTI) emerged as an independent unit under the Department of Education and Science from the ... of information services already being developed in the United States.

1967-02-11T23:59:59.000Z

483

Energy information sheets  

SciTech Connect (OSTI)

The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

NONE

1995-07-01T23:59:59.000Z

484

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

485

Sandia Proprietary Information PII  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CBR (092014) Supersedes (07-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information CALIFORNIA CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are...

486

Multipartite information causality  

Science Journals Connector (OSTI)

As a physical principle, information causality has thus far only been studied by using bipartite protocols. In this paper, we consider information causality in multireceiver random access codes, in which no receiver can gain any information only from classical communication. To precisely distinguish physical correlations from nonphysical ones, information causality in the multipartite scenario can be stated as follows: The information gain of total receivers cannot be greater than the amount of classical communication. Operationally, the distributive multiparty physical nonlocal resource can be exploited only for information splitting, rather than for accessing more information. Multipartite information causality is demonstrated to yield entanglement monogamy.

Li-Yi Hsu

2012-03-12T23:59:59.000Z

487

Sandia Proprietary Information PII  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BRU (09-2014) Sandia Proprietary Information PII 1 Sandia Proprietary Information NEW MEXICO BACKGROUND REVIEW UPDATE You are receiving this notice on behalf of the Personnel...

488

Sandia Proprietary Information PII  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRO (09-2014) Supersedes (09-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information NM CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are receiving this...

489

Patterns of heart attacks  

E-Print Network [OSTI]

Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

Shenk, Kimberly N

2010-01-01T23:59:59.000Z

490

The Attack on Mead  

Science Journals Connector (OSTI)

...Kroeber was in such state-ments proposing the...and ultra-paradoxical states ofbrain activity, these...Studies in Polynesia and Micronesia: Stability and Change...physical anthropology in the United States-Hrdlicka, based at...

ROBERT I. LEVY

1983-05-20T23:59:59.000Z

491

Insects Attacking Vegetable Crops.  

E-Print Network [OSTI]

-brown or brownish- gray moths with wing expanse of about 1% inches and a small but prominent white dot near the center of each forewing. Larva. Young worms are pale green and have looping habits; older worms do not loop while crawling. The mature larva... hosts. Description: Adult. Forewings are grayish- brown with a pale spot near the middle of the front margin and have an expanse of about 1% inches. Hind wings are silvery-white with a darker front margin. Larva. Bright green with dark lateral...

Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

1964-01-01T23:59:59.000Z

492

Modeling of Damage in Cement-Based Materials Subjected to External Sulfate Attack. II: Comparison with Experiments  

E-Print Network [OSTI]

of hydration products such as ettringite can lead to internal stresses. Using the volumetric information. The general format of the equation is based on the formation of ettringite from an aluminate phase

Mobasher, Barzin

493

The Economics of Information Security  

Science Journals Connector (OSTI)

...away with claiming that their automated teller machine (ATM) system...early adoption gives way to rapid deployment once the number...in turn provides tools for modeling and investigating such networks...replace them. Using multiround simulations to study how attack and defense...

Ross Anderson; Tyler Moore

2006-10-27T23:59:59.000Z

494

Clean Cities: Information Resources  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Resources Information Resources Printable Version Share this resource Send a link to Clean Cities: Information Resources to someone by E-mail Share Clean Cities: Information Resources on Facebook Tweet about Clean Cities: Information Resources on Twitter Bookmark Clean Cities: Information Resources on Google Bookmark Clean Cities: Information Resources on Delicious Rank Clean Cities: Information Resources on Digg Find More places to share Clean Cities: Information Resources on AddThis.com... Publications Technical Assistance Information Resources Learn about Clean Cities by exploring these information resources. Publications View Clean Cities-branded publications or search for publications about alternative fuels and vehicles. Technical Assistance Learn about technical assistance available to help organizations overcome

495

LTS Information Management - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental information Radon and environmental hazard monitoring information Groundsurfaceleachate water monitoring information National Environmental Policy Act (NEPA)...

496

Networks, Information & Social Capital  

E-Print Network [OSTI]

This paper investigates how information flows enable social networks to constitute social capital. By analyzing

Aral, Sinan

2008-01-26T23:59:59.000Z

497

Information Incident Response Procedure  

E-Print Network [OSTI]

Information Incident Response Procedure Authority The Information Incident Response Procedure (IIRP) is authorized under the UWM Information Security Policy S59; section III-D (http://www4.uwm Information Security Office, and UWM Internal Audit. This document will be reviewed and updated annually

Saldin, Dilano

498

Precision Information Environments  

E-Print Network [OSTI]

Precision Information Environments Unforeseen events, such as the Hudson Bay incident, medium critical information and tools for support. Not all disasters or events that need support are unforeseen Information Environments (PIEs) will provide tailored access to information and decision support capabilities

499

Information is not physical  

E-Print Network [OSTI]

The standard relations between information theory and thermodynamics are challenged. The Szilard engine is revisited and the bound proposed by Landauer is replaced by a different one which includes errors in information processing. Instead of equivalence, complementarity of information and thermodynamical entropy is advocated. Finally, the relations between error correction and self-replication of states which can carry information are discussed.

Robert Alicki

2014-02-11T23:59:59.000Z

500

Information Annual Report  

E-Print Network [OSTI]

PENN STATE Information Technology Services 2010­2011 Annual Report COMPILATION October 19, 2011 #12 ____________________Administrative Information Services ii ______________________Consulting and Support Services iii;#12;Information Technology Services 2010­2011 i.1 Vast amounts of information are essential to function

Maroncelli, Mark