Sample records for lifecycle attack protection

  1. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTedRegion | Department of Energy4thSeparationonTrust

  2. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP by Feb.Department of EnergyTrust

  3. Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth- jack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can--by supplying of code of her choosing. In this paper, we propose to protect code from this common form of attack using

  4. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31T23:59:59.000Z

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  5. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

  6. Lifecycle Model

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21T23:59:59.000Z

    This chapter describes the lifecycle model used for the Departmental software engineering methodology.

  7. Optimal Power Grid Protection through A Defender-Attacker ...

    E-Print Network [OSTI]

    2013-08-05T23:59:59.000Z

    Abstract. Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level ... tacks on electric power systems across the world. [24]. A study ... extensively discussed critical infrastructure pro-.

  8. HANFORD RIVER PROTECTION PROJECT ENHANCED MISSION PLANNING THROUGH INNOVATIVE TOOLS LIFECYCLE COST MODELING AND AQUEOUS THERMODYNAMIC MODELING - 12134

    SciTech Connect (OSTI)

    PIERSON KL; MEINERT FL

    2012-01-26T23:59:59.000Z

    Two notable modeling efforts within the Hanford Tank Waste Operations Simulator (HTWOS) are currently underway to (1) increase the robustness of the underlying chemistry approximations through the development and implementation of an aqueous thermodynamic model, and (2) add enhanced planning capabilities to the HTWOS model through development and incorporation of the lifecycle cost model (LCM). Since even seemingly small changes in apparent waste composition or treatment parameters can result in large changes in quantities of high-level waste (HLW) and low-activity waste (LAW) glass, mission duration or lifecycle cost, a solubility model that more accurately depicts the phases and concentrations of constituents in tank waste is required. The LCM enables evaluation of the interactions of proposed changes on lifecycle mission costs, which is critical for decision makers.

  9. A recent study of meteorological conditions around the Pentagon will support development of a system to protect its 25,000+ occupants from chemical, biological, and radiological attack.

    E-Print Network [OSTI]

    Knievel, Jason Clark

    of a system to protect its 25,000+ occupants from chemical, biological, and radiological attack. I nFEBRUARY 2007AMERICAN METEOROLOGICAL SOCIETY | #12;of the most likely targets for a future terrorist attack

  10. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01T23:59:59.000Z

    08 Lifecycle Analyses of Biofuels Draft Report (May be citedLIFECYCLE ANALYSES OF BIOFUELS Draft manuscript (may belifecycle analysis (LCA) of biofuels for transportation has

  11. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M., E-mail: alex.scherbakov@gmail.com [Laboratory of Clinical Biochemistry, Institute of Clinical Oncology, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation); Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E. [Laboratory of Molecular Endocrinology, Institute of Carcinogenesis, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation); Berstein, Lev M. [Laboratory of Oncoendocrinology, N.N. Petrov Research Institute of Oncology, St. Petersburg 197758 (Russian Federation); Krasilnikov, Mikhail A. [Laboratory of Molecular Endocrinology, Institute of Carcinogenesis, N.N. Blokhin Cancer Research Centre, Kashirskoye sh. 24, Moscow 115478 (Russian Federation)

    2013-12-10T23:59:59.000Z

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: Snail1 protects breast cancer cells from hypoxia. Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. Snail/?-catenin signaling is negatively controlled by the energy sensor AMPK. The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  12. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  13. TransportAware IP Routers: a Builtin Protection Mechanism to Counter DDoS Attacks

    E-Print Network [OSTI]

    Wang, Haining

    is a powerful builtin pro tection mechanism to counter DDoS attacks, reducing the vulnerability of Internet Wang and Kang G. Shin RealTime Computing Laboratory Department of Electrical Engineering and Computer isolation by the current IP routers exposes their vulnerability to Distributed Denial of Service (DDo

  14. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    SciTech Connect (OSTI)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29T23:59:59.000Z

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  15. Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security

    E-Print Network [OSTI]

    Laszlo B. Kish

    2006-02-13T23:59:59.000Z

    It is shown that the original Kirchhoff-loop-Johnson(-like)-noise (KLJN) cipher is naturally protected against the man-in-the-middle (MITM) attack, if the eavesdropper is using resistors and noise voltage generators just like the sender and the receiver. The eavesdropper can extract zero bit of information before she is discovered. However, when the eavesdropper is using noise current generators, though the cipher is protected, the eavesdropper may still be able to extract one bit of information while she is discovered. For enhanced security, we expand the KLJN cipher with the comparison of the instantaneous voltages via the public channel. In this way, the sender and receiver has a full control over the security of measurable physical quantities in the Kirchhoff-loop. We show that when the sender and receiver compare not only their instantaneous current data but also their instantaneous voltage data then the zero-bit security holds even for the noise current generator case. We show that the original KLJN scheme is also zero-bit protected against that type of MITM attack when the eavesdropper uses voltage noise generators, only. In conclusion, within the idealized model scheme, the man-in-the-middle-attack does not provide any advantage compared to the regular attack considered earlier. The remaining possibility is the attack by a short, large current pulse, which described in the original paper as the only efficient type of regular attacks, and that yields the one bit security. In conclusion, the KLJN cipher is superior to known quantum communication schemes in every respect, including speed, robustness, maintenance need, price and its natural immunity against the man-in-the-middle attack.

  16. Lifecycle Analyses of Biofuels

    E-Print Network [OSTI]

    Delucchi, Mark

    2006-01-01T23:59:59.000Z

    Balances for a Range of Biofuel Options, Project Number8. F UELCYCLE EMISSIONS FOR BIOFUEL VEHICLES IN DIFFERENTch. and LEM % ch. For a few biofuel lifecycles there can be

  17. Convective Cloud Lifecycles Lunchtime seminar

    E-Print Network [OSTI]

    Plant, Robert

    Convective Cloud Lifecycles Lunchtime seminar 19th May 2009 Bob Plant Department of Meteorology, University of Reading, UK #12;Introduction Obtain life cycle statistics for clouds in CRM simulations Why Conclusions Convective Cloud Lifecycles p.1/3 #12;Why bother? Convective Cloud Lifecycles p.2/3 #12;Some

  18. Managing Variability throughout the Software Development Lifecycle

    E-Print Network [OSTI]

    Managing Variability throughout the Software Development Lifecycle Neil Loughran and Awais Rashid levels of the software development lifecycle, especially when new requirements arise. We believe of the software development lifecycle. Moreover, the effects of variability and, in particular, new variabilities

  19. On environmental lifecycle assessment for policy selection

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2010-01-01T23:59:59.000Z

    fossil fuel Co-product Biofuel (a) Lifecycle assessmentof lifecycle emissions across multiple products reduces theproduct or service. For instance, the 2 http://usda.mannlib.cornell.edu/usda/ers/94005/2010/Table18.xls lifecycle

  20. Trust Anchor Fact Sheet.cdr

    Broader source: Energy.gov (indexed) [DOE]

    Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Cryptographically secure software providing independent testing, monitoring, and control of energy...

  1. The DCC Curation Lifecycle Model

    E-Print Network [OSTI]

    Royal Holloway, University of London

    in the development of shared standards, tools and suitable software. Be aware of, and undertake managementThe DCC Curation Lifecycle Model Description and Representation Information Preservation Planning the curation lifecycle of digital material. This would include plans for management and administration of all

  2. Life-cycle Assessment of Semiconductors

    E-Print Network [OSTI]

    Boyd, Sarah B.

    2009-01-01T23:59:59.000Z

    SemiconductorThe Semiconductor Industry: Size, Growth andSemiconductor Life-cycle Environmental Impacts . . . . . . .

  3. The DCC Curation Lifecycle Model

    E-Print Network [OSTI]

    Higgins, Sarah

    2009-01-01T23:59:59.000Z

    The DCC Curation Lifecycle Model provides a graphical high level overview of the stages required for successful curation and preservation of data from initial conceptualisation or receipt. The model can be used to plan activities within...

  4. Geographically Differentiated Life-cycle Impact Assessment of Human Health

    E-Print Network [OSTI]

    Humbert, Sebastien

    2009-01-01T23:59:59.000Z

    indicators in life-cycle assessment (LCA). Human Ecologicalindicators in life-cycle assessment (LCA). Human EcologicalI explore how life-cycle assessment (LCA) results can

  5. Life-cycle Assessment of Semiconductors

    E-Print Network [OSTI]

    Boyd, Sarah B.

    2009-01-01T23:59:59.000Z

    yield. A hybrid life cycle assessment (LCA) model is used;more accurate life-cycle assessment (LCA) of electronicthe purposes of life-cycle assessment (LCA). While it may be

  6. Analyzing Characteristics of Incremental Lifecycle by using

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    of increments #12;2006-10-02 5/18 Background(1/2) Incremental lifecycle Divide software product into piecesAnalyzing Characteristics of Incremental Lifecycle by using Simulation 2006.09.13 #12;2006-10-02 2 contribution Research plan #12;2006-10-02 3/18 Motivation(1/2) Flexible lifecycle model has difficulty

  7. Information Systems Analysis and Design CSC340 2002 Jaelson Castro and John Mylopoulos Lifecycles --1

    E-Print Network [OSTI]

    Mylopoulos, John

    lifecyclesoftware system lifecycle is a software process by which a software system is developed, tested, installed Lifecycles -- 1 III. Software LifecyclesIII. Software Lifecycles Software processes and lifecyclesSoftware Information system development lifecycleInformation system development lifecycle Lifecycle phasesLifecycle

  8. Economics of Lifecycle analysis and greenhouse gas regulations

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2009-01-01T23:59:59.000Z

    is at the product-level, when lifecycle emissions are notduring the lifecycle of a product. LCA is a systems approachfootprint of a product over its entire lifecycle from raw

  9. PRODUCT REPRESENTATION IN LIGHTWEIGHT FORMATS FOR PRODUCT LIFECYCLE MANAGEMENT (PLM)

    E-Print Network [OSTI]

    Rzepa, Henry S.

    PRODUCT REPRESENTATION IN LIGHTWEIGHT FORMATS FOR PRODUCT LIFECYCLE MANAGEMENT (PLM) Lian Ding environments and the entire product lifecycle. There are new requirements for product representations, including: platform/application independence, support for the product lifecycle, rapidly sharing information

  10. Lifecycle Cost Analysis of Hydrogen Versus Other Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy...

  11. Predicting software defects in varying development lifecycles

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    Predicting software defects in varying development lifecycles using Bayesian nets Information and Software Technology (2007) Norman Fenton, Martin Neil, William March, Peter HyeonJeong Kim KAIST SE LAB #12;Contents Introduction Overall approach Analyzing the lifecycle Modeling the defect prediction

  12. Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets

    E-Print Network [OSTI]

    Fenton, Norman

    Predicting Software Defects in Varying Development Lifecycles using Bayesian Nets Norman Fenton, this has required a custom- built BN for each software development lifecycle. We describe a more general BN software development lifecycle to reflect both the differing number of testing stages in the lifecycle

  13. Life-cycle Assessment of Semiconductors

    E-Print Network [OSTI]

    Boyd, Sarah B.

    2009-01-01T23:59:59.000Z

    global warming intensity of electricity (at the locations of productionproduction as a result of the high global warming intensity of electricityelectricity mix at the production site on total life-cycle global warming

  14. Engineering Capabilities Full Lifecycle Program Management

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    Engineering Capabilities Full Lifecycle Program Management-loopandprecisionclosed-loopcontrol Flight Software Embeddedsystemstocontrolflightinstrumentsandspacecraft Groundsystemssuchas Vacuumandthermalenvironmentaltestingfacilities LASP specializes in the design and development of flight instruments and spacecraft, with a focus

  15. Engineering Capabilities Full Lifecycle Program Management

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    Mechanical and Thermal Engineering Opticalandelectromagneticfieldsinstrumentdesign, analysis,andtest One-changing technologies. Mechanical and Thermal Engineering Calibration and Test Systems Engineering ElectricalEngineering Capabilities Full Lifecycle Program Management

  16. Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

  17. Efficient DHT attack mitigation through peers' ID distribution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Efficient DHT attack mitigation through peers' ID distribution Thibault Cholez, Isabelle Chrisment.festor}@loria.fr Abstract--We present a new solution to protect the widely deployed KAD DHT against localized attacks which DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback

  18. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...

    Broader source: Energy.gov (indexed) [DOE]

    - Protecting Intelligent Distributed Power Grids Against Cyber Attacks - Dong Wei, Siemens.pdf CEDS 2010 Peer Review - Protecting PCS Against Lifecycle Attacks Using Trust...

  19. Life of Sugar: Developing Lifecycle Methods to Evaluate the Energy and Environmental Impacts of Sugarcane Biofuels

    E-Print Network [OSTI]

    Gopal, Anand Raja

    2011-01-01T23:59:59.000Z

    flows associated with the lifecycle of a product are staticemployed for a product over its entire lifecycle. A CLCAstages of the lifecycle into single product pathways which

  20. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect (OSTI)

    Peng Liu

    2005-11-28T23:59:59.000Z

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Lifecycle analysis: Uses and pitfalls

    SciTech Connect (OSTI)

    Gaines, L.; Stodolsky, F.

    1997-04-01T23:59:59.000Z

    Lifecycle analysis (LCA) is a powerful tool, often used as an aid to decision making in industry and for public policy. LCA forms the foundation of the newly-invented field of industrial ecology. There are several possible uses and users for this tool. It can be used to evaluate the impacts from a process or from production and use of a product. Impacts from competing products or processes can be compared to help manufacturers or consumers choose among options, including foregoing the service the product or process would have provided because the impacts are too great. Information about impacts can be used by governments to set regulations, taxes, or tariffs; to allocate funds for research and development (R&D) or low-interest loans; or to identify projects worthy to receive tax credits. In addition, LCA can identify key process steps and, most important, key areas where process changes, perhaps enabled by R&D, could significantly reduce impacts. Analysts can use the results to help characterize the ramifications of possible policy options or technological changes.

  2. Arab states seek Libya no-fly zone Regional bloc calls on UN Security Council to take steps to protect civilians from air attack by

    E-Print Network [OSTI]

    Arab states seek Libya no-fly zone Regional bloc calls on UN Security Council to take steps on the United Nations Security Council to impose a no-fly zone over Libya in a bid to protect civilians from air the civilian population of Libya. "The Arab League has officially requested the UN Security Council to impose

  3. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Office of Environmental Management (EM)

    Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems A...

  4. SOFTWARE EVOLUTION AND THE STAGED MODEL OF THE SOFTWARE LIFECYCLE

    E-Print Network [OSTI]

    1 SOFTWARE EVOLUTION AND THE STAGED MODEL OF THE SOFTWARE LIFECYCLE K. H. Bennett Research............................................................................................................11 1.5 Iterative software development ...............................................................................................................19 1.10 The stages of the software lifecycle

  5. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    this possibility, a life-cycle assessment (LCA) of NAND ?ashstudy presents a life-cycle assessment (LCA) of ?ash memoryInput- Output Life Cycle Assessment (EIO-LCA), US 1997

  6. Centralize and automate defect identification earlier in the development lifecycle

    E-Print Network [OSTI]

    Software Analyzer Highlights Helps identify code-level issues early in the software development lifecycle environments Identifying code-level issues early in the software development lifecycle One of the unfortunate in the software development lifecycle. A rich set of programming rules-- including more than 550 JavaTM rules

  7. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    E-Print Network [OSTI]

    Kelly, Tim

    Safety Lifecycle for Developing Safety Critical Artificial Neural Networks Zeshan Kurd, Tim Kelly.kelly}@cs.york.ac.uk Abstract. Artificial neural networks are employed in many areas of industry such as medicine and defence a safety lifecycle for artificial neural networks. The lifecycle fo- cuses on managing behaviour

  8. Safety Criteria and Safety Lifecycle for Artificial Neural Networks

    E-Print Network [OSTI]

    Kelly, Tim

    Safety Criteria and Safety Lifecycle for Artificial Neural Networks Zeshan Kurd, Tim Kelly and Jim. The paper also presents a safety lifecycle for artificial neural networks. This lifecycle focuses, knowledge. INTRODUCTION Artificial neural networks (ANNs) are used in many safety-related applications

  9. IMPACT OF INDIVIDUAL COGNITION ON PRODUCT LIFECYCLE MANAGEMENT SYSTEMS

    E-Print Network [OSTI]

    Boyer, Edmond

    IMPACT OF INDIVIDUAL COGNITION ON PRODUCT LIFECYCLE MANAGEMENT SYSTEMS Pierre-Emmanuel Arduin of Compigne, France 1. Introduction Product Lifecycle Management (PLM) aims at an integrated management of all product-related information and processes through the entire lifecycle for Terzi et al. (2010). Within

  10. Divergence and Lifecycle Offsets in Product Families with Commonality

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Divergence and Lifecycle Offsets in Product Families with Commonality Ryan Boas,1 * Bruce G Massachusetts Institute of Technology, Cambridge, MA 02139DIVERGENCE AND LIFECYCLE OFFSETS IN PRODUCT FAMILIES benefits across individual products. We predict that lifecycle offsets exacerbate divergence. We propose

  11. Extracting Artifact Lifecycle Models from Metadata History

    E-Print Network [OSTI]

    Godfrey, Michael W.

    Extracting Artifact Lifecycle Models from Metadata History Olga Baysal, Oleksii Kononenko, Reid, Canada {obaysal, okononen, rtholmes, migod}@cs.uwaterloo.ca Abstract--Software developers and managers make decisions based on the understanding they have of their software systems. This understanding

  12. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Against Data Injection Attacks on Power Grids, IEEER. Thomas, and L. Tong, Malicious Data Attacks on SmartState Estimation: Attack Strategies and Countermeasures,

  13. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Data Injection Attacks on Power Grids, IEEE Transactionson Smart Grid, vol. 2, no. 2, June [21] O. Kosut, L.Data Attacks on Smart Grid State Estimation: Attack

  14. Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response

    E-Print Network [OSTI]

    Noel, Steven

    1 Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response Steven Noel of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways and attacker exploits provides an attack graph showing all possible paths to critical assets. We then place IDS

  15. Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources

    E-Print Network [OSTI]

    Park, Jung-Min

    Attack Diagnosis: Throttling Distributed Denial- of-Service Attacks Close to the Attack Sources Polytechnic Institute and State University Blacksburg, VA 24061 {rlchen, jungmin}@vt.edu Abstract-- Attack mitigation schemes actively throttle attack traffic generated in Distributed Denial-of-Service (DDoS) attacks

  16. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

    2014-01-01T23:59:59.000Z

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  17. Quantum-Space Attacks

    E-Print Network [OSTI]

    Ran Gelles; Tal Mor

    2007-11-25T23:59:59.000Z

    Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.

  18. active stage lifecycle: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Analysis of Transportation Fuels and Vehicle with life-cycle analysis (LCA). In fact, LCA of transportation fuels and vehicle systems has a history Bustamante, Fabin E. 89...

  19. Economics of Lifecycle analysis and greenhouse gas regulations

    E-Print Network [OSTI]

    Rajagopal, Deepak

    2009-01-01T23:59:59.000Z

    2 The role of economics in lifecycle environmental impact3 Economics of biofuels: Impact on food and 3.1Agricultural & Resource Economics, UCB, page 1058, 2008. [5

  20. Life-Cycle Analysis Results of Geothermal Systems in Comparison...

    Broader source: Energy.gov (indexed) [DOE]

    & Publications Life-Cycle Analysis Results of Geothermal Systems in Comparison to Other Power Systems Water Use in the Development and Operation of Geothermal Power Plants Water...

  1. Building Computer Network Attacks

    E-Print Network [OSTI]

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01T23:59:59.000Z

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  2. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    E-Print Network [OSTI]

    Ou, Xinming "Simon"

    Improving Attack Graph Visualization through Data Reduction and Attack Grouping John Homer1 Laboratory, USA Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often

  3. CIRP Design Conference 2011 Product Lifecycle Management Model for Design Information Management in

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    CIRP Design Conference 2011 Product Lifecycle Management Model for Design Information Management Product Lifecycle Management (PLM) is one way to improve productivity in all manufacturing companies. Keywords: Product Lifecycle Management, Product Process Organisation Model, Unified Modelling Language 1

  4. International Conference on Product Lifecycle Management 1 Copyright 2007 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    International Conference on Product Lifecycle Management 1 Copyright 2007 Inderscience deals with the proposal of a framework for coordinating design process through a PLM (Product Lifecycle, published in "Product Lifecycle Management, Italy (2007)" #12;Guillaume Pol, Christophe Merlo, Jrmy

  5. 7th International Conference on Product Lifecycle Management 1 Semantic tags for generative multiview product

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    7th International Conference on Product Lifecycle Management 1 Semantic tags for generative. Conf. Product Lifecycle Management. Biographical notes: Thomas Paviot is an Assistant Professor and the Product Lifecycle Management (PLM) strategy are solutions allowing to achieve objectives of cost

  6. Life-Cycle Evaluation of Concrete Building Construction as a Strategy for Sustainable Cities

    E-Print Network [OSTI]

    Stadel, Alexander

    2013-01-01T23:59:59.000Z

    and use of a new life-cycle assessment (LCA) model forknown as life-cycle assessment (LCA). An LCA employs dataliterature related to life-cycle assessment (LCA) applied to

  7. International Conference on Product Lifecycle Management Copyright 2009 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    International Conference on Product Lifecycle Management Copyright 2009 Inderscience Enterprises, the ability to describe a system from different viewpoints such as different disciplinary domains, life-cycle

  8. International Conference on Product Lifecycle Management 527 Copyright 2010 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    International Conference on Product Lifecycle Management 527 Copyright 2010 Inderscience such as different disciplinary domains, life-cycle phases, or levels of detail, fidelity and abstraction is required

  9. Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities

    E-Print Network [OSTI]

    Lu, Hongyou

    2010-01-01T23:59:59.000Z

    The use of life-cycle assessment (LCA) to understand theIntroduction Life-cycle assessment (LCA) is an important

  10. Guidance on Life-Cycle Cost Analysis Required by Executive Order...

    Energy Savers [EERE]

    Documents & Publications Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis -...

  11. High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Merat, Francis L.

    1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1 Polytechnic University, Brooklyn, NY 11201 ABSTRACT Protection from Distributed Denial-of-Service attacks has been of a great interest recently and substantial progress has been made for preventing some attack

  12. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Reiter, Michael

    the measurements of meters at physically protected locations such as substations, such attacks can introduce13 False Data Injection Attacks against State Estimation in Electric Power Grids YAO LIU and PENG also defeat malicious measurements injected by attackers. In this article, we expose an unknown

  13. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduceFalse Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu and Peng Ning also defeat malicious measurements injected by attackers. In this paper, we expose an unknown

  14. Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

    E-Print Network [OSTI]

    Tsigas, Philippas

    S attack themselves. Here we study the case where the communicating parties have clocks with rate drift. The situa- tion is even worse with distributed denial of service(DDoS) attacks, where multiple compromised in order to make the service unavail- able [7]. Common methods to protect systems from DoS and DDoS attacks

  15. Model-based Lifecycle Optimization of Well Locations

    E-Print Network [OSTI]

    Van den Hof, Paul

    Model-based Lifecycle Optimization of Well Locations and Production Settings in Petroleum Reservoirs #12;#12;MODEL-BASED LIFECYCLE OPTIMIZATION OF WELL LOCATIONS AND PRODUCTION SETTINGS IN PETROLEUM System Approach Petroleum Production" (ISAPP) programme. The knowledge center is a long-term co

  16. On Exceptions, Exception Handling, Requirements and Software Lifecycle Alexander Romanovsky

    E-Print Network [OSTI]

    Southampton, University of

    On Exceptions, Exception Handling, Requirements and Software Lifecycle Alexander Romanovsky Notes. 32(2). 2007. [2] R. de Lemos, and A. Romanovsky. Exception handling in the software lifecycle. Castor Filho. Exception handling in the development of dependable component-based systems. Software

  17. (UR-16) Integrated Framework for Lifecycle Infrastructure Management Systems

    E-Print Network [OSTI]

    Hammad, Amin

    1 (UR-16) Integrated Framework for Lifecycle Infrastructure Management Systems Cheng Zhang1 Elaheh throughout the lifecycle of an infrastructure system, such as a bridge, including construction, inspection only limited support for representing and visualizing this information. Using a 4D product model

  18. Protecting Intelligent Distributed Power Grids Against Cyber...

    Broader source: Energy.gov (indexed) [DOE]

    will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation,...

  19. Microarchitectural Attacks and Countermeasures

    E-Print Network [OSTI]

    Chapter 18 Microarchitectural Attacks and Countermeasures Onur Aciicmez and C etin Kaya Koc 18+Business Media, LLC 2009 475 #12;476 Onur Aciicmez and C etin Kaya Koc attention on analysis of computer

  20. ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack of a

    E-Print Network [OSTI]

    Boyer, Edmond

    ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack, a "root of trust" must be defined, insulated and then carefully protected. Until very recently, this role agencies) have tackled the issue of protecting ASICs from side-channel attacks (SCAs). In the meantime

  1. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  2. RESEARCH AND ANALYSIS Comparison of Life-Cycle

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    -output life-cycle assessment (EIO-LCA) model; and SimaPro software equipped with the Franklin database. EIO-LCA model estimated for emis- sions of particulate matter less than 10 micrograms (PM10) resulting from wind

  3. Geographically Differentiated Life-cycle Impact Assessment of Human Health

    E-Print Network [OSTI]

    Humbert, Sebastien

    2009-01-01T23:59:59.000Z

    Life-cycle assessment of coal fly ash disposal: Influence ofto the case of coal fly ash disposal. The influence ofLife-cycle assessment of coal fly ash disposal: Influence of

  4. Integration between MES and Product Lifecycle Management Anis BEN KHEDHER

    E-Print Network [OSTI]

    Boyer, Edmond

    Lifecycle Management (PLM) approach, success of design, industrialization and production activities depends mainly PLM system, Enterprise Resource Planning system (ERP) and Manufacturing Execution System (MES, industrialization and production. This involves the PLM and MES integration. Thus, the proposed approach aims

  5. The Loop ... Lifecycle: Empathy and Design for Complex Processes.

    E-Print Network [OSTI]

    Lambert, Katherine

    2009-01-01T23:59:59.000Z

    each product within the context of its discreet LIFECYCLE,products - from Peek Mobile Devices, Palm Pilots to TiVo boxes. LIFECYCLELIFECYCLE directive, their solution would not generate the sales and distribution of materially based products.

  6. Lifecycle Value Framework for Tactical Aircraft Product Development

    E-Print Network [OSTI]

    Hallander, Ingrid

    Due to a dramatic reduction in defense procurement, the benchmark for developing new defense systems today is performance at an affordable cost. In an attempt to encircle a more holistic perspective of value, lifecycle ...

  7. Colectica for Excel: Using DDI Lifecycle with Spreadsheets

    E-Print Network [OSTI]

    Smith, Dan

    2013-04-02T23:59:59.000Z

    software, a free tool to document statistical data using open standards. The software implements leading open standards including the Data Documentation Initiative (DDI) Lifecycle version 3 and ISO 11179. Using this software allows organizations to both...

  8. Life-Cycle Analysis and Energy Efficiency in State Buildings

    Broader source: Energy.gov [DOE]

    Several provisions of Missouri law govern energy efficiency in state facilities. In 1993 Missouri enacted legislation requiring life-cycle cost analysis for all new construction of state buildings...

  9. Paper Number Whole Lifecycle Electrical Design Analysis in Foresight

    E-Print Network [OSTI]

    Snooke, Neal

    and Effects Analysis (FMEA) or Sneak Circuit Analysis (SCA) is typically carried out once in the lifecycle techniques have been developed. FMEA. Failure mode and effects analysis considers the effect on an overall

  10. The Life-cycle of Operons

    SciTech Connect (OSTI)

    Price, Morgan N.; Arkin, Adam P.; Alm, Eric J.

    2005-11-18T23:59:59.000Z

    Operons are a major feature of all prokaryotic genomes, but how and why operon structures vary is not well understood. To elucidate the life-cycle of operons, we compared gene order between Escherichia coli K12 and its relatives and identified the recently formed and destroyed operons in E. coli. This allowed us to determine how operons form, how they become closely spaced, and how they die. Our findings suggest that operon evolution is driven by selection on gene expression patterns. First, both operon creation and operon destruction lead to large changes in gene expression patterns. For example, the removal of lysA and ruvA from ancestral operons that contained essential genes allowed their expression to respond to lysine levels and DNA damage, respectively. Second, some operons have undergone accelerated evolution, with multiple new genes being added during a brief period. Third, although most operons are closely spaced because of a neutral bias towards deletion and because of selection against large overlaps, highly expressed operons tend to be widely spaced because of regulatory fine-tuning by intervening sequences. Although operon evolution seems to be adaptive, it need not be optimal: new operons often comprise functionally unrelated genes that were already in proximity before the operon formed.

  11. The Life-cycle of Operons

    SciTech Connect (OSTI)

    Price, Morgan N.; Arkin, Adam P.; Alm, Eric J.

    2007-03-15T23:59:59.000Z

    Operons are a major feature of all prokaryotic genomes, buthow and why operon structures vary is not well understood. To elucidatethe life-cycle of operons, we compared gene order between Escherichiacoli K12 and its relatives and identified the recently formed anddestroyed operons in E. coli. This allowed us to determine how operonsform, how they become closely spaced, and how they die. Our findingssuggest that operon evolution may be driven by selection on geneexpression patterns. First, both operon creation and operon destructionlead to large changes in gene expression patterns. For example, theremoval of lysA and ruvA from ancestral operons that contained essentialgenes allowed their expression to respond to lysine levels and DNAdamage, respectively. Second, some operons have undergone acceleratedevolution, with multiple new genes being added during a brief period.Third, although genes within operons are usually closely spaced becauseof a neutral bias toward deletion and because of selection against largeoverlaps, genes in highly expressed operons tend to be widely spacedbecause of regulatory fine-tuning by intervening sequences. Althoughoperon evolution may be adaptive, it need not be optimal: new operonsoften comprise functionally unrelated genes that were already inproximity before the operon formed.

  12. The principles of life-cycle analysis

    SciTech Connect (OSTI)

    Hill, L.J.; Hunsaker, D.B.; Curlee, T.R.

    1996-05-01T23:59:59.000Z

    Decisionmakers representing government agencies must balance competing objectives when deciding on the purchase and sale of assets. The goal in all cases should be to make prudent or financially {open_quotes}cost-effective{close_quotes} decisions. That is, the revenues from the purchase or sale of assets should exceed any out-of-pocket costs to obtain the revenues. However, effects external to these financial considerations such as promoting environmental quality, creating or maintaining jobs, and abiding by existing regulations should also be considered in the decisionmaking process. In this paper, we outline the principles of life-cycle analysis (LCA), a framework that allows decisionmakers to make informed, balanced choices over the period of time affected by the decision, taking into account important external effects. Specifically, LCA contains three levels of analysis for any option: (1) direct financial benefits (revenues) and out-of-pocket costs for a course of action; (2) environmental and health consequences of a decision; and (3) other economic and socio-institutional effects. Because some of the components of LCA are difficult to value in monetary terms, the outcome of the LCA process is not generally a yes-no answer. However, the framework allows the decisionmaker to at least qualitatively consider all relevant factors in analyzing options, promoting sound decisionmaking in the process.

  13. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid, to appear in IEEE

  14. Automated analysis for lifecycle assembly processes

    SciTech Connect (OSTI)

    Calton, T.L.; Brown, R.G.; Peters, R.R.

    1998-05-01T23:59:59.000Z

    Many manufacturing companies today expend more effort on upgrade and disposal projects than on clean-slate design, and this trend is expected to become more prevalent in coming years. However, commercial CAD tools are better suited to initial product design than to the product`s full life cycle. Computer-aided analysis, optimization, and visualization of life cycle assembly processes based on the product CAD data can help ensure accuracy and reduce effort expended in planning these processes for existing products, as well as provide design-for-lifecycle analysis for new designs. To be effective, computer aided assembly planning systems must allow users to express the plan selection criteria that apply to their companies and products as well as to the life cycles of their products. Designing products for easy assembly and disassembly during its entire life cycle for purposes including service, field repair, upgrade, and disposal is a process that involves many disciplines. In addition, finding the best solution often involves considering the design as a whole and by considering its intended life cycle. Different goals and constraints (compared to initial assembly) require one to re-visit the significant fundamental assumptions and methods that underlie current assembly planning techniques. Previous work in this area has been limited to either academic studies of issues in assembly planning or applied studies of life cycle assembly processes, which give no attention to automatic planning. It is believed that merging these two areas will result in a much greater ability to design for; optimize, and analyze life cycle assembly processes.

  15. Lifecycle-analysis for heavy vehicles.

    SciTech Connect (OSTI)

    Gaines, L.

    1998-04-16T23:59:59.000Z

    Various alternative fuels and improved engine and vehicle systems have been proposed in order to reduce emissions and energy use associated with heavy vehicles (predominantly trucks). For example, oil companies have proposed improved methods for converting natural gas to zero-aromatics, zero-sulfur diesel fuel via the Fischer-Tropsch process. Major heavy-duty diesel engine companies are working on ways to simultaneously reduce particulate-matter and NOX emissions. The trend in heavy vehicles is toward use of lightweight materials, tires with lower rolling resistance, and treatments to reduce aerodynamic drag. In this paper, we compare the Mecycle energy use and emissions from trucks using selected alternatives, such as Fisher-Tropsch diesel fuel and advanced fuel-efficient engines. We consider heavy-duty, Class 8 tractor-semitrailer combinations for this analysis. The total life cycle includes production and recycling of the vehicle itself, extraction, processing, and transportation of the fuel itself, and vehicle operation and maintenance. Energy use is considered in toto, as well as those portions that are imported, domestic, and renewable. Emissions of interest include greenhouse gases and criteria pollutants. Angonne's Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model is used to generate per-vehicle fuel cycle impacts. Energy use and emissions for materials manufacturing and vehicle disposal are estimated by means of materials information from Argonne studies. We conclude that there are trade-offs among impacts. For example, the lowest fossil energy use does not necessarily result in lowest total energy use, and lower tailpipe emissions may not necessarily result in lower lifecycle emissions of all criteria pollutants.

  16. Insects Attacking Vegetable Crops.

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    of economic importance. Worms cause consider- able damage to grain sorghum heads, but they are cannibalistic and usually only one larva reaches full growth in each head as well as in each corn ear. BLACK CUTWORM, Agrotis ipsilon (Hufnagel) Cutworms.... They frequently do considerable damage to corn ears, similar to that caused by corn ear- worms. These worms also feed as "budworms" in grain sorghum and corn whorls. Unfolding leaves from whorls of such attacked crops are per- forated with holes. Like...

  17. Insects Attacking Vegetable Crops.

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    THAT SUCK THE JUICES FROM FOLIAGE, FRUITS, STEMS AND ROOTS, CAUSING DISCOLORATION, STUNTING AND OTHER DAMAGE APHIDS Aphids are small, sluggish, soft-bodied insects often called plant lice. A number of species attack various crops, sucking plant sap..., peppers or dark brown with black leg joints, eyes and and tomatoes. cornicles. Aphids build up very rapidly and leave copious quantities of honeydew on leaves. Adults POPLAR PETIOLE GALL APHID, Pemphigus and nymphs suck juices from leaves, sapping...

  18. Commissioning tools for life-cycle building performance assurance

    SciTech Connect (OSTI)

    Piette, M.A. [Lawrence Berkeley National Lab., CA (United States). Energy and Environment Div.

    1996-05-01T23:59:59.000Z

    This paper discusses information systems for building life-cycle performance analysis and the use of computer-based commissioning tools within this context. There are many reasons why buildings do not perform in practice as well as intended at the design stage. One reason is the lack of commissioning. A second reason is that design intent is not well documented, and performance targets for building components and systems are not well specified. Thus, criteria for defining verification and functional tests is unclear. A third reason is that critical information is often lost throughout the building life-cycle, which causes problems such as misunderstanding of operational characteristics and sequences and reduced overall performance. The life-cycle building performance analysis tools project discussed in this paper are focused on chillers and cooling systems.

  19. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Life-Cycle Cost Analysis - 2015 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2015 Handbook describes the annual supplements to the NIST Handbook 135 and...

  20. Life-cycle Environmental Inventory of Passenger Transportation in the United States

    E-Print Network [OSTI]

    Chester, Mikhail V

    2008-01-01T23:59:59.000Z

    Area,Chicago,andNewYorkCity are evaluated capturing passenger transportation life?cycle energyArea, Chicago, and New York City are evaluated capturing passenger trans- portation life-cycle energy

  1. CURATION AND PRESERVATION OF CAD ENGINEERING MODELS IN PRODUCT LIFECYCLE MANAGEMENT

    E-Print Network [OSTI]

    Rzepa, Henry S.

    : Curation, Preservation, Engineering, PLM, CAD Models, Multilayer Annotation, Representation Information requirements in Product Lifecycle Management (PLM) and suggest ways of alleviating the problems associated System (OAIS) Reference Model. 1. INTRODUCTION The emergence of Product Lifecycle Management (PLM

  2. Rogatus a planned open source toolset to cover the whole lifecycle

    E-Print Network [OSTI]

    Barkow, Ingo; Schiller, David

    2013-04-02T23:59:59.000Z

    During the last years several different tools for DDI Lifecycle have been published. Nevertheless none of the current tools is able to cover the full lifecycle from beginning to end. This presentation wants to show a first outlook into Rogatus...

  3. Life-Cycle Water Impacts of U.S. Transportation Fuels

    E-Print Network [OSTI]

    Scown, Corinne Donahue

    2010-01-01T23:59:59.000Z

    All but two Life-Cycle Assessment (LCA) studies make nofuels. The term life-cycle assessment (LCA) is used toInput-Output Life Cycle Assessment (EIO-LCA) US 2002 (428)

  4. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2012 Report provides tables of present-value factors for use in the life-cycle cost analysis of capital...

  5. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis-2014 Handbook describes the...

  6. Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current, and In-Stream Hydrokinetic Power Assessment of Projected Life-Cycle Costs for Wave, Tidal, Ocean Current,...

  7. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect (OSTI)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01T23:59:59.000Z

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  8. MANAGING SHORT-LIFECYCLE TECHNOLOGY PRODUCTS FOR AGERE S. David Wu

    E-Print Network [OSTI]

    Wu, David

    MANAGING SHORT-LIFECYCLE TECHNOLOGY PRODUCTS FOR AGERE SYSTEMS S. David Wu Department of Industrial demands for short-lifecycle technology products. Agere is particularly interested in using demand the leading indicator approach to various planning functions. Key words: Short-Lifecycle Technology Products

  9. International Conference on Product Lifecycle Management 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    International Conference on Product Lifecycle Management 1 Copyright 200x Inderscience.fr] Abstract: Today, within the global Product Lifecycle Management (PLM) approach, success of design the whole product lifecycle. The emergence of the PLM concept with the deployment of PLM systems has

  10. Suryn-Abran Consolidated Quality Lifecycle (CQL) Model -the Applicative Evolution

    E-Print Network [OSTI]

    Suryn, Witold

    in his efforts in implementing and maintaining quality throughout the lifecycle of a software product to speak engineer) the quality of the software product throughout its entire lifecycle. The modelSuryn-Abran Consolidated Quality Lifecycle (CQL) Model - the Applicative Evolution Witold Suryn1

  11. DDI-Lifecycle and Colectica at the UCLA Social Science Data Archive

    E-Print Network [OSTI]

    Iverson, Jeremy; Stephenson, Elizabeth

    2013-04-02T23:59:59.000Z

    is to document the entire lifecycle of a data product, the DDI-Lifecycle standard plays a key role in the solution. This paper explores how DDI-Lifecycle and Colectica can help a data archive with limited staff and resources deliver a rich data documentation...

  12. Lifecycle Knowledge Management: Getting the Semantics Across in X-Media

    E-Print Network [OSTI]

    Staab, Steffen

    the semantic infrastructure technology that we estimate will help us to achieve our goals of product lifecycle that require complex analysis of the product lifecycle, such as resolu- tion of non-trivial technical problems knowledge and experience in different areas of the product lifecycle. The lack of flexible mechanisms

  13. International Conference on Product Lifecycle Management 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    International Conference on Product Lifecycle Management 1 Copyright 200x Inderscience Enterprises Ltd. Design and logistics IT federation through Product Lifecycle Support standard Thomas Paviot.lamouri@supmeca.fr Abstract: Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM

  14. Commonality in Complex Product Families: Implications of Divergence and Lifecycle Offsets

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Commonality in Complex Product Families: Implications of Divergence and Lifecycle Offsets by Ryan C Committee #12;2 #12;3 Commonality in Complex Product Families: Implications of Divergence and Lifecycle product family planning and lifecycle management, and ultimately, to improving corporate profitability

  15. A game theory framework for cooperative management of refillable and disposable bottle lifecycles

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    A game theory framework for cooperative management of refillable and disposable bottle lifecycles applies game theory to the lifecycle of bottle packaging, and presents a framework for analysis. Keywords: Lifecycle management; Reuse; Packaging; Industrial ecology 1. Introduction One of the fundamental

  16. A Life-Cycle Energy and Inventory Analysis of FinFET Integrated Circuits

    E-Print Network [OSTI]

    Pedram, Massoud

    . Life-Cycle Assessment (LCA) has been increasingly used to assess environmental implicationsA Life-Cycle Energy and Inventory Analysis of FinFET Integrated Circuits Yanzhi Wang, Ying Zhang as the next-generation semiconductor technology. This paper is the first attempt in reporting the life-cycle

  17. A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural Health Monitoring

    E-Print Network [OSTI]

    Stanford University

    1 A Computational Framework for Life-Cycle Management of Wind Turbines incorporating Structural of wind turbines and reducing the life-cycle costs significantly. This paper presents a life-cycle management (LCM) framework for online monitoring and performance assessment of wind turbines, enabling

  18. Attacks on Singelee and Preneel's protocol Jorge Munilla and Alberto Peinado

    E-Print Network [OSTI]

    establishment protocol in wireless personal area networks. Nevertheless, in this paper we show effective relay- tion) systems, most of them are still vulnerable to relay attacks. This attack is conceptually depicted. Then both rogue parties readily forward each other all the messages. The electronic protection is thus

  19. Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3

    E-Print Network [OSTI]

    Jagannatham, Aditya K.

    #12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

  20. Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning

    E-Print Network [OSTI]

    Noh, Sanguk

    Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning Sanguk Noh1 of Service (DDoS) flooding at- tacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none

  1. Sandia National Laboratories: publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratories, August 2010. 2009 Adrian R. Chavez, Position Paper: Protecting Process Control Systems against Lifecycle Attacks Using Trust Anchors Sandia National ... Page 1...

  2. Integrating a life-cycle assessment with NEPA: Does it make sense?

    SciTech Connect (OSTI)

    ECCLESTON, C.H.

    1998-09-03T23:59:59.000Z

    The National Environmental Policy Act (NEPA) of 1969 provides the basic national charter for protection of the environment in the US. Today NEPA has provided an environmental policy model which has been emulated by nations around the world. Recently, questions have been raised regarding the appropriateness and under what conditions it makes sense to combine the preparation of a NEPA analysis with the International Organization for Stnadardization (ISO) - 14000 Standards for Life-Cycle Assessment (LCA). This paper advantages a decision making tool consisting of six discrete criteria which can be employed by a user in reaching a decision regarding the integration of NEPA analysis and LCA. Properly applied, this tool should reduce the risk that a LCA may be inappropriately prepared and integrated with a NEPA analysis.

  3. Comparative Life-Cycle Air Emissions of Coal, Domestic Natural

    E-Print Network [OSTI]

    Jaramillo, Paulina

    come domestically from the production of synthetic natural gas (SNG) via coal gasification- methanation gasification technologies that use coal to produce SNG. This National Gasification Strategy callsComparative Life-Cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity

  4. Comparative Life-cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity Generation

    E-Print Network [OSTI]

    Jaramillo, Paulina

    1 Comparative Life-cycle Air Emissions of Coal, Domestic Natural Gas, LNG, and SNG for Electricity from the LNG life-cycle. Notice that local distribution of natural gas falls outside our analysis boundary. Figure 1S: Domestic Natural Gas Life-cycle. Figure 2S: LNG Life-cycle. Processing Transmission

  5. 8th International Conference on Product Lifecycle Management 1 The Cone-BOM model for consistent and

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    8th International Conference on Product Lifecycle Management 1 The Cone-BOM model for consistent as one of the major open issues in the field of Product Lifecycle Management. Especially, the BOM representation', 8th Int. Conf. Product Lifecycle Management. 1 Introduction Product Lifecycle Management (PLM

  6. Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection

    E-Print Network [OSTI]

    Mueller, Frank

    from cyber attacks. While this assumption may not be sound, substations themselves are a more likely link at a substation) could allow attackers to affect power devices. Some protection could be provided to invest in research on the protection of the power grid, both from the perspective of cyber attacks

  7. A Comparative Approach to the Protection of Fashion Innovations

    E-Print Network [OSTI]

    Wulf, Alexander

    2007-01-01T23:59:59.000Z

    Innovation Factor: High Product Lifecycle: Short Supplier:Innovation Factor: Low Product Lifecycle: Long Market Volume

  8. Sulfate attack expansion mechanisms

    SciTech Connect (OSTI)

    Mllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15T23:59:59.000Z

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (1050 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  9. Market disruption, cascading effects, and economic recovery:a life-cycle hypothesis model.

    SciTech Connect (OSTI)

    Sprigg, James A.

    2004-11-01T23:59:59.000Z

    This paper builds upon previous work [Sprigg and Ehlen, 2004] by introducing a bond market into a model of production and employment. The previous paper described an economy in which households choose whether to enter the labor and product markets based on wages and prices. Firms experiment with prices and employment levels to maximize their profits. We developed agent-based simulations using Aspen, a powerful economic modeling tool developed at Sandia, to demonstrate that multiple-firm economies converge toward the competitive equilibria typified by lower prices and higher output and employment, but also suffer from market noise stemming from consumer churn. In this paper we introduce a bond market as a mechanism for household savings. We simulate an economy of continuous overlapping generations in which each household grows older in the course of the simulation and continually revises its target level of savings according to a life-cycle hypothesis. Households can seek employment, earn income, purchase goods, and contribute to savings until they reach the mandatory retirement age; upon retirement households must draw from savings in order to purchase goods. This paper demonstrates the simultaneous convergence of product, labor, and savings markets to their calculated equilibria, and simulates how a disruption to a productive sector will create cascading effects in all markets. Subsequent work will use similar models to simulate how disruptions, such as terrorist attacks, would interplay with consumer confidence to affect financial markets and the broader economy.

  10. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01T23:59:59.000Z

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  11. Geothermal completion technology life-cycle cost model (GEOCOM)

    SciTech Connect (OSTI)

    Mansure, A.J.; Carson, C.C.

    1982-01-01T23:59:59.000Z

    GEOCOM is a model developed to evaluate the cost effectiveness of alternative technologies used in the completion, production, and maintenance of geothermal wells. The model calculates the ratio of life-cycle cost to life-cycle production or injection and thus is appropriate for evaluating the cost effectiveness of a geothermal well even when the most economically profitable well completion strategies do not result in lowest capital costs. The project to develop the GEOCOM model included the establishment of a data base for studying geothermal completions and preliminary case/sensitivity studies. The code has the data base built into its structure as default parameters. These parameters include geothermal resource characteristics; costs of geothermal wells, workovers, and equipment; and other data. The GEOCOM model has been written in ANSI (American National Standard Institute) FORTRAN 1966 version.

  12. Life-cycle assessment (LCA) methodology applied to energetic materials

    SciTech Connect (OSTI)

    Reardon, P.T.

    1995-03-01T23:59:59.000Z

    The objective of the Clean Agile Manufacturing of Propellants, Explosives, and pyrotechnics (CAMPEP) program is to develop and demonstrate the feasibility of using modeling, alternate materials and processing technology to reduce PEO life-cycle pollution by up to 90%. Traditional analyses of factory pollution treat the manufacturing facility as the singular pollution source. The life cycle of a product really begins with raw material acquisition and includes all activities through ultimate disposal. The life cycle thus includes other facilities besides the principal manufacturing facility. The pollution generated during the product life cycle is then integrated over the total product lifetime, or represents a ``cradle to grave`` accounting philosophy. This paper addresses a methodology for producing a life-cycle inventory assessment.

  13. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air v.2

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2008-01-01T23:59:59.000Z

    Life-cycle Assessment (LCA)..comprehensive life-cycle assessment (LCA) models to quantifyat each stage. Life-cycle Assessment (LCA) The vehicles,

  14. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12T23:59:59.000Z

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  15. Modeling modern network attacks and countermeasures using attack graphs

    E-Print Network [OSTI]

    Ingols, Kyle W.

    By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

  16. Life-cycle analysis of shale gas and natural gas.

    SciTech Connect (OSTI)

    Clark, C.E.; Han, J.; Burnham, A.; Dunn, J.B.; Wang, M. (Energy Systems); ( EVS)

    2012-01-27T23:59:59.000Z

    The technologies and practices that have enabled the recent boom in shale gas production have also brought attention to the environmental impacts of its use. Using the current state of knowledge of the recovery, processing, and distribution of shale gas and conventional natural gas, we have estimated up-to-date, life-cycle greenhouse gas emissions. In addition, we have developed distribution functions for key parameters in each pathway to examine uncertainty and identify data gaps - such as methane emissions from shale gas well completions and conventional natural gas liquid unloadings - that need to be addressed further. Our base case results show that shale gas life-cycle emissions are 6% lower than those of conventional natural gas. However, the range in values for shale and conventional gas overlap, so there is a statistical uncertainty regarding whether shale gas emissions are indeed lower than conventional gas emissions. This life-cycle analysis provides insight into the critical stages in the natural gas industry where emissions occur and where opportunities exist to reduce the greenhouse gas footprint of natural gas.

  17. Life-Cycle Assessment of Pyrolysis Bio-Oil Production

    SciTech Connect (OSTI)

    Steele, Philp; Puettmann, Maureen E.; Penmetsa, Venkata Kanthi; Cooper, Jerome E.

    2012-02-01T23:59:59.000Z

    As part ofthe Consortium for Research on Renewable Industrial Materials' Phase I life-cycle assessments ofbiofuels, lifecycle inventory burdens from the production of bio-oil were developed and compared with measures for residual fuel oil. Bio-oil feedstock was produced using whole southern pine (Pinus taeda) trees, chipped, and converted into bio-oil by fast pyrolysis. Input parameters and mass and energy balances were derived with Aspen. Mass and energy balances were input to SimaPro to determine the environmental performance of bio-oil compared with residual fuel oil as a heating fuel. Equivalent functional units of 1 MJ were used for demonstrating environmental preference in impact categories, such as fossil fuel use and global warming potential. Results showed near carbon neutrality of the bio-oil. Substituting bio-oil for residual fuel oil, based on the relative carbon emissions of the two fuels, estimated a reduction in CO2 emissions by 0.075 kg CO2 per MJ of fuel combustion or a 70 percent reduction in emission over residual fuel oil. The bio-oil production life-cycle stage consumed 92 percent of the total cradle-to-grave energy requirements, while feedstock collection, preparation, and transportation consumed 4 percent each. This model provides a framework to better understand the major factors affecting greenhouse gas emissions related to bio-oil production and conversion to boiler fuel during fast pyrolysis.

  18. Genetic attack on neural cryptography

    SciTech Connect (OSTI)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido [Institut fuer Theoretische Physik, Universitaet Wuerzburg, Am Hubland, 97074 Wuerzburg (Germany); Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900 (Israel)

    2006-03-15T23:59:59.000Z

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

  20. Text Alternative Version: Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    Below is the text-alternative version of the "Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products" webcast, held March 28, 2013.

  1. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2010 Report describes the 2010 edition of energy price indices and discount factors for performing...

  2. Life of Sugar: Developing Lifecycle Methods to Evaluate the Energy and Environmental Impacts of Sugarcane Biofuels

    E-Print Network [OSTI]

    Gopal, Anand Raja

    2011-01-01T23:59:59.000Z

    led to an explosion of government and academic studies on the lifecycle effects of solid waste disposal options like landfilling, recycling,

  3. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  4. Expeditious Data Center Sustainability, Flow, and Temperature Modeling: Life-Cycle Exergy Consumption Combined with a Potential Flow Based, Rankine Vortex Superposed, Predictive Method

    E-Print Network [OSTI]

    Lettieri, David

    2012-01-01T23:59:59.000Z

    Methodology iii Life-Cycle Assessment (LCA) . . . . . . .Results 6.1 Life-Cycle Assessment (LCA) . . . . . 6.1.1Analysis (LCEA) 4. Life-Cycle Assessment (LCA) 5. Exergetic

  5. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2007-01-01T23:59:59.000Z

    Life-cycle Assessment (LCA)comprehensive life-cycle assessment (LCA) models to quantifyUCB-ITS-VWP-2007-7 Life-cycle Assessment (LCA) The vehicles,

  6. TriBITS lifecycle model. Version 1.0, a lean/agile software lifecycle model for research-based computational science and engineering and applied mathematical software.

    SciTech Connect (OSTI)

    Willenbring, James M.; Bartlett, Roscoe Ainsworth (Oak Ridge National Laboratory, Oak Ridge, TN); Heroux, Michael Allen

    2012-01-01T23:59:59.000Z

    Software lifecycles are becoming an increasingly important issue for computational science and engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any effort, the challenges of this process - respecting the competing needs of research vs. production - cannot be overstated. Here we describe a proposal for a well-defined software lifecycle process based on modern Lean/Agile software engineering principles. What we propose is appropriate for many CSE software projects that are initially heavily focused on research but also are expected to eventually produce usable high-quality capabilities. The model is related to TriBITS, a build, integration and testing system, which serves as a strong foundation for this lifecycle model, and aspects of this lifecycle model are ingrained in the TriBITS system. Here, we advocate three to four phases or maturity levels that address the appropriate handling of many issues associated with the transition from research to production software. The goals of this lifecycle model are to better communicate maturity levels with customers and to help to identify and promote Software Engineering (SE) practices that will help to improve productivity and produce better software. An important collection of software in this domain is Trilinos, which is used as the motivation and the initial target for this lifecycle model. However, many other related and similar CSE (and non-CSE) software projects can also make good use of this lifecycle model, especially those that use the TriBITS system. Indeed this lifecycle process, if followed, will enable large-scale sustainable integration of many complex CSE software efforts across several institutions.

  7. Creating a methodology and tool to capture and resolve conflicts in developing software requirements: Requirement Lifecycle Modeling Views manager (RLMV)

    E-Print Network [OSTI]

    Herrera, Leeha Rae-Lyn

    2013-02-22T23:59:59.000Z

    tool that will aid in tracing requirements throughout the software development lifecycle. The tool, named Requirement Lifecycle Modeling Views (RLMV), follows the architecture, as defined in The Unified Modeling Language Users Guide, for modeling...

  8. Strategic capacity in post devolution government in the UK: A comparative analysis of the lifecycle of central strategy units

    E-Print Network [OSTI]

    MacDougall, Audrey

    2007-06-27T23:59:59.000Z

    This thesis analyses the changing role of central government strategy units in the devolved UK polity using a lifecycle model. At each stage of the lifecycle the units develop a different aim, undertake different tasks and follow different working...

  9. Detector LifeCycle Costs and Considerations Mobility Measurement in Urban Transportation Pooled Fund Study

    E-Print Network [OSTI]

    Detector LifeCycle Costs and Considerations Mobility Measurement in Urban Transportation tool of typical data collection devices along with estimated lifecycle costs. The objectives of the costestimating detector tool are: 1. Provide an overview of the key issues and cost elements one needs

  10. ORNL/TM-2006/138 Comparing Life-Cycle Costs of ESPCs

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    ORNL/TM-2006/138 Comparing Life-Cycle Costs of ESPCs and Appropriations-Funded Energy Projects Follow-Up on ESPC and Appropriations Comparing Life-Cycle Costs John Shonder, Patrick Hughes, and Erica PROCESSES.........................................................................................3 The ESPC

  11. U.S. Geological Survey Energy and Minerals Science Strategy--A Resource Lifecycle Approach

    E-Print Network [OSTI]

    Torgersen, Christian

    U.S. Geological Survey Energy and Minerals Science Strategy--A Resource Lifecycle Approach Circular, Tuktu Bluff, Alaska. Photograph by Dave Houseknecht, USGS. #12;U.S. Geological Survey Energy and Minerals Science Strategy--A Resource Lifecycle Approach By Richard C. Ferrero, Jonathan J. Kolak, Donald J

  12. Decisions, Models, and Monitoring A Lifecycle Model for the Evolution of Service-Based Systems

    E-Print Network [OSTI]

    Dustdar, Schahram

    . In this paper, we present a novel approach to support a continuous development lifecycle of SBSs. Our approach. During the course of the development phases, software architects and developers use different modelsDecisions, Models, and Monitoring A Lifecycle Model for the Evolution of Service-Based Systems

  13. Lifecycle Verification of the NASA Ames K9 Rover Executive Dimitra Giannakopoulou1, 3

    E-Print Network [OSTI]

    Pasareanu, Corina

    , it shows that when verification proceeds hand-in-hand with software development throughout the lifecycle phases of software development, i.e. at design and implementation phases of the software lifecycle. Use-hand with later phases of software development. Figure 1. Compositional verification throughout the software

  14. ASSESSING A RECLAIMED CONCRETE UP-CYCLING SCHEME THROUGH LIFE-CYCLE ANALYSIS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ASSESSING A RECLAIMED CONCRETE UP-CYCLING SCHEME THROUGH LIFE-CYCLE ANALYSIS Sylvain Guignot1 Concrete, aggregate, electro-fragmentation, recycling, life-cycle analysis Abstract The present study evaluates the environmental impacts of a recycling scheme for gravels from building concretes wastes

  15. IFC and Building Lifecycle Management Renaud Vanlande*, Christophe Nicolle, Christophe Cruz

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Page 1 IFC and Building Lifecycle Management Renaud Vanlande*, Christophe Nicolle, Christophe Cruz the entire lifecycle of an AEC project. Usually, AEC projects and facility management are dissociated. Our of data. Keywords: product data interchange, Computer-aided engineering, Facility Management, Industry

  16. The Chicago Center for Green Technology: life-cycle assessment of a brownfield redevelopment project

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    The Chicago Center for Green Technology: life-cycle assessment of a brownfield redevelopment for Green Technology: life-cycle assessment of a brownfield redevelopment project Thomas Brecheisen1 Online at stacks.iop.org/ERL/8/015038 Abstract The sustainable development of brownfields reflects

  17. A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines

    E-Print Network [OSTI]

    Stanford University

    A Cyberinfrastructure for Integrated Monitoring and Life-Cycle Management of Wind Turbines Kay Abstract. Integrating structural health monitoring into life-cycle management strategies for wind turbines data) can effectively be used to capture the operational and structural behavior of wind turbines

  18. Int. J. Product Lifecycle Management, Vol. X, No. Y, xxxx 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Sandborn, Peter

    Int. J. Product Lifecycle Management, Vol. X, No. Y, xxxx 1 Copyright 200x Inderscience and management policy. Keywords: component obsolescence; product lifecycle management; diminishing manufacturing severely affected systems are sustainment-dominated, which means their long-term sustainment (lifecycle

  19. Abstract--To reduce the cost associated with screening lifecycle assessments (LCAs), we propose treating LCA as a data mining

    E-Print Network [OSTI]

    , with the lifecycle inventory being set up as a product tree; an environmental database being set up as a matrix Abstract--To reduce the cost associated with screening lifecycle assessments (LCAs), we propose, environmental factors I. PROBLEM ADDRESSED creening life-cycle assessments (LCAs) [1-2] are of interest

  20. 102 Int. J. Product Lifecycle Management, Vol. 5, Nos. 2/3/4, 2011 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Boyer, Edmond

    102 Int. J. Product Lifecycle Management, Vol. 5, Nos. 2/3/4, 2011 Copyright 2011 Inderscience satisfying the requirements of customers and users. Keywords: life-cycle engineering; manufacturing; product geometrical deviations; product lifecycle engineering; geometrical variation effect; product performance

  1. Planning an Empirical Experiment To Evaluate The Effects Of Pair Work On The Design Phase Of The Software Lifecycle

    E-Print Network [OSTI]

    New South Wales, University of

    on the process and products of the design phase of the software development lifecycle. However, literature revealed that the product and process of pair programming work in the software development lifecycle have Of The Software Lifecycle Hiyam Al-Kilidar1 , Ross Jeffery1 , Aybuke Aurum2 , Cat Kutay1 1 School of Computer

  2. 5x20 Matrix for Knowledge Management Lifecycle Based on the Five C's Model and a Critical Review

    E-Print Network [OSTI]

    5x20 Matrix for Knowledge Management Lifecycle Based on the Five C's Model and a Critical Review the previous efforts that have investigated the models and frameworks of KM lifecycles. Furthermore of coming out and arising the five C's model to be adopted in organizations vis-à-vis other KM lifecycles

  3. Emergency Operating Records Protection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-10-23T23:59:59.000Z

    To establish the policy, responsibilities, and requirements for a Departmental Emergency Operating Records Protection Program to safeguard that core or records deemed necessary to assure continuity of essential Governmental activities during and following disaster and attack-related emergency conditions. Cancels DOE 5500.7A. Chanceled by DOE O 151.1 of 9-25-1995.

  4. HAN Attack Surface and the Open Smart Energy Gateway Project

    E-Print Network [OSTI]

    Searle, Justin

    2014-01-01T23:59:59.000Z

    HAN Attack Surface and the Open Smart Energy of California. HAN Attack Surface and the Open vulnerable to cyber attacks (i.e. hacking) and

  5. The Attack on Planned Parenthood: A Historical Analysis

    E-Print Network [OSTI]

    Primrose, Sarah

    2012-01-01T23:59:59.000Z

    Party Republicans' Latest Attack on Women's Health and Birthtea-party-republicans-latest-attack-womens-health- birth-ARTICLES THE ATTACK ON PLANNED PARENTHOOD: A HISTORICAL

  6. attack synthetic polymers: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  7. attacks draft resolution: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  8. armed attacks draft: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  9. amyloid oxidative attack: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  10. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  11. The Sybil Attack John R. Douceur

    E-Print Network [OSTI]

    Keinan, Alon

    1 The Sybil Attack John R. Douceur Microsoft Research johndo@microsoft.com "One can have, some undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks

  12. The GHS Attack Revisited Computer Science Department,

    E-Print Network [OSTI]

    Hess, Florian

    The GHS Attack Revisited F. Hess Computer Science Department, Woodland Road, University of Bristol the number of elliptic curves which succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude

  13. An Optimizing Algorithm for Automating Lifecycle Assembly Processes

    SciTech Connect (OSTI)

    Brown, R.G.; Calton, T.L.

    1998-12-09T23:59:59.000Z

    Designing products for ~ assembly and disassembly during its entire Iifecycle for purposes including service, field repair, upgrade, and disposal is a process that involves many disciplines. In additiou finding the best solution often involves considering the design as a whole and by considering its intended Iifecycle. DifFerent goals and cortstmints (compared to initial assembly) require us to re-visit the significant fi,mdamental assumptions and methods that underlie current assembly planning techniques. Previous work in this area has been limited to either academic studies of assembly planning or applied studies of lifecycle assembly processes, which give no attention to automatic planning. It is believed that merging these two areas will result in a much greater ability to design for, analyze, and optimize the disassembly and assembly processes.

  14. Protecting the login session from camera based shoulder surfing attacks

    E-Print Network [OSTI]

    Almaula, Varun Kartik

    2008-01-01T23:59:59.000Z

    56 Prosumer Point and Shoot Camera: Kodakvideo resolution at 30fps and a prosumer Kodak Z812IS [57]eye already had seen. Prosumer Point and Shoot Camera:

  15. Protecting the login session from camera based shoulder surfing attacks

    E-Print Network [OSTI]

    Almaula, Varun Kartik

    2008-01-01T23:59:59.000Z

    en_US&_requestid=9768]. [58] Sony Electronics U.S.A. HDR-FX1www.virtualdub.org/]. [55] Sony Ericsson. Specifications -cc=us&lc=en]. [56] Sony Ericsson. Specifications - W580i. [

  16. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,OfficeEnd ofEvaluations in Covered Facilities |List of

  17. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR - TProcuring SolarNo. 195 - Oct. 7, 20112008 | Department of

  18. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin of ContaminationHubs+ ReportEnergy NationalDepartment of31548 Vol.

  19. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01T23:59:59.000Z

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  20. Protection 1 Protection 1

    E-Print Network [OSTI]

    Lampson, Butler W.

    Protection 1 Protection 1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system--- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

  1. Protection 1 Protection1

    E-Print Network [OSTI]

    Lampson, Butler W.

    Protection 1 Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system-- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

  2. A Trusted Computing Architecture for Critical Infrastructure Protection Mike Burmester

    E-Print Network [OSTI]

    Burmester, Mike

    . We conclude by showing how this approach can be used to secure substation automation systems has shown how vulnerable indus- trial facilities are to malware attacks. The crucial nature of such attacks highlight the necessity for solutions that provide effective protection from malware threats

  3. Using MobileAgent Technology to Develop a CollaborativeUsing MobileAgent Technology to Develop a CollaborativeUsing MobileAgent Technology to Develop a CollaborativeUsing MobileAgent Technology to Develop a Collaborative Product Lifecycle OrientedAProduct

    E-Print Network [OSTI]

    Boyer, Edmond

    a Collaborative Product Lifecycle OrientedAProduct Lifecycle OrientedAProduct Lifecycle OrientedAProduct Lifecycle for product lifecycle. By adopting the Aglets mobile agent platform, a generic platform has been developed for managing legacy product data and information across the product lifecycle. Different lifecycle stage

  4. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01T23:59:59.000Z

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  5. Life-Cycle Cost Analysis Highlights Hydrogen's Potential for Electrical Energy Storage (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2010-11-01T23:59:59.000Z

    This fact sheet describes NREL's accomplishments in analyzing life-cycle costs for hydrogen storage in comparison with other energy storage technologies. Work was performed by the Hydrogen Technologies and Systems Center.

  6. An Intraseasonal Oscillation Composite Lifecycle in the NCAR CCM3.6 with Modified Convection

    E-Print Network [OSTI]

    Maloney, Eric

    An Intraseasonal Oscillation Composite Lifecycle in the NCAR CCM3.6 with Modified Convection Eric D, 803073000, maloney@ucar.edu #12; 1 Abstract The NCAR CCM3.6 with microphysics of clouds with relaxed

  7. An Intraseasonal Oscillation Composite Lifecycle in the NCAR CCM3.6 with Modified Convection

    E-Print Network [OSTI]

    Maloney, Eric

    An Intraseasonal Oscillation Composite Lifecycle in the NCAR CCM3.6 with Modified Convection Eric D, 80307-3000, maloney@ucar.edu #12;1 Abstract The NCAR CCM3.6 with microphysics of clouds with relaxed

  8. Life-Cycle Assessment of Energy and Environmental Impacts of LED Lighting Products

    Broader source: Energy.gov [DOE]

    This March 28, 2013 webcast reviewed DOE's recently completed three-part study of the life-cycle energy and environmental impacts of LED lighting products relative to incandescent and CFL...

  9. Energy Price Indices and Discount Factors for Life-Cycle Cost...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NISTIR 85-3273-29 Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis - 2014 Annual Supplement to NIST Handbook 135 Amy S. Rushing Joshua D. Kneifel Priya...

  10. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy,

    E-Print Network [OSTI]

    California at Berkeley, University of

    Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy and Environmental Engineering Civil Systems Program mchester@cal.berkeley.edu Project Director: Arpad Horvath, Associate Professor University of California, Berkeley Department of Civil and Environmental Engineering

  11. Follow that Sketch: Lifecycles of Diagrams and Sketches in Software Development

    E-Print Network [OSTI]

    Sillito, Jonathan

    Follow that Sketch: Lifecycles of Diagrams and Sketches in Software Development Jagoda Walny. Through a series of interviews with computer science re- searchers who develop software, we probed of sketching and diagramming in software development. I. INTRODUCTION Visualization through sketching

  12. A Review of Battery Life-Cycle Analysis: State of Knowledge and Critical Needs

    E-Print Network [OSTI]

    Kemner, Ken

    ................................................................................................. 8 3.1.1 Lead-Acid Batteries .............................................................................................. 16 3.2.1 Lead-Acid BatteriesA Review of Battery Life-Cycle Analysis: State of Knowledge and Critical Needs ANL/ESD/10-7 Energy

  13. Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 -2010

    E-Print Network [OSTI]

    Banaji,. Murad

    Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 - 2010 John Hills ...................................................................................................................20 6. Outcomes: Poverty rates on the distribution of wealth, poverty, income inequality and spatial difference. The full programme of analysis

  14. Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production

    E-Print Network [OSTI]

    Life-Cycle Greenhouse Gas and Energy Analyses of Algae Biofuels Production Transportation Energy The Issue Algae biofuels directly address the Energy Commission's Public Interest Energy Research fuels more carbonintensive than conventional biofuels. Critics of this study argue that alternative

  15. Lifecycle Environments: A Retrospective View of the Contributions of Leon J.

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Lifecycle Environments: A Retrospective View of the Contributions of Leon J. Osterweil Lori A@cs.umass.edu Abstract Throughout his career, Leon Osterweil has made significant contribu- tions that have impacted

  16. An Experimental Methodology to Evaluate Concept Generation Procedures Based on Quantitative Lifecycle Performance

    E-Print Network [OSTI]

    Cardin, Michel-Alexandre

    This study presents an experimental methodology to measure how concept generation procedures can affect the anticipated lifecycle performance of engineering systems design concepts. The methodology is based on objective ...

  17. Alternative water sources: Desalination model provides life-cycle costs of facility

    E-Print Network [OSTI]

    Supercinski, Danielle

    2009-01-01T23:59:59.000Z

    Story by Danielle Supercinski tx H2O | pg. 8 Alternative water sourcees Desalination model provides life-cycle costs of facility platform and design standards as DESAL ECONOMICS?, but created to analyze con- ventional surface water treatment... to determine the economic and financial life-cycle costs of building and operating four water treatment facilities in South Texas. One facility was the Southmost Regional Water Authority Regional Desalination Plant near Brownsville. Sturdi- vant said...

  18. Alternative water sources: Desalination model provides life-cycle costs of facility

    E-Print Network [OSTI]

    Supercinski, Danielle

    2009-01-01T23:59:59.000Z

    Story by Danielle Supercinski tx H2O | pg. 8 Alternative water sourcees Desalination model provides life-cycle costs of facility platform and design standards as DESAL ECONOMICS?, but created to analyze con- ventional surface water treatment... to determine the economic and financial life-cycle costs of building and operating four water treatment facilities in South Texas. One facility was the Southmost Regional Water Authority Regional Desalination Plant near Brownsville. Sturdi- vant said...

  19. Lifecycle Energy Management in the Tohoku Electric Power headquarters building-APCBC

    E-Print Network [OSTI]

    Yuzawa, H.

    2014-01-01T23:59:59.000Z

    Lifecycle Energy Management in the Tohoku Electric Power Company Head Office Building Hideki Yuzawa (NIKKEN SEKKEI Research Institute) Takeshi Kondo (NIKKEN SEKKEI Research Institute) Shinji Okuda (Tohoku Electric Power) APCBC presentation...th International Conference for Enhanced Building Operations, Beijing, China, September 14-17, 2014 ICEBO2014 NSRI Hideki Yuzawa ?2014 yuzawa@nikken.jp Passion for sustainable cities 4 What is Lifecycle energy management ? 4 #1 Defined the energy...

  20. Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

  1. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    False Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu, Peng Ning@cs.unc.edu ABSTRACT A power grid is a complex system connecting electric power generators to consumers through power using IEEE test systems. Our results indicate that security protection of the electric power grid must

  2. Bellcore attack in practice Andrey Sidorenko, Joachim van den Berg, Remko Foekema,

    E-Print Network [OSTI]

    an exponentiation, this action is often visible in the power profiles. If a fault is injected while loading (p, dp-consuming and often clearly visible in the power profiles. However, protection of the exponentiations against faults have been published. Among the most powerful are differential fault attacks based on the assumption

  3. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01T23:59:59.000Z

    out that EPA used an emissions trading program to controlsuggested that an emissions trading system could qualify asTO MANAGE LIFECYCLE GHG emissions trading system would also

  4. The Zombie Attack on the Computational Conception of Mind

    E-Print Network [OSTI]

    Bringsjord, Selmer

    The Zombie Attack on the Computational Conception of Mind Selmer Bringsjord Department defense of the zombie attack against computationalism. Dennett, more than any other thinker, says, rigorous attack on computationalism -- the zombie attack. If this attack is sound, it will follow not only

  5. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  6. Life-cycle analysis of alternative aviation fuels in GREET

    SciTech Connect (OSTI)

    Elgowainy, A.; Han, J.; Wang, M.; Carter, N.; Stratton, R.; Hileman, J.; Malwitz, A.; Balasubramanian, S. (Energy Systems)

    2012-07-23T23:59:59.000Z

    The Greenhouse gases, Regulated Emissions, and Energy use in Transportation (GREET) model, developed at Argonne National Laboratory, has been expanded to include well-to-wake (WTWa) analysis of aviation fuels and aircraft. This report documents the key WTWa stages and assumptions for fuels that represent alternatives to petroleum jet fuel. The aviation module in GREET consists of three spreadsheets that present detailed characterizations of well-to-pump and pump-to-wake parameters and WTWa results. By using the expanded GREET version (GREET1{_}2011), we estimate WTWa results for energy use (total, fossil, and petroleum energy) and greenhouse gas (GHG) emissions (carbon dioxide, methane, and nitrous oxide) for (1) each unit of energy (lower heating value) consumed by the aircraft or (2) each unit of distance traveled/ payload carried by the aircraft. The fuel pathways considered in this analysis include petroleum-based jet fuel from conventional and unconventional sources (i.e., oil sands); Fisher-Tropsch (FT) jet fuel from natural gas, coal, and biomass; bio-jet fuel from fast pyrolysis of cellulosic biomass; and bio-jet fuel from vegetable and algal oils, which falls under the American Society for Testing and Materials category of hydroprocessed esters and fatty acids. For aircraft operation, we considered six passenger aircraft classes and four freight aircraft classes in this analysis. Our analysis revealed that, depending on the feedstock source, the fuel conversion technology, and the allocation or displacement credit methodology applied to co-products, alternative bio-jet fuel pathways have the potential to reduce life-cycle GHG emissions by 55-85 percent compared with conventional (petroleum-based) jet fuel. Although producing FT jet fuel from fossil feedstock sources - such as natural gas and coal - could greatly reduce dependence on crude oil, production from such sources (especially coal) produces greater WTWa GHG emissions compared with petroleum jet fuel production unless carbon management practices, such as carbon capture and storage, are used.

  7. Life-cycle assessments: Linking energy, economics, and the environment. Paper No. 571

    SciTech Connect (OSTI)

    Shankle, S.A.

    1994-08-01T23:59:59.000Z

    The Pacific Northwest Laboratory has been involved in a number of life-cycle assessment (LCA) projects that assess the complete lifetime energy, economic, and environmental impacts of alternative technology options. Life-cycle assessments offer one-stop shopping answers to the total energy and environmental implications of alternative technologies, as well as providing employment and income consequences. In one recently completed study, the lifetime impacts of scenarios involving the production and use of biomass ethanol transportation fuels were assessed. In an ongoing study, the lifetime impacts of electric-powered vehicles versus conventional fuels are being assessed. In a proposed study, the impacts of recycled office paper versus office paper from virgin sources would be assessed. A LCA proceeds by developing mass and energy inventories during all phases of the life-cycle. Special attention is given to energy consumption and environmental releases. Economics are incorporated by evaluating the macroeconomic impacts of the alternative policies, such as employment, wages, and output. Economics can also be incorporated by attempting to place values on the damages imposed by the environmental releases associated with alternative scenarios. This paper discusses life-cycle assessment techniques and their application to building energy issues. Life-cycle assessments show great promise for analysis of buildings energy policy questions.

  8. Life-cycle framework for assessment of site remediation options: Method and generic survey

    SciTech Connect (OSTI)

    Diamond, M.L.; Page, C.A. [Univ. of Toronto, Ontario (Canada). Dept. of Geography; Campbell, M. [Toronto Public Health, North York, Ontario (Canada); McKenna, S. [City of Toronto, Ontario (Canada). Community and Neighbourhood Services; Lall, R. [R. Addison Lall and Associates, Toronto, Ontario (Canada)

    1999-04-01T23:59:59.000Z

    To address burdens associated with contaminated sites and issuing from remediation activities, a life-cycle framework (LCF) was developed, including an approach based on life-cycle management (LCM) and an adaptation of life-cycle assessment (LCA). Intended for application to a wide range of remediation options, the objective of the LCF is to broaden consideration of potential impacts beyond the contaminated site and over a prolonged time frame. The LCM approach is a qualitative method for investigating remediation activities from a life-cycle perspective. This adaptation of the more rigorous, quantitative LCA method has involved specifying appropriate life-cycle stages, a long-term time horizon, a spatial boundary encompassing the contaminated site and other affected locations, a process boundary containing the contaminated soil, and an impact assessment method that considers site- and process-related metrics. To assess the suitability of LCM as a decision-making tool, six generic site remediation options were investigated: no action, encapsulation, excavation and disposal, vapor extraction, in situ bioremediation, and soil washing. The analysis exemplified tradeoffs between the streamlined LCM, and comprehensive, quantitative LCA approaches, and highlighted potential environmental and human health impacts arising from the six technologies investigated.

  9. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation

    E-Print Network [OSTI]

    Noel, Steven

    Managing Attack Graph Complexity Through Visual Hierarchical Aggregation Steven Noel Center a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph

  10. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  11. The GHS Attack in odd Characteristic Claus Diem

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points

  12. GARNET : a Graphical Attack graph and Reachability Network Evaluation Tool

    E-Print Network [OSTI]

    Williams, Leevar (Leevar Christoff)

    2008-01-01T23:59:59.000Z

    Attack graphs are valuable tools in the assessment of network security, revealing potential attack paths an adversary could use to gain control of network assets. Creating an effective visualization for attack graphs is ...

  13. Jaguar Attack on a Child: Case Report and Literature Review

    E-Print Network [OSTI]

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01T23:59:59.000Z

    Harlan G. Fatal Big Cat Attacks. Am J Forensic Med Pathol.Iserson et al. Jaguar Attack on a Child 18. Rabinowitz AR,SM, Mills A, Shoff WH. Human attacks by large 25. Bahram R,

  14. Evaluation of Profile Injection Attacks In Collaborative Recommender Systems

    E-Print Network [OSTI]

    Schaefer, Marcus

    Evaluation of Profile Injection Attacks In Collaborative Recommender Systems Chad Williams, Runa recommender systems. The open nature of collaborative filtering allows attackers to inject biased profile data identified attack profiles. Second, we analyze the effectiveness of a supervised classification approach

  15. Modeling Attacks on Physical Unclonable Functions Ulrich Rhrmair

    E-Print Network [OSTI]

    against these problems, but they all rest on the concept of a secret binary key. Classical cryp- tography, semi-invasive, or side-channel attacks, as well as software attacks like API- attacks and viruses, can

  16. Use of life-cycle costing in the development of standards. Master's thesis

    SciTech Connect (OSTI)

    Underwood, J.M.

    1988-12-01T23:59:59.000Z

    This thesis set out to determine how, and to what extent, life-cycle costing is used in the development of voluntary consensus standards. It explains how several organizations in the commercial sector develop voluntary standards. Among these organizations was ASHRAE, who is currently developing a standard based on life-cycle costing. Standard 90.2 Energy Efficient Design of New Low-Rise Residential Buildings prescribes the insulation values for the envelope of a building. The economic methodology was based on marginal analysis by considering an upgraded construction component and then determining the incremental energy-cost savings to the incremental modification costs over a specified life-cycle period. Questions arose concerning the economic assumptions used in developing the standard. It is recommended that an impact study be performed to evaluate the cost-estimating techniques and the basic economic assumptions.

  17. Life-Cycle Energy Demand of Computational Logic:From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU

    E-Print Network [OSTI]

    Bol, David; Boyd, Sarah; Dornfeld, David

    2011-01-01T23:59:59.000Z

    Boyd et al. : Life-cycle energy demand and global warmingLife-Cycle Energy Demand of Computational Logic: From High-to assess the life-cycle energy demand of its products for

  18. Life-Cycle Energy Demand of Computational Logic: From High-Performance 32nm CPU to Ultra-Low-Power 130nm MCU

    E-Print Network [OSTI]

    Bol, David; Boyd, Sarah; Dornfeld, David

    2011-01-01T23:59:59.000Z

    Boyd et al. : Life-cycle energy demand and global warmingLife-Cycle Energy Demand of Computational Logic: From High-to assess the life-cycle energy demand of its products for

  19. World Conference on Photovoltaic Conversion, Hawaii, May 8-12, 2006 QUANTIFYING THE LIFE-CYCLE ENVIRONMENTAL PROFILE OF PHOTOVOLTAICS

    E-Print Network [OSTI]

    IEEE 4 th World Conference on Photovoltaic Conversion, Hawaii, May 8-12, 2006 QUANTIFYING THE LIFE-CYCLE ENVIRONMENTAL PROFILE OF PHOTOVOLTAICS AND COMPARISONS WITH OTHER ELECTRICITY-GENERATING TECHNOLOGIES V and Australian studies portrayed photovoltaic systems as causing significant life-cycle environmental and health

  20. MATHENY: Welcome to this IBM podcast, Ten Things I Hate About Application Lifecycle Management, Part 1. I'm

    E-Print Network [OSTI]

    , integrated and flexible software delivery solution that addresses the entire lifecycle. However, making sense Lifecycle Management. So what is it and how can it help individuals in software delivery companies? To IBM, because today's current reality in software delivery or software development is that when I was talking

  1. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01T23:59:59.000Z

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  2. A Scalable Framework for Cyber Attack Discovery and Situational...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

  3. The Role of Modeling in Clinical Information System Development Life-Cycle Mor Peleg, Department of Information Systems, University of Haifa, Haifa, Israel

    E-Print Network [OSTI]

    Peleg, Mor

    The Role of Modeling in Clinical Information System Development Life-Cycle Mor Peleg, Department different stake holders. Conceptual modeling can play important roles in the development life-cycle. If these requirements are identified early in the development life-cycle then it is easier and more cost

  4. Approved Module Information for CS2090, 2014/5 Module Title/Name: Software Lifecycle and Design Module Code: CS2090

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    orally and in writing Indicative Module Content: Software lifecycle overview Software development modelsApproved Module Information for CS2090, 2014/5 Module Title/Name: Software Lifecycle and Design of the software lifecycle with particular emphasis on software design and design realisation. By the end

  5. Martn G. Marchetta, Frdrique Mayer, Raymundo Q. Forradellas, A reference framework following a proactive-product approach for Product Lifecycle Management, Computers in Industry 62 (2011) 672683

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    2011-01-01T23:59:59.000Z

    a proactive-product approach for Product Lifecycle Management, Computers in Industry 62 (2011) 672683 A reference framework following a proactive-product approach for Product Lifecycle Management Martn G Lorraine, 8 rue Bastien Lepage, BP 90647 (54010) Nancy Cedex, France Abstract Product Lifecycle Management

  6. Knowledge Sharing within Extended Enterprises: Case of Product Lifecycle Management systems Pierre-Emmanuel Arduin, Julien Le Duigou, Diana Penciuc, Marie-Hlne Abel, and Benot Eynard

    E-Print Network [OSTI]

    Boyer, Edmond

    Knowledge Sharing within Extended Enterprises: Case of Product Lifecycle Management systems Pierre, whether tacit or "explicited" by individuals within extended enterprises. Product Lifecycle Management extended enterprises throughout the entire lifecycle of a product. In this paper, we propose (1) to outline

  7. The Sponsored Research Lifecycle Part I: Finding a Sponsor

    E-Print Network [OSTI]

    Bieber, Michael

    (CIA) Environmental Protection Agency (EPA) Federal Communications Commission (FCC) Institute of Museum Research? #12;US 2003 R&D by Source & Performer Federal Funding is the primary sustenance for academic research. "Go where the money is... and go there often." Willie Sutton FBI Photo #12;Federal Government

  8. Predicting the effect of climate change on wildfire behavior and initial attack success

    SciTech Connect (OSTI)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01T23:59:59.000Z

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  9. On traffic analysis attacks and countermeasures

    E-Print Network [OSTI]

    Fu, Xinwen

    2007-04-25T23:59:59.000Z

    . This is true even if some commonly used countermeasures (e.g., link padding) have been deployed. We proposed an alternative effective countermeasure to counter this passive traffic analysis attack. Our extensive experimental results indicated...

  10. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31T23:59:59.000Z

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. PAPER PREPARATION GUIDELINES FOR THE 2014 INTERNATIONAL SYPOSIUM ON PAVEMENT LIFE-CYCLE ASSESSMENT

    E-Print Network [OSTI]

    California at Davis, University of

    PAPER PREPARATION GUIDELINES FOR THE 2014 INTERNATIONAL SYPOSIUM ON PAVEMENT LIFE-CYCLE ASSESSMENT (PAVEMENT LCA - 2014) PAPER SUBMISSION Completed papers must be submitted electronically in a single PDF, as follows, to meet the requirements for Pavement LCA - 2014. All papers must be submitted in English

  12. CEC-500-2010-FS-XXX Life-Cycle Energy

    E-Print Network [OSTI]

    CEC-500-2010-FS-XXX Life-Cycle Energy Assessment of Smart Growth Strategies TRANSPORTATION ENERGY growth strategies at reducing energy use, greenhouse gas emissions, and criteria pollutants remains. An analysis of local planning and policy options for reducing embedded energy in the transport system

  13. A methodology for improving software design lifecycle in embedded control Mohamed El Mongi Ben Gaid

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    A methodology for improving software design lifecycle in embedded control systems Mohamed El Mongi- mentation on control system performance are still evaluated on the last phases of the development cycle reducing the length and the effort of the development cycle. This paper pro- poses ideas towards achieving

  14. Final Progress Report [Testing Climate Model Simulations of Tropical Cirrus Lifecycles: A Lagrangian

    SciTech Connect (OSTI)

    Soden, Brian J

    2009-06-30T23:59:59.000Z

    This project integrates ARM data sets with satellite observations and model simulations to improve the representation of tropical cloud systems in climate models. We focus on describing and understanding relevant features of the lifecycle of tropical cirrus cloud systems using an innovative method which combines the Eulerian-based ARM measurements with Lagrangian information from geostationary satellites.

  15. MARINE STRATUS CLOUD LIFECYCLE MODULATED BY LATENT HEAT FLUX IN A COASTAL OCEAN UPWELLING REGION

    E-Print Network [OSTI]

    MARINE STRATUS CLOUD LIFECYCLE MODULATED BY LATENT HEAT FLUX IN A COASTAL OCEAN UPWELLING REGION, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark

  16. Life-cycle costing manual for the federal energy management programs

    SciTech Connect (OSTI)

    Ruegg, R.T.

    1982-05-01T23:59:59.000Z

    This manual is a guide to understanding the life-cycle costing method and an aid to calculating the measures required for evaluating energy conservation and renewable energy investments in all Federal buildings. It expands upon the life-cycle costing criteria contained in the Program Rules of the Federal Energy Management Program (Subpart A of Part 436, Title 10, U.S. Code of Federal Regulations) and is consistent with those criteria. Its purpose is to facilitate the implementation of the Program Rules by explaining the life-cycle costing method, defining the measures, describing the assumptions and procedures to follow in performing evaluations, and giving examples. It provides worksheets, a computer program, and instructions for calculating the required measurements. The life-cycle costing method and evaluation procedures set forth in the Federal Energy Management Program Rules and described in greater detail in this guide are to be followed by all Federal agenecies for all energy conservation and renewable energy projects undertaken in new and existing buildings and facilities owned or leased by the Federal government, unless specifically exempted. The establishment of the methods and procedures and their use by Federal agencies to evaluate energy conservation and solar energy investments are required by Section 381(a)(2) of the Energy Policy and Conservation Act, as amended, 42 U.S.C. 6361(a)(2); by Section 10 of Presidential Executive Order 11912, amended; and by Title V of the National Energy Conservation Policy Act, 92 Stat. 3275.

  17. Supporting the Full BPM Life-Cycle Using Process Mining and Intelligent Redesign

    E-Print Network [OSTI]

    van der Aalst, Wil

    Supporting the Full BPM Life-Cycle Using Process Mining and Intelligent Redesign Wil M.P. van der.aalst,m.netjes,h.a.reijers@tm.tue.nl Abstract. Business Process Management (BPM) systems provide a broad range of facilities to enact and manage operational business processes. Ideally, these systems should provide support for the complete BPM life

  18. Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 -2010

    E-Print Network [OSTI]

    Banaji,. Murad

    Labour's Record on Cash Transfers, Poverty, Inequality and the Lifecycle 1997 - 2010 John Hills changes in the UK since 2007, particularly their impact on the distribution of wealth, poverty, income, charting their approach and assessing their impact on the distribution of outcomes and on poverty

  19. Brice Nichols and Kara Kockelman URBAN FORM AND LIFE-CYCLE ENERGY CONSUMPTION

    E-Print Network [OSTI]

    Kockelman, Kara M.

    and employment density profiles. Five residential and three commercial neighborhood types are distributed across) and provide a rare view of total annual energy demands from the urban residential and commercial sectors. ABSTRACT This work estimates life-cycle energy demands for residents and workers in different built

  20. TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING

    E-Print Network [OSTI]

    Stanford University

    TOWARDS LIFE-CYCLE MANAGEMENT OF WIND TURBINES BASED ON STRUCTURAL HEALTH MONITORING K. Smarsly1) strategies can enable wind turbine manufacturers, owners, and operators to precisely schedule maintenance behavior of wind turbines and to reduce (epistemic) uncertainty. Both the resistance parameters

  1. A review of battery life-cycle analysis : state of knowledge and critical needs.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Gaines, L.; Energy Systems

    2010-12-22T23:59:59.000Z

    A literature review and evaluation has been conducted on cradle-to-gate life-cycle inventory studies of lead-acid, nickel-cadmium, nickel-metal hydride, sodium-sulfur, and lithium-ion battery technologies. Data were sought that represent the production of battery constituent materials and battery manufacture and assembly. Life-cycle production data for many battery materials are available and usable, though some need updating. For the remaining battery materials, lifecycle data either are nonexistent or, in some cases, in need of updating. Although battery manufacturing processes have occasionally been well described, detailed quantitative information on energy and material flows is missing. For all but the lithium-ion batteries, enough constituent material production energy data are available to approximate material production energies for the batteries, though improved input data for some materials are needed. Due to the potential benefit of battery recycling and a scarcity of associated data, there is a critical need for life-cycle data on battery material recycling. Either on a per kilogram or per watt-hour capacity basis, lead-acid batteries have the lowest production energy, carbon dioxide emissions, and criteria pollutant emissions. Some process-related emissions are also reviewed in this report.

  2. Life-Cycle Cost Study for a Low-Level Radioactive Waste Disposal Facility in Texas

    SciTech Connect (OSTI)

    B. C. Rogers; P. L. Walter (Rogers and Associates Engineering Corporation); R. D. Baird

    1999-08-01T23:59:59.000Z

    This report documents the life-cycle cost estimates for a proposed low-level radioactive waste disposal facility near Sierra Blanca, Texas. The work was requested by the Texas Low-Level Radioactive Waste Disposal Authority and performed by the National Low-Level Waste Management Program with the assistance of Rogers and Associates Engineering Corporation.

  3. Practical Electromagnetic Template Attack on Pierre-Alain Fouque1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC- SHA-1

  4. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices

    E-Print Network [OSTI]

    Noel, Steven

    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices Steven Noel}@gmu.edu Abstract We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across

  5. Towards Attack-Agnostic Defenses David Brumley and Dawn Song

    E-Print Network [OSTI]

    Brumley, David

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

  6. A Probabilistic Routing Disruption Attack on DSR and Its Analysis

    E-Print Network [OSTI]

    Levi, Albert

    A Probabilistic Routing Disruption Attack on DSR and Its Analysis ?zleyi Ocakolu, Burak Bayolu}@sabanciuniv.edu Abstract -- In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack

  7. The GHS Attack in odd Characteristic March 24, 2003

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points. In this article we give a generalization of the attack to degree 0 class groups of (hyper-)elliptic curves over

  8. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  9. Attack Containment Framework for Large-Scale Critical Infrastructures

    E-Print Network [OSTI]

    Nahrstedt, Klara

    Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

  10. Life-cycle costs for the Department of Energy Waste Management Programmatic Environmental Impact Statement

    SciTech Connect (OSTI)

    Sherick, M.J.; Shropshire, D.E.; Hsu, K.M.

    1996-09-01T23:59:59.000Z

    The US Department of Energy (DOE) Office of Environmental Management has produced a Programmatic Environmental Impact Statement (PEIS) in order to assess the potential consequences resulting from a cross section of possible waste management strategies for the DOE complex. The PEIS has been prepared in compliance with the NEPA and includes evaluations of a variety of alternatives. The analysis performed for the PEIS included the development of life-cycle cost estimates for the different waste management alternatives being considered. These cost estimates were used in the PEIS to support the identification and evaluation of economic impacts. Information developed during the preparation of the life-cycle cost estimates was also used to support risk and socioeconomic analyses performed for each of the alternatives. This technical report provides an overview of the methodology used to develop the life-cycle cost estimates for the PEIS alternatives. The methodology that was applied made use of the Waste Management Facility Cost Information Reports, which provided a consistent approach and estimating basis for the PEIS cost evaluations. By maintaining consistency throughout the cost analyses, life-cycle costs of the various alternatives can be compared and evaluated on a relative basis. This technical report also includes the life-cycle cost estimate results for each of the PEIS alternatives evaluated. Summary graphs showing the results for each waste type are provided and tables showing different breakdowns of the cost estimates are provided. Appendix E contains PEIS cost information that was developed using an approach different than the standard methodology described in this report. Specifically, costs for high-level waste are found in this section, as well as supplemental costs for additional low-level waste and hazardous waste alternatives.

  11. Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses

    E-Print Network [OSTI]

    Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data

  12. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  13. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01T23:59:59.000Z

    to suspend biomass from its renewable portfolio stan- dard,Renewable+Energy& L3=Biomass&sid=Eoeea&b=terminalcontent&f=doerrenewables-biomass-renewable fuels mandate.48 In 2010, concern over lifecycle emissions from biomass

  14. Closing the Gap: Using the Clean Air Act to Control Lifecycle Greenhouse Gas Emissions from Energy Facilities

    E-Print Network [OSTI]

    Hagan, Colin R.

    2012-01-01T23:59:59.000Z

    gas emissions from conven- tional power sources like coal.total emissions from coal- or natural gas-fired power plantsemissions, the lifecycle for natural gas power production is more complicated than that of coal.

  15. Effect of cumulative seismic damage and corrosion on life-cycle cost of reinforced concrete bridges

    E-Print Network [OSTI]

    Kumar, Ramesh

    2009-05-15T23:59:59.000Z

    Mauricio Sanchez-Silva Colleen Murphy Head of Department, David Rosowsky December 2007 Major Subject: Civil Engineering iii ABSTRACT Effect of Cumulative Seismic Damage and Corrosion on Life-Cycle Cost.... Paolo Gardoni for his technical guidance and for helping with financial support during my study period. I thank Dr. Mauricio Sanchez-Silva for helping me at all stages with his promptness to clear my doubts anytime I approached him. I acknowledge...

  16. Life-cycle energy analyses of electric vehicle storage batteries. Final report

    SciTech Connect (OSTI)

    Sullivan, D; Morse, T; Patel, P; Patel, S; Bondar, J; Taylor, L

    1980-12-01T23:59:59.000Z

    The results of several life-cycle energy analyses of prospective electric vehicle batteries are presented. The batteries analyzed were: Nickel-zinc; Lead-acid; Nickel-iron; Zinc-chlorine; Sodium-sulfur (glass electrolyte); Sodium-sulfur (ceramic electrolyte); Lithium-metal sulfide; and Aluminum-air. A life-cycle energy analysis consists of evaluating the energy use of all phases of the battery's life, including the energy to build it, operate it, and any credits that may result from recycling of the materials in it. The analysis is based on the determination of three major energy components in the battery life cycle: Investment energy, i.e., The energy used to produce raw materials and to manufacture the battery; operational energy i.e., The energy consumed by the battery during its operational life. In the case of an electric vehicle battery, this energy is the energy required (as delivered to the vehicle's charging circuit) to power the vehicle for 100,000 miles; and recycling credit, i.e., The energy that could be saved from the recycling of battery materials into new raw materials. The value of the life-cycle analysis approach is that it includes the various penalties and credits associated with battery production and recycling, which enables a more accurate determination of the system's ability to reduce the consumption of scarce fuels. The analysis of the life-cycle energy requirements consists of identifying the materials from which each battery is made, evaluating the energy needed to produce these materials, evaluating the operational energy requirements, and evaluating the amount of materials that could be recycled and the energy that would be saved through recycling. Detailed descriptions of battery component materials, the energy requirements for battery production, and credits for recycling, and the operational energy for an electric vehicle, and the procedures used to determine it are discussed.

  17. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack

    E-Print Network [OSTI]

    Duan, Yitao; Canny, J

    2006-01-01T23:59:59.000Z

    adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

  18. The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General

    E-Print Network [OSTI]

    Albiston, Catherine R.; Nielsen, Laura Beth

    2006-01-01T23:59:59.000Z

    emphasis added). Procedural Attack on Civil Rights contraryat 1 (1976). Procedural Attack on Civil Rights plaintiffs357, 367 & Procedural Attack on Civil Rights fee recovery

  19. Predicting the effect of climate change on wildfire behavior and initial attack success

    E-Print Network [OSTI]

    Fried, Jeremy S.

    2008-01-01T23:59:59.000Z

    wildfire behavior and initial attack success Van Rheenen, N.2006a. Analysing initial attack on wildland fires usingwildfire behavior and initial attack success Fried, J.S. ,

  20. Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control

    E-Print Network [OSTI]

    Klimley, A. Peter

    477 CHAPTER 31 Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control ................................................................................................................................... 478 White Shark Attack Statistics........................................................................................................ 479 Definition of Shark Attack

  1. Heart Disease and Early Heart Attack Care

    E-Print Network [OSTI]

    Ohta, Shigemi

    Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: Coronary artery disease (CAD) Angina

  2. ADVANCED WORKER PROTECTION SYSTEM

    SciTech Connect (OSTI)

    Judson Hedgehock

    2001-03-16T23:59:59.000Z

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify the design, OSS was able to develop and successfully test, in both the lab and in the field, a prototype AWPS. They clearly demonstrated that a system which provides cooling can significantly increase worker productivity by extending the time they can function in a protective garment. They were also able to develop mature outer garment and LCG designs that provide considerable benefits over current protective equipment, such as self donning and doffing, better visibility, and machine washable. A thorough discussion of the activities performed during Phase 1 and Phase 2 is presented in the AWPS Final Report. The report also describes the current system design, outlines the steps needed to certify the AWPS, discusses the technical and programmatic issues that prevented the system from being certified, and presents conclusions and recommendations based upon the seven year effort.

  3. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  4. On attack correlation and the benefits of sharing IDS data

    E-Print Network [OSTI]

    Katti, Sachin (Katti Rajsekhar)

    2005-01-01T23:59:59.000Z

    This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), this thesis ...

  5. Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    1 Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs Steven Noel and Sushil optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph. The set of all such paths through the network constitutes an attack graph, which we aggregate according

  6. A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED

    E-Print Network [OSTI]

    Fried, Jeremy S.

    A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED FIRE CONTAINMENT MODEL Jeremy S, contemporary initial attack models, such as the California Fire Economics Simulator (CFES) ver- sion 2 simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics

  7. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    E-Print Network [OSTI]

    Zenner, Erik

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor Leander, Mohamed Ahmed PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we

  8. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  9. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber- physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations

  10. A Fast Eavesdropping Attack Against Touchscreens Federico Maggi

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Fast Eavesdropping Attack Against Touchscreens Federico Maggi Alberto Volpatto Politecnico di, we arise this concern by presenting an automatic attack against mod- ern touchscreen keyboards. We demonstrate the attack against the Apple iPhone--2010's most popular touchscreen device-- although it can

  11. Attack-Resilient Time Synchronization for Wireless Sensor Networks

    E-Print Network [OSTI]

    Yener, Aylin

    Attack-Resilient Time Synchronization for Wireless Sensor Networks Hui Song, Sencun Zhu in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time

  12. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

  13. Extending the GHS Weil Descent Attack No Author Given

    E-Print Network [OSTI]

    Hess, Florian

    Extending the GHS Weil Descent Attack No Author Given No Institute Given Abstract. In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to elds of composite degree over F2 . The principle behind

  14. ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin Inria, France ludovic Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted

  15. Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek

    E-Print Network [OSTI]

    Smith, Sean W.

    Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Dartmouth College Hanover, NH College Hanover, NH 03755 sws@cs.dartmouth.edu ABSTRACT Currently, work on malware attack and defense become the launching point for many attacks on the enterprise network in which the embedded devices

  16. On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

    E-Print Network [OSTI]

    Bremler-Barr, Anat

    results as well. Keywords: DDoS, Network Hardware, Hash , Peacock, Cuckoo. 1 Introduction Modern high. Such network hardware elements are highly preferable targets for DDoS (Distributed Denial of Service) attacks with knowledge about how the system works, an attacker can perform a low-bandwidth sophisticated DDoS attack

  17. Environmental Life-cycle Assessment of Passenger Transportation An Energy, Greenhouse Gas, and Criteria Pollutant Inventory of Rail and Air Transportation

    E-Print Network [OSTI]

    Horvath, Arpad; Chester, Mikhail

    2008-01-01T23:59:59.000Z

    Selection in Life-Cycle Inventories Using Hybrid Approaches,and Criteria Pollutant Inventories of Automobiles, Buses,Criteria Pollutant Inventory of Rail and Air Transportation

  18. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2007-01-01T23:59:59.000Z

    A Life-Cycle Model of an Automobile, Environmental Science &Pollutant Inventories of Automobiles, Buses, Light Rail,Pollutant Inventories of Automobiles, Buses, Light Rail,

  19. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes requirements for management and operation of the DOE Protective Force (PF), establishes requirements for firearms operations and defines the firearms courses of fire. Cancels: DOE M 473.2-1A DOE M 473.2-2

  20. Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-03-07T23:59:59.000Z

    The manual establishes requirements for management and operation of the DOE Protective Force, establishes requirements for firearms operations and defines the firearms courses of fire. Chg 1 dated 3/7/06. DOE M 470.4-3A cancels DOE M 470.4-3, Chg 1, Protective Force, dated 3-7-06, Attachment 2, Contractor Requirement Document (CRD) only (except for Section C). Chg 1, dated 3-7-06, cancels DOE M 470.4-3

  1. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Chg 1, dated 3/7/06. Cancels: DOE M 473.1-1 and DOE M 471.2-1B

  2. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes requirements for the physical protection of safeguards and security interests. Copies of Section B, Safeguards and Security Alarm Management System, which contains Unclassified Controlled Nuclear Information, and Appendix 1, Security Badge Specifications, which contains Official Use Only information, are only available, by request, from the program manager, Protection Program Operations, 301-903-6209. Cancels: DOE M 473.1-1 and DOE M 471.2-1B.

  3. Corrosion protection

    DOE Patents [OSTI]

    Brown, Donald W.; Wagh, Arun S.

    2003-05-27T23:59:59.000Z

    There has been invented a chemically bonded phosphate corrosion protection material and process for application of the corrosion protection material for corrosion prevention. A slurry of iron oxide and phosphoric acid is used to contact a warm surface of iron, steel or other metal to be treated. In the presence of ferrous ions from the iron, steel or other metal, the slurry reacts to form iron phosphates which form grains chemically bonded onto the surface of the steel.

  4. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01T23:59:59.000Z

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  5. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  6. Third Party CNOT Attack on MDI QKD

    E-Print Network [OSTI]

    Arpita Maitra

    2012-09-06T23:59:59.000Z

    In this letter, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). We study how one can suitably present an eavesdropping strategy on MDI QKD, that is in the direction of the fundamental CNOT attack on BB84 protocol, though our approach is quite different. In this strategy, Eve will be able to know expected half of the secret bits communicated between Alice and Bob with certainty (probability 1) without introducing any error. Further, for the remaining bits, where Eve will only be able to predict the bit values as in random guess (with probability 1/2), she will certainly find out whether her interaction induced an error in the secret bits between the communicating parties. Given the asymmetric nature of the CNOT attack, we also introduce Hadamard gates to present a symmetric version. Though our analysis does not refute the security claims in MDI QKD, adapting the CNOT attack in this scenario requires nontrivial approach using entanglement swapping.

  7. Sequential Defense Against Random and Intentional Attacks in Complex Networks

    E-Print Network [OSTI]

    Chen, Pin-Yu

    2015-01-01T23:59:59.000Z

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is firstly proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and valida...

  8. ICC 2006 SUBMISSION 1 On the Impact of Low-Rate Attacks

    E-Print Network [OSTI]

    Guirguis, Mina S. - Department of Computer Science, Texas State University

    -Rate Attacks; I. INTRODUCTION Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios

  9. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA)

    1986-01-01T23:59:59.000Z

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  10. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA); Zymboly, Gregory E. (Penn Hills Township, Allegheny County, PA)

    1985-01-01T23:59:59.000Z

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  11. Protective interlayer for high temperature solid electrolyte electrochemical cells

    DOE Patents [OSTI]

    Isenberg, Arnold O. (Forest Hills Boro, PA); Ruka, Roswell J. (Churchill Boro, PA)

    1987-01-01T23:59:59.000Z

    A high temperature, solid electrolyte electrochemical cell is made, having a first and second electrode with solid electrolyte between them, where the electrolyte is formed by hot chemical vapor deposition, where a solid, interlayer material, which is electrically conductive, oxygen permeable, and protective of electrode material from hot metal halide vapor attack, is placed between the first electrode and the electrolyte, to protect the first electrode from the hot metal halide vapors during vapor deposition.

  12. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, D.E.; Czanderna, A.W.; Kennedy, C.E.

    1996-01-30T23:59:59.000Z

    A protective diffusion barrier having adhesive qualities for metalized surfaces is provided by a passivating agent having the formula HS--(CH{sub 2}){sub 11}--COOH which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces. 8 figs.

  13. Molecular assemblies as protective barriers and adhesion promotion interlayer

    DOE Patents [OSTI]

    King, David E. (Lakewood, CO); Czanderna, Alvin W. (Denver, CO); Kennedy, Cheryl E. (Lafayette, CO)

    1996-01-01T23:59:59.000Z

    A protective diffusion barrier having adhesive qualifies for metalized surfaces is provided by a passivating agent having the formula HS--(CH.sub.2).sub.11 --COOH Which forms a very dense, transparent organized molecular assembly or layer that is impervious to water, alkali, and other impurities and corrosive substances that typically attack metal surfaces.

  14. Lifecycle Assessment of Beijing-Area Building Energy Use and Emissions: Summary Findings and Policy Applications

    SciTech Connect (OSTI)

    Aden, Nathaniel; Qin, Yining; Fridley, David

    2010-09-15T23:59:59.000Z

    Buildings are at the locus of three trends driving China's increased energy use and emissions: urbanization, growing personal consumption, and surging heavy industrial production. Migration to cities and urban growth create demand for new building construction. Higher levels of per-capita income and consumption drive building operational energy use with demand for higher intensity lighting, thermal comfort, and plug-load power. Demand for new buildings, infrastructure, and electricity requires heavy industrial production. In order to quantify the implications of China's ongoing urbanization, rising personal consumption, and booming heavy industrial sector, this study presents a lifecycle assessment (LCA) of the energy use and carbon emissions related to residential and commercial buildings. The purpose of the LCA model is to quantify the impact of a given building and identify policy linkages to mitigate energy demand and emissions growth related to China's new building construction. As efficiency has become a higher priority with growing energy demand, policy and academic attention to buildings has focused primarily on operational energy use. Existing studies estimate that building operational energy consumption accounts for approximately 25% of total primary energy use in China. However, buildings also require energy for mining, extracting, processing, manufacturing, and transporting materials, as well as energy for construction, maintenance, and decommissioning. Building and supporting infrastructure construction is a major driver of industry consumption--in 2008 industry accounted for 72% of total Chinese energy use. The magnitude of new building construction is large in China--in 2007, for example, total built floor area reached 58 billion square meters. During the construction boom in 2007 and 2008, more than two billion m{sup 2} of building space were added annually; China's recent construction is estimated to account for half of global construction. Lawrence Berkeley National Laboratory (LBNL) developed an integrated LCA model to capture the energy and emissions implications of all aspects of new buildings from material mining through construction, operations, and decommissioning. Over the following four sections, this report describes related existing research, the LBNL building LCA model structure and results, policy linkages of this lifecycle assessment, and conclusions and recommendations for follow-on work. The LBNL model is a first-order approach to gathering local data and applying lifecycle assessment to buildings in the Beijing area--it represents one effort among a range of established, predominantly American and European, LCA models. This report identifies the benefits, limitations, and policy applications of lifecycle assessment modeling for quantifying the energy and emissions impacts of specific residential and commercial buildings.

  15. Comprehensive Lifecycle Planning and Management System For Addressing Water Issues Associated With Shale Gas Development In New York, Pennsylvania, And West Virginia

    SciTech Connect (OSTI)

    J. Daniel Arthur

    2012-03-31T23:59:59.000Z

    The objective of this project is to develop a modeling system to allow operators and regulators to plan all aspects of water management activities associated with shale gas development in the target project area of New York, Pennsylvania, and West Virginia (??target area?), including water supply, transport, storage, use, recycling, and disposal and which can be used for planning, managing, forecasting, permit tracking, and compliance monitoring. The proposed project is a breakthrough approach to represent the entire shale gas water lifecycle in one comprehensive system with the capability to analyze impacts and options for operational efficiency and regulatory tracking and compliance, and to plan for future water use and disposition. It will address all of the major water-related issues of concern associated with shale gas development in the target area, including water withdrawal, transport, storage, use, treatment, recycling, and disposal. It will analyze the costs, water use, and wastes associated with the available options, and incorporate constraints presented by permit requirements, agreements, local and state regulations, equipment and material availability, etc. By using the system to examine the water lifecycle from withdrawals through disposal, users will be able to perform scenario analysis to answer "what if" questions for various situations. The system will include regulatory requirements of the appropriate state and regional agencies and facilitate reporting and permit applications and tracking. These features will allow operators to plan for more cost effective resource production. Regulators will be able to analyze impacts of development over an entire area. Regulators can then make informed decisions about the protections and practices that should be required as development proceeds. This modeling system will have myriad benefits for industry, government, and the public. For industry, it will allow planning all water management operations for a project or an area as one entity to optimize water use and minimize costs subject to regulatory and other constraints. It will facilitate analysis of options and tradeoffs, and will also simplify permitting and reporting to regulatory agencies. The system will help regulators study cumulative impacts of development, conserve water resources, and manage disposal options across a region. It will also allow them to track permits and monitor compliance. The public will benefit from water conservation, improved environmental performance as better system wide decisions are made, and greater supply of natural gas, with attendant lower prices, as costs are reduced and development is assisted through better planning and scheduling. Altogether, better economics and fewer barriers will facilitate recovery of the more than 300 trillion cubic feet of estimated recoverable natural gas resource in the Marcellus Shale in a manner that protects the environment.

  16. Efficient Algorithms for the p-Self-Protection Problem in Static Wireless Sensor Networks

    E-Print Network [OSTI]

    Wang, Yu

    Efficient Algorithms for the p-Self-Protection Problem in Static Wireless Sensor Networks Yu Wang for static wireless sensor networks in this paper. The self-protection problem focuses on using sensor nodes nodes can resist the attacks targeting them directly. A wireless sensor network is p

  17. Defend your data with broader, deeper server protection IBM ISS Threat Mitigation Services

    E-Print Network [OSTI]

    protection delivers multilayered intrusion preven- tion and detection to help protect your servers from of attacks, including those tunneling through encrypted Web transactions Combines multiple inspection® Server Intrusion Prevention System (IPS) and IBM RealSecure® Server Sensor. Each supports a broad range

  18. Comparing Life-Cycle Costs of ESPCs and Appropriations-Funded Energy Projects: An Update to the 2002 Report

    SciTech Connect (OSTI)

    Shonder, John A [ORNL; Hughes, Patrick [ORNL; Atkin, Erica [ORNL

    2006-11-01T23:59:59.000Z

    A study was sponsored by FEMP in 2001 - 2002 to develop methods to compare life-cycle costs of federal energy conservation projects carried out through energy savings performance contracts (ESPCs) and projects that are directly funded by appropriations. The study described in this report follows up on the original work, taking advantage of new pricing data on equipment and on $500 million worth of Super ESPC projects awarded since the end of FY 2001. The methods developed to compare life-cycle costs of ESPCs and directly funded energy projects are based on the following tasks: (1) Verify the parity of equipment prices in ESPC vs. directly funded projects; (2) Develop a representative energy conservation project; (3) Determine representative cycle times for both ESPCs and appropriations-funded projects; (4) Model the representative energy project implemented through an ESPC and through appropriations funding; and (5) Calculate the life-cycle costs for each project.

  19. LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND DAYLIGHTING OPTIONS IN A HIGH-RISE OFFICE BUILDING

    E-Print Network [OSTI]

    Winkelmann, Frederick C.

    2014-01-01T23:59:59.000Z

    LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND4 LIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL ANDLIFE-CYCLE COST AND ENERGY-USE ANALYSIS OF SUN-CONTROL AND

  20. Semantic Awareness in Product Lifecycle Management Systems Casey James Baker, Douglas Eddy, Dr. Sundar Krishnamurty, Dr. Ian Grosse, Dr. Jack Wileden

    E-Print Network [OSTI]

    Mountziaris, T. J.

    Semantic Awareness in Product Lifecycle Management Systems Casey James Baker, Douglas Eddy, Dr enterprises turn to Product Lifecycle Management (PLM) systems to organize product development and to reduce), in which the PLM system was used to help with the design and fabrication of a product. Windchill

  1. Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst

    E-Print Network [OSTI]

    van der Aalst, Wil

    Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst, The Netherlands m.netjes@tm.tue.nl Abstract. Business Process Management (BPM) systems provide a broad range for the complete BPM life-cycle: (re)design, configuration, execution, control, and diagnosis of processes

  2. Molasses for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Molasses for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol This article has been downloaded from IOPscience. Please scroll for ethanol: the economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis

  3. Physical Protection

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-23T23:59:59.000Z

    This Manual establishes requirements for the physical protection of interests under the U.S. Department of Energys (DOEs) purview ranging from facilities, buildings, Government property, and employees to national security interests such as classified information, special nuclear material (SNM), and nuclear weapons. Cancels Section A of DOE M 470.4-2 Chg 1. Canceled by DOE O 473.3.

  4. Comparative life-cycle cost analysis for low-level mixed waste remediation alternatives

    SciTech Connect (OSTI)

    Jackson, J.A.; White, T.P.; Kloeber, J.M.; Toland, R.J.; Cain, J.P.; Buitrago, D.Y.

    1995-03-01T23:59:59.000Z

    The purpose of this study is two-fold: (1) to develop a generic, life-cycle cost model for evaluating low-level, mixed waste remediation alternatives, and (2) to apply the model specifically, to estimate remediation costs for a site similar to the Fernald Environmental Management Project near Cincinnati, OH. Life-cycle costs for vitrification, cementation, and dry removal process technologies are estimated. Since vitrification is in a conceptual phase, computer simulation is used to help characterize the support infrastructure of a large scale vitrification plant. Cost estimating relationships obtained from the simulation data, previous cost estimates, available process data, engineering judgment, and expert opinion all provide input to an Excel based spreadsheet for generating cash flow streams. Crystal Ball, an Excel add-on, was used for discounting cash flows for net present value analysis. The resulting LCC data was then analyzed using multi-attribute decision analysis techniques with cost and remediation time as criteria. The analytical framework presented allows alternatives to be evaluated in the context of budgetary, social, and political considerations. In general, the longer the remediation takes, the lower the net present value of the process. This is true because of the time value of money and large percentage of the costs attributed to storage or disposal.

  5. Modelling of environmental impacts of solid waste landfilling within the life-cycle analysis program EASEWASTE

    SciTech Connect (OSTI)

    Kirkeby, Janus T.; Birgisdottir, Harpa [Environment and Resources, Technical University of Denmark, DTU, Building 113, DK-2800 Kgs. Lyngby (Denmark); Bhander, Gurbakash Singh; Hauschild, Michael [Department of Manufacturing Engineering and Management, Technical University of Denmark, Building 424, DK-2800 Lyngby (Denmark); Christensen, Thomas H. [Environment and Resources, Technical University of Denmark, DTU, Building 113, DK-2800 Kgs. Lyngby (Denmark)], E-mail: thc@er.dtu.dk

    2007-07-01T23:59:59.000Z

    A new computer-based life-cycle assessment model (EASEWASTE) has been developed to evaluate resource and environmental consequences of solid waste management systems. This paper describes the landfilling sub-model used in the life-cycle assessment program EASEWASTE, and examines some of the implications of this sub-model. All quantities and concentrations of leachate and landfill gas can be modified by the user in order to bring them in agreement with the actual landfill that is assessed by the model. All emissions, except the generation of landfill gas, are process specific. The landfill gas generation is calculated on the basis of organic matter in the landfilled waste. A landfill assessment example is provided. For this example, the normalised environmental effects of landfill gas on global warming and photochemical smog are much greater than the environmental effects for landfill leachate or for landfill construction. A sensitivity analysis for this example indicates that the overall environmental impact is sensitive to the gas collection efficiency and the use of the gas, but not to the amount of leachate generated, or the amount of soil or liner material used in construction. The landfill model can be used for evaluating different technologies with different liners, gas and leachate collection efficiencies, and to compare the environmental consequences of landfilling with alternative waste treatment options such as incineration or anaerobic digestion.

  6. Design and life-cycle considerations for unconventional-reservoir wells

    SciTech Connect (OSTI)

    Miskimins, J.L. [Colorado School of Mines, Golden, CO (United States)

    2009-05-15T23:59:59.000Z

    This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

  7. The Impact of Imperfect Information on Network Attack

    E-Print Network [OSTI]

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01T23:59:59.000Z

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  8. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  9. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  10. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

    1983-01-01T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  11. Protections: Sampling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70 HgPromisingProtecting your personal

  12. active attack tegutsevad: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    traffic. Although it is difficult to detect shrew DDo Chen, Yu 83 Timing analysis in low-latency mix networks: attacks and defenses Computer Technologies and Information Sciences...

  13. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  14. attack model development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  15. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

  16. System Evaluation and Life-Cycle Cost Analysis of a Commercial-Scale High-Temperature Electrolysis Hydrogen Production Plant

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-11-01T23:59:59.000Z

    Results of a system evaluation and lifecycle cost analysis are presented for a commercial-scale high-temperature electrolysis (HTE) central hydrogen production plant. The plant design relies on grid electricity to power the electrolysis process and system components, and industrial natural gas to provide process heat. The HYSYS process analysis software was used to evaluate the reference central plant design capable of producing 50,000 kg/day of hydrogen. The HYSYS software performs mass and energy balances across all components to allow optimization of the design using a detailed process flow sheet and realistic operating conditions specified by the analyst. The lifecycle cost analysis was performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes Microsoft Excel spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. The results of the lifecycle analyses indicate that for a 10% internal rate of return, a large central commercial-scale hydrogen production plant can produce 50,000 kg/day of hydrogen at an average cost of $2.68/kg. When the cost of carbon sequestration is taken into account, the average cost of hydrogen production increases by $0.40/kg to $3.08/kg.

  17. Comparative life-cycle air emissions of coal, domestic natural gas, LNG, and SNG for electricity generation

    SciTech Connect (OSTI)

    Paulina Jaramillo; W. Michael Griffin; H. Scott Matthews [Carnegie Mellon University, Pittsburgh, PA (United States). Civil and Environmental Engineering Department

    2007-09-15T23:59:59.000Z

    The U.S. Department of Energy (DOE) estimates that in the coming decades the United States' natural gas (NG) demand for electricity generation will increase. Estimates also suggest that NG supply will increasingly come from imported liquefied natural gas (LNG). Additional supplies of NG could come domestically from the production of synthetic natural gas (SNG) via coal gasification-methanation. The objective of this study is to compare greenhouse gas (GHG), SOx, and NOx life-cycle emissions of electricity generated with NG/LNG/SNG and coal. This life-cycle comparison of air emissions from different fuels can help us better understand the advantages and disadvantages of using coal versus globally sourced NG for electricity generation. Our estimates suggest that with the current fleet of power plants, a mix of domestic NG, LNG, and SNG would have lower GHG emissions than coal. If advanced technologies with carbon capture and sequestration (CCS) are used, however, coal and a mix of domestic NG, LNG, and SNG would have very similar life-cycle GHG emissions. For SOx and NOx we find there are significant emissions in the upstream stages of the NG/LNG life-cycles, which contribute to a larger range in SOx and NOx emissions for NG/LNG than for coal and SNG. 38 refs., 3 figs., 2 tabs.

  18. Separating Crosscutting Concerns Across the Lifecycle: From Composition Patterns to AspectJ and Hyper/J

    E-Print Network [OSTI]

    Walker, Robert James

    as distribution or persistence) present many problems for software development that manifest themselves throughout requirements and functionality, reuse, development lifecycle. 1. INTRODUCTION Requirements that have- ties for software development [6, 13, 20, 24, 29]. The support for crosscutting behaviour, by its

  19. Texas A&M NetID Lifecycle Management for Texas A&M University Employees and Retirees

    E-Print Network [OSTI]

    record status affects inclusion/exclusion of a record in the data feed to the TAMU Identity Management, employee status code `U' has been added for new employee base records added from the UIN manager programTexas A&M NetID Lifecycle Management for Texas A&M University Employees and Retirees This document

  20. Molasses for ethanol: The economic and environmental impacts of a new pathway for the lifecycle greenhouse gas

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Molasses for ethanol: The economic and environmental impacts of a new pathway for the lifecycle greenhouse gas analysis of sugarcane ethanol Anand R Gopal1,4,6 and Daniel M Kammen1,2,3,5 1 Energy supplying country for the production of sugarcane ethanol; fresh mill-pressed cane juice from a Brazilian

  1. 2000-01-1556 Life-Cycle Cost Sensitivity to Battery-Pack Voltage of an HEV

    E-Print Network [OSTI]

    Tolbert, Leon M.

    2000-01-1556 Life-Cycle Cost Sensitivity to Battery-Pack Voltage of an HEV John W. McKeever, Sujit or voltage level, life cycle costs were calculated based on the components required to execute simulated drive schedules. These life cycle costs include the initial manufacturing cost of components, fuel cost

  2. FY 1996 solid waste integrated life-cycle forecast characteristics summary. Volumes 1 and 2

    SciTech Connect (OSTI)

    Templeton, K.J.

    1996-05-23T23:59:59.000Z

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the physical waste forms, hazardous waste constituents, and radionuclides of the waste expected to be shipped to the CWC from 1996 through the remaining life cycle of the Hanford Site (assumed to extend to 2070). In previous years, forecast data has been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to two previous reports: the more detailed report on waste volumes, WHC-EP-0900, FY1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary and the report on expected containers, WHC-EP-0903, FY1996 Solid Waste Integrated Life-Cycle Forecast Container Summary. All three documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on two main characteristics: the physical waste forms and hazardous waste constituents of low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major generators for each waste category and waste characteristic are also discussed. The characteristics of low-level waste (LLW) are described in Appendix A. In addition, information on radionuclides present in the waste is provided in Appendix B. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste is expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters. The range is primarily due to uncertainties associated with the Tank Waste Remediation System (TWRS) program, including uncertainties regarding retrieval of long-length equipment, scheduling, and tank retrieval technologies.

  3. Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways Ludovic Jacquin Inria the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker in use, the attack either creates a Denial of Service or major performance penalties. This attack

  4. Protecting Software

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70 HgPromising MagnesiumDOE/RichlandStructureProtecting

  5. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  6. Defending Systems Against Application-Level Denial of Service Attacks

    E-Print Network [OSTI]

    Keidar, Idit

    Systems Against Application-Level Denial of Service Attacks Research Thesis Submitted in Partial of the Technion -- Israel Institute of Technology HESHVAN 5768 HAIFA NOVEMBER 2007 #12;#12;The Research Thesis with a Single Port . . . . . . . . . . . 66 5.3.1 Blind Attack

  7. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  8. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  9. Avoiding the Detector Blinding Attack on Quantum Cryptography

    E-Print Network [OSTI]

    Z L Yuan; J F Dynes; A J Shields

    2010-09-30T23:59:59.000Z

    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately.

  10. Combined Modeling and Side Channel Attacks on Strong PUFs

    E-Print Network [OSTI]

    , unknown to the adversary. This requirement can be difficult to uphold in practice: Physical attacks like- tacks on PUF core properties have been reported. They con- cern their physical and digital unclonability, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter

  11. Thomas E. Hinds Although many diseases attack aspen, relatively few

    E-Print Network [OSTI]

    DISEASES Thomas E. Hinds Although many diseases attack aspen, relatively few kill or seriously of aspen, whereas there are subtle differ- ences in distribution between the important decay fungi. Foliage Diseases Fungus Diseases Many fungi are capable of attacking aspen leaves, from juvenile growth

  12. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden of these applications, security and integrity of the devices have become a critical concern. Due to the mobile and wire the phone. We target on the energy attacks on wireless systems caused by hardware Trojans (HTs), which

  13. Heart Attack Survival Plan Information To Share With

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

  14. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  15. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  16. Energy-Based Attack Detection in Networked Control Emeka Eyisi

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    systems includ- ing medical devices [13] and waste water treatment plants [1]. In securing CPSEnergy-Based Attack Detection in Networked Control Systems Emeka Eyisi United Technologies Research.koutsoukos@vanderbilt.edu ABSTRACT The increased prevalence of attacks on Cyber-Physical Systems (CPS) as well as the safety

  17. Cardiologists from CU testing revolutionary heart-attack treatment

    E-Print Network [OSTI]

    Cerveny, Vlastislav

    Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

  18. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  19. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  20. INFORMATION SHARING AGREEMENT BETWEEN THE DANISH ENVIRONMENTAL PROTECTION AGENCY AND THE CALIFORNIA

    E-Print Network [OSTI]

    , lifecycle analysis and alternatives analysis in addition to current risk management strategies for making chemical hazard data accessible and meaningful; 3) Standards based on lifecycle, sustainability

  1. System Evaluations and Life-Cycle Cost Analyses for High-Temperature Electrolysis Hydrogen Production Facilities

    SciTech Connect (OSTI)

    Edwin A. Harvego; James E. O'Brien; Michael G. McKellar

    2012-05-01T23:59:59.000Z

    This report presents results of system evaluations and lifecycle cost analyses performed for several different commercial-scale high-temperature electrolysis (HTE) hydrogen production concepts. The concepts presented in this report rely on grid electricity and non-nuclear high-temperature process heat sources for the required energy inputs. The HYSYS process analysis software was used to evaluate both central plant designs for large-scale hydrogen production (50,000 kg/day or larger) and forecourt plant designs for distributed production and delivery at about 1,500 kg/day. The HYSYS software inherently ensures mass and energy balances across all components and it includes thermodynamic data for all chemical species. The optimized designs described in this report are based on analyses of process flow diagrams that included realistic representations of fluid conditions and component efficiencies and operating parameters for each of the HTE hydrogen production configurations analyzed. As with previous HTE system analyses performed at the INL, a custom electrolyzer model was incorporated into the overall process flow sheet. This electrolyzer model allows for the determination of the average Nernst potential, cell operating voltage, gas outlet temperatures, and electrolyzer efficiency for any specified inlet steam, hydrogen, and sweep-gas flow rates, current density, cell active area, and external heat loss or gain. The lifecycle cost analyses were performed using the H2A analysis methodology developed by the Department of Energy (DOE) Hydrogen Program. This methodology utilizes spreadsheet analysis tools that require detailed plant performance information (obtained from HYSYS), along with financial and cost information to calculate lifecycle costs. There are standard default sets of assumptions that the methodology uses to ensure consistency when comparing the cost of different production or plant design options. However, these assumptions may also be varied within the spreadsheets when better information is available or to allow the performance of sensitivity studies. The selected reference plant design for this study was a 1500 kg/day forecourt hydrogen production plant operating in the thermal-neutral mode. The plant utilized industrial natural gas-fired heaters to provide process heat, and grid electricity to supply power to the electrolyzer modules and system components. Modifications to the reference design included replacing the gas-fired heaters with electric resistance heaters, changing the operating mode of the electrolyzer (to operate below the thermal-neutral voltage), and considering a larger 50,000 kg/day central hydrogen production plant design. Total H2A-calculated hydrogen production costs for the reference 1,500 kg/day forecourt hydrogen production plant were $3.42/kg. The all-electric plant design using electric resistance heaters for process heat, and the reference design operating below the thermal-neutral voltage had calculated lifecycle hydrogen productions costs of $3.55/kg and $5.29/kg, respectively. Because of its larger size and associated economies of scale, the 50,000 kg/day central hydrogen production plant was able to produce hydrogen at a cost of only $2.89/kg.

  2. Development and Validation of a Lifecycle-based Prognostics Architecture with Test Bed Validation

    SciTech Connect (OSTI)

    Hines, J. Wesley; Upadhyaya, Belle; Sharp, Michael; Ramuhalli, Pradeep

    2014-11-06T23:59:59.000Z

    On-line monitoring and tracking of nuclear plant system and component degradation is being investigated as a method for improving the safety, reliability, and maintainability of aging nuclear power plants. Accurate prediction of the current degradation state of system components and structures is important for accurate estimates of their remaining useful life (RUL). The correct quantification and propagation of both the measurement uncertainty and model uncertainty is necessary for quantifying the uncertainty of the RUL prediction. This research project developed and validated methods to perform RUL estimation throughout the lifecycle of plant components. Prognostic methods should seamlessly operate from beginning of component life (BOL) to end of component life (EOL). We term this "Lifecycle Prognostics." When a component is put into use, the only information available may be past failure times of similar components used in similar conditions, and the predicted failure distribution can be estimated with reliability methods such as Weibull Analysis (Type I Prognostics). As the component operates, it begins to degrade and consume its available life. This life consumption may be a function of system stresses, and the failure distribution should be updated to account for the system operational stress levels (Type II Prognostics). When degradation becomes apparent, this information can be used to again improve the RUL estimate (Type III Prognostics). This research focused on developing prognostics algorithms for the three types of prognostics, developing uncertainty quantification methods for each of the algorithms, and, most importantly, developing a framework using Bayesian methods to transition between prognostic model types and update failure distribution estimates as new information becomes available. The developed methods were then validated on a range of accelerated degradation test beds. The ultimate goal of prognostics is to provide an accurate assessment for RUL predictions, with as little uncertainty as possible. From a reliability and maintenance standpoint, there would be improved safety by avoiding all failures. Calculated risk would decrease, saving money by avoiding unnecessary maintenance. One major bottleneck for data-driven prognostics is the availability of run-to-failure degradation data. Without enough degradation data leading to failure, prognostic models can yield RUL distributions with large uncertainty or mathematically unsound predictions. To address these issues a "Lifecycle Prognostics" method was developed to create RUL distributions from Beginning of Life (BOL) to End of Life (EOL). This employs established Type I, II, and III prognostic methods, and Bayesian transitioning between each Type. Bayesian methods, as opposed to classical frequency statistics, show how an expected value, a priori, changes with new data to form a posterior distribution. For example, when you purchase a component you have a prior belief, or estimation, of how long it will operate before failing. As you operate it, you may collect information related to its condition that will allow you to update your estimated failure time. Bayesian methods are best used when limited data are available. The use of a prior also means that information is conserved when new data are available. The weightings of the prior belief and information contained in the sampled data are dependent on the variance (uncertainty) of the prior, the variance (uncertainty) of the data, and the amount of measured data (number of samples). If the variance of the prior is small compared to the uncertainty of the data, the prior will be weighed more heavily. However, as more data are collected, the data will be weighted more heavily and will eventually swamp out the prior in calculating the posterior distribution of model parameters. Fundamentally Bayesian analysis updates a prior belief with new data to get a posterior belief. The general approach to applying the Bayesian method to lifecycle prognostics consisted of identifying the prior, which is the RUL es

  3. Material and energy recovery in integrated waste management systems: A life-cycle costing approach

    SciTech Connect (OSTI)

    Massarutto, Antonio [University of Udine, Udine (Italy); IEFE, Bocconi University, Milan (Italy); Carli, Alessandro de, E-mail: alessandro.decarli@unibocconi.it [IEFE, Bocconi University, Milan (Italy); Graffi, Matteo [University of Udine, Udine (Italy); IEFE, Bocconi University, Milan (Italy)

    2011-09-15T23:59:59.000Z

    Highlights: > The study aims at assessing economic performance of alternative scenarios of MSW. > The approach is the life-cycle costing (LCC). > Waste technologies must be considered as complementary into an integrated strategy. - Abstract: A critical assumption of studies assessing comparatively waste management options concerns the constant average cost for selective collection regardless the source separation level (SSL) reached, and the neglect of the mass constraint. The present study compares alternative waste management scenarios through the development of a desktop model that tries to remove the above assumption. Several alternative scenarios based on different combinations of energy and materials recovery are applied to two imaginary areas modelled in order to represent a typical Northern Italian setting. External costs and benefits implied by scenarios are also considered. Scenarios are compared on the base of the full cost for treating the total waste generated in the area. The model investigates the factors that influence the relative convenience of alternative scenarios.

  4. Life-cycle cost and payback period analysis for commercial unitary air conditioners

    SciTech Connect (OSTI)

    Rosenquist, Greg; Coughlin, Katie; Dale, Larry; McMahon, James; Meyers, Steve

    2004-03-31T23:59:59.000Z

    This report describes an analysis of the economic impacts of possible energy efficiency standards for commercial unitary air conditioners and heat pumps on individual customers in terms of two metrics: life-cycle cost (LCC) and payback period (PBP). For each of the two equipment classes considered, the 11.5 EER provides the largest mean LCC savings. The results show how the savings vary among customers facing different electricity prices and other conditions. At 11.5 EER, at least 80% of the users achieve a positive LCC savings. At 12.0 EER, the maximum efficiency analyzed, mean LCC savings are lower but still positive. For the {ge} $65,000 Btu/h to <135,000 Btu/h equipment class, 59% of users achieve a positive LCC savings. For the $135,000 Btu/h to <240,000 Btu/h equipment class, 91% of users achieve a positive LCC savings.

  5. Life-cycle analysis results of geothermal systems in comparison to other power systems.

    SciTech Connect (OSTI)

    Sullivan, J. L.; Clark, C. E.; Han, J.; Wang, M.; Energy Systems

    2010-10-11T23:59:59.000Z

    A life-cycle energy and greenhouse gas emissions analysis has been conducted with Argonne National Laboratory's expanded Greenhouse Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model for geothermal power-generating technologies, including enhanced geothermal, hydrothermal flash, and hydrothermal binary technologies. As a basis of comparison, a similar analysis has been conducted for other power-generating systems, including coal, natural gas combined cycle, nuclear, hydroelectric, wind, photovoltaic, and biomass by expanding the GREET model to include power plant construction for these latter systems with literature data. In this way, the GREET model has been expanded to include plant construction, as well as the usual fuel production and consumption stages of power plant life cycles. For the plant construction phase, on a per-megawatt (MW) output basis, conventional power plants in general are found to require less steel and concrete than renewable power systems. With the exception of the concrete requirements for gravity dam hydroelectric, enhanced geothermal and hydrothermal binary used more of these materials per MW than other renewable power-generation systems. Energy and greenhouse gas (GHG) ratios for the infrastructure and other life-cycle stages have also been developed in this study per kilowatt-hour (kWh) of electricity output by taking into account both plant capacity and plant lifetime. Generally, energy burdens per energy output associated with plant infrastructure are higher for renewable systems than conventional ones. GHG emissions per kWh of electricity output for plant construction follow a similar trend. Although some of the renewable systems have GHG emissions during plant operation, they are much smaller than those emitted by fossil fuel thermoelectric systems. Binary geothermal systems have virtually insignificant GHG emissions compared to fossil systems. Taking into account plant construction and operation, the GREET model shows that fossil thermal plants have fossil energy use and GHG emissions per kWh of electricity output about one order of magnitude higher than renewable power systems, including geothermal power.

  6. Life-cycle assessment of corn-based butanol as a potential transportation fuel.

    SciTech Connect (OSTI)

    Wu, M.; Wang, M.; Liu, J.; Huo, H.; Energy Systems

    2007-12-31T23:59:59.000Z

    Butanol produced from bio-sources (such as corn) could have attractive properties as a transportation fuel. Production of butanol through a fermentation process called acetone-butanol-ethanol (ABE) has been the focus of increasing research and development efforts. Advances in ABE process development in recent years have led to drastic increases in ABE productivity and yields, making butanol production worthy of evaluation for use in motor vehicles. Consequently, chemical/fuel industries have announced their intention to produce butanol from bio-based materials. The purpose of this study is to estimate the potential life-cycle energy and emission effects associated with using bio-butanol as a transportation fuel. The study employs a well-to-wheels analysis tool--the Greenhouse Gases, Regulated Emissions and Energy Use in Transportation (GREET) model developed at Argonne National Laboratory--and the Aspen Plus{reg_sign} model developed by AspenTech. The study describes the butanol production from corn, including grain processing, fermentation, gas stripping, distillation, and adsorption for products separation. The Aspen{reg_sign} results that we obtained for the corn-to-butanol production process provide the basis for GREET modeling to estimate life-cycle energy use and greenhouse gas emissions. The GREET model was expanded to simulate the bio-butanol life cycle, from agricultural chemical production to butanol use in motor vehicles. We then compared the results for bio-butanol with those of conventional gasoline. We also analyzed the bio-acetone that is coproduced with bio-butanol as an alternative to petroleum-based acetone. Our study shows that, while the use of corn-based butanol achieves energy benefits and reduces greenhouse gas emissions, the results are affected by the methods used to treat the acetone that is co-produced in butanol plants.

  7. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01T23:59:59.000Z

    and the Multiscalar Attack on the State: Consequences forand the multiscalar attack on the state: Consequences forand the multiscalar attack on the state: Consequences for

  8. Network attack detection and defense Manifesto of the Dagstuhl Perspective Workshop, March 2nd6th, 2008

    E-Print Network [OSTI]

    Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

    2009-01-01T23:59:59.000Z

    y REGULRE BEITRGE Network attack detection and defense Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

  9. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01T23:59:59.000Z

    There is an emerging consensus that the nations electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  10. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  11. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

    2011-01-01T23:59:59.000Z

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  12. E-Print Network 3.0 - abdool karim attacking Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    . We further describe specific attacks on two existing proposals, namely SWATT and ICE-based schemes... , and ar- gue about the difficulty of fixing them. All attacks...

  13. An Analysis of the Economic and Financial Life-Cycle Costs of Reverse-Osmosis Desalination in South Texas: A Case Study of the Southmost Facility

    E-Print Network [OSTI]

    Sturdivant, A.; Rister, M.; Rogers, C.; Lacewell, R.; Norris, J.; Leal, J.; Garza, J.; Adams, J.

    2009-01-01T23:59:59.000Z

    to include sensitivity analyses of useful life, initial construction costs, annual energy costs, and production efficiency rate, amongst others. The current estimated total annual life-cycle costs (in 2006 dollars) to produce and deliver desalinated water...

  14. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26T23:59:59.000Z

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  15. ICPP tank farm closure study. Volume 3: Cost estimates, planning schedules, yearly cost flowcharts, and life-cycle cost estimates

    SciTech Connect (OSTI)

    NONE

    1998-02-01T23:59:59.000Z

    This volume contains information on cost estimates, planning schedules, yearly cost flowcharts, and life-cycle costs for the six options described in Volume 1, Section 2: Option 1 -- Total removal clean closure; No subsequent use; Option 2 -- Risk-based clean closure; LLW fill; Option 3 -- Risk-based clean closure; CERCLA fill; Option 4 -- Close to RCRA landfill standards; LLW fill; Option 5 -- Close to RCRA landfill standards; CERCLA fill; and Option 6 -- Close to RCRA landfill standards; Clean fill. This volume is divided into two portions. The first portion contains the cost and planning schedule estimates while the second portion contains life-cycle costs and yearly cash flow information for each option.

  16. FY 1996 solid waste integrated life-cycle forecast container summary volume 1 and 2

    SciTech Connect (OSTI)

    Valero, O.J.

    1996-04-23T23:59:59.000Z

    For the past six years, a waste volume forecast has been collected annually from onsite and offsite generators that currently ship or are planning to ship solid waste to the Westinghouse Hanford Company`s Central Waste Complex (CWC). This document provides a description of the containers expected to be used for these waste shipments from 1996 through the remaining life cycle of the Hanford Site. In previous years, forecast data have been reported for a 30-year time period; however, the life-cycle approach was adopted this year to maintain consistency with FY 1996 Multi-Year Program Plans. This document is a companion report to the more detailed report on waste volumes: WHC-EP0900, FY 1996 Solid Waste Integrated Life-Cycle Forecast Volume Summary. Both of these documents are based on data gathered during the FY 1995 data call and verified as of January, 1996. These documents are intended to be used in conjunction with other solid waste planning documents as references for short and long-term planning of the WHC Solid Waste Disposal Division`s treatment, storage, and disposal activities over the next several decades. This document focuses on the types of containers that will be used for packaging low-level mixed waste (LLMW) and transuranic waste (both non-mixed and mixed) (TRU(M)). The major waste generators for each waste category and container type are also discussed. Containers used for low-level waste (LLW) are described in Appendix A, since LLW requires minimal treatment and storage prior to onsite disposal in the LLW burial grounds. The FY 1996 forecast data indicate that about 100,900 cubic meters of LLMW and TRU(M) waste are expected to be received at the CWC over the remaining life cycle of the site. Based on ranges provided by the waste generators, this baseline volume could fluctuate between a minimum of about 59,720 cubic meters and a maximum of about 152,170 cubic meters.

  17. Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

  18. On the Complexity of Matsui's Attack Pascal Junod

    E-Print Network [OSTI]

    On the Complexity of Matsui's Attack Pascal Junod Security and Cryptography Laboratory Swiss at random and where depends on the key value. Given some plaintext bits Pi1 , . . . , Pir , ciphertext bits

  19. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Warinschi, Bogdan

    Guessing Attacks and the Computational Soundness of Static Equivalence Martin Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  20. On countermeasures of worm attacks over the Internet

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15T23:59:59.000Z

    Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ...

  1. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 on digital signatures on an example using GPG (section 5) and finally an exam- ple of real-world attack

  2. After-gate attack on a quantum cryptosystem

    E-Print Network [OSTI]

    Carlos Wiechers; Lars Lydersen; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2010-09-14T23:59:59.000Z

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  3. Time-shift attack in practical quantum cryptosystems

    E-Print Network [OSTI]

    Bing Qi; Chi-Hang Fred Fung; Hoi-Kwong Lo; Xiongfeng Ma

    2006-05-11T23:59:59.000Z

    Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in principle, could acquire full information on the final key without introducing any error. Finally, we discuss some counter measures against our and earlier attacks.

  4. Active Attacks Against Modulation-based Radiometric Identification

    E-Print Network [OSTI]

    Bystroff, Chris

    ) may become compromised via physical attacks. In light of these difficulties, researchers have started Science Technical Report 09-02 Matthew Edman and B¨ulent Yener Rensselaer Polytechnic Institute Department

  5. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  6. Coordinated Variable Structure Switching Attacks for Smart Grid

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11T23:59:59.000Z

    The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop ...

  7. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  8. Protecting Life on Earth

    E-Print Network [OSTI]

    Anderson, Byron P.

    2011-01-01T23:59:59.000Z

    Review: Protecting Life on Earth: An Introduction to thePeter B. Protecting Life on Earth: An Introduction to theof Protecting Life on Earth is to explain to an intelligent

  9. environmental management radiation protection

    E-Print Network [OSTI]

    Entekhabi, Dara

    EHS environmental management biosafety radiation protection industrial hygiene safety Working: Biosafety, Environmental Management, Industrial Hygiene, Radiation Protection and Safety. Each specialized Management Program, Industrial Hygiene, Radiation Protection Program, and the Safety Program. (http

  10. Cybersecurity incidents are increasing in frequency and complexity year after year. This is due to a lack of

    E-Print Network [OSTI]

    solutions, and we will slide further down the asymmetric slope away from the attackers. Science Lifecycle

  11. Evaluation of Life-Cycle Assessment Studies of Chinese Cement Production: Challenges and Opportunities

    SciTech Connect (OSTI)

    Lu, Hongyou; Masanet, Eric; Price, Lynn

    2009-05-29T23:59:59.000Z

    The use of life-cycle assessment (LCA) to understand the embodied energy, environmental impacts, and potential energy-savings of manufactured products has become more widespread among researchers in recent years. This paper reviews recent LCA studies in the cement industry in China and in other countries and provides an assessment of the methodology used by the researchers compared to ISO LCA standards (ISO 14040:2006, ISO 14044:2006, and ISO/TR 14048:2002). We evaluate whether the authors provide information on the intended application, targeted audience, functional unit, system boundary, data sources, data quality assessment, data disaggregation and other elements, and draw conclusions regarding the level of adherence to ISO standards for the papers reviewed. We found that China researchers have gained much experience during last decade, but still have room for improvement in establishing boundaries, assessing data quality, identifying data sources, and explaining limitations. The paper concludes with a discussion of directions for future LCA research in China.

  12. Life-cycle energy savings potential from aluminum-intensive vehicles

    SciTech Connect (OSTI)

    Stodolsky, F.; Vyas, A.; Cuenca, R.; Gaines, L.

    1995-07-01T23:59:59.000Z

    The life-cycle energy and fuel-use impacts of US-produced aluminum-intensive passenger cars and passenger trucks are assessed. The energy analysis includes vehicle fuel consumption, material production energy, and recycling energy. A model that stimulates market dynamics was used to project aluminum-intensive vehicle market shares and national energy savings potential for the period between 2005 and 2030. We conclude that there is a net energy savings with the use of aluminum-intensive vehicles. Manufacturing costs must be reduced to achieve significant market penetration of aluminum-intensive vehicles. The petroleum energy saved from improved fuel efficiency offsets the additional energy needed to manufacture aluminum compared to steel. The energy needed to make aluminum can be reduced further if wrought aluminum is recycled back to wrought aluminum. We find that oil use is displaced by additional use of natural gas and nonfossil energy, but use of coal is lower. Many of the results are not necessarily applicable to vehicles built outside of the United States, but others could be used with caution.

  13. The Lifecycle of Bayesian Network Models Developed for Multi-Source Signature Assessment of Nuclear Programs

    SciTech Connect (OSTI)

    Gastelum, Zoe N.; White, Amanda M.; Whitney, Paul D.; Gosink, Luke J.; Sego, Landon H.

    2013-06-04T23:59:59.000Z

    The Multi-Source Signatures for Nuclear Programs project, part of Pacific Northwest National Laboratorys (PNNL) Signature Discovery Initiative, seeks to computationally capture expert assessment of multi-type information such as text, sensor output, imagery, or audio/video files, to assess nuclear activities through a series of Bayesian network (BN) models. These models incorporate knowledge from a diverse range of information sources in order to help assess a countrys nuclear activities. The models span engineering topic areas, state-level indicators, and facility-specific characteristics. To illustrate the development, calibration, and use of BN models for multi-source assessment, we present a model that predicts a countrys likelihood to participate in the international nuclear nonproliferation regime. We validate this model by examining the extent to which the model assists non-experts arrive at conclusions similar to those provided by nuclear proliferation experts. We also describe the PNNL-developed software used throughout the lifecycle of the Bayesian network model development.

  14. Life-cycle analysis results for geothermal systems in comparison to other power systems: Part II.

    SciTech Connect (OSTI)

    Sullivan, J.L.; Clark, C.E.; Yuan, L.; Han, J.; Wang, M. (Energy Systems)

    2012-02-08T23:59:59.000Z

    A study has been conducted on the material demand and life-cycle energy and emissions performance of power-generating technologies in addition to those reported in Part I of this series. The additional technologies included concentrated solar power, integrated gasification combined cycle, and a fossil/renewable (termed hybrid) geothermal technology, more specifically, co-produced gas and electric power plants from geo-pressured gas and electric (GPGE) sites. For the latter, two cases were considered: gas and electricity export and electricity-only export. Also modeled were cement, steel and diesel fuel requirements for drilling geothermal wells as a function of well depth. The impact of the construction activities in the building of plants was also estimated. The results of this study are consistent with previously reported trends found in Part I of this series. Among all the technologies considered, fossil combustion-based power plants have the lowest material demand for their construction and composition. On the other hand, conventional fossil-based power technologies have the highest greenhouse gas (GHG) emissions, followed by the hybrid and then two of the renewable power systems, namely hydrothermal flash power and biomass-based combustion power. GHG emissions from U.S. geothermal flash plants were also discussed, estimates provided, and data needs identified. Of the GPGE scenarios modeled, the all-electric scenario had the highest GHG emissions. Similar trends were found for other combustion emissions.

  15. What life-cycle assessment does and does not do in assessments of waste management

    SciTech Connect (OSTI)

    Ekvall, Tomas [IVL Swedish Environmental Research Institute, P.O. Box 5302, SE-400 14 Goeteborg (Sweden)], E-mail: tomas.ekvall@ivl.se; Assefa, Getachew [Industrial Ecology, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Bjoerklund, Anna [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Eriksson, Ola [Technology and Built Environment, University of Gaevle, SE-801 76 Gaevle (Sweden); Finnveden, Goeran [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden)

    2007-07-01T23:59:59.000Z

    In assessments of the environmental impacts of waste management, life-cycle assessment (LCA) helps expanding the perspective beyond the waste management system. This is important, since the indirect environmental impacts caused by surrounding systems, such as energy and material production, often override the direct impacts of the waste management system itself. However, the applicability of LCA for waste management planning and policy-making is restricted by certain limitations, some of which are characteristics inherent to LCA methodology as such, and some of which are relevant specifically in the context of waste management. Several of them are relevant also for other types of systems analysis. We have identified and discussed such characteristics with regard to how they may restrict the applicability of LCA in the context of waste management. Efforts to improve LCA with regard to these aspects are also described. We also identify what other tools are available for investigating issues that cannot be adequately dealt with by traditional LCA models, and discuss whether LCA methodology should be expanded rather than complemented by other tools to increase its scope and applicability.

  16. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users

  17. Office of Physical Protection

    Broader source: Energy.gov [DOE]

    The Office of Physical Protection is comprised of a team of security specialists engaged in providing Headquarters-wide physical protection.

  18. DOE Advanced Protection Project

    Broader source: Energy.gov (indexed) [DOE]

    protection logic in each relay 17 Copyright 2010, Southern California Edison Advanced Protection on the System of the Future * Use fault-interrupting switches with relays...

  19. Shore Protection Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Shore Protection Act is the primary legal authority for protection and management of Georgia's shoreline features including sand dunes, beaches, sandbars, and shoals, collectively known as the...

  20. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  1. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  2. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

  3. New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b

    E-Print Network [OSTI]

    Moulin, Pierre

    New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b University of Illinois analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector

  4. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Miller, Barton P.

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature-based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  5. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

    E-Print Network [OSTI]

    Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

  6. High-speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Chao, Jonathan

    High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H during the Distributed Denial-oJService (DDoS) attack. By allocating bandwidths separately for TCP.9% of the attack trafic while legitimate traflc showed nearly identical performance as in the non-attacked

  7. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

    E-Print Network [OSTI]

    Eustice, Ryan

    CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

  8. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks Jakob Eriksson attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization

  9. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  10. Robust Codes for Fault Attack Resistant Cryptographic Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin

    E-Print Network [OSTI]

    Karpovsky, Mark

    Robust Codes for Fault Attack Resistant Cryptographic Hardware Konrad J. Kulikowski, Mark G algorithms are vulner- able to fault analysis attacks. To detect these attacks we propose an architec- ture by an attacker. Architectures based on these codes have fewer undetectable er- rors than linear codes

  11. Analyzing the Security in the GSM Radio Network using Attack Jungles

    E-Print Network [OSTI]

    Abdulla, Parosh Aziz

    Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker

  12. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  13. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature­based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  14. Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure to perform advanced attacks. We have experimentally validated the proposed method by attacking a DES

  15. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  16. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance

  17. Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1

    E-Print Network [OSTI]

    Zhang, Jian

    Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

  18. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy- sis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms

  19. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance anal- ysis to information- theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives

  20. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    E-Print Network [OSTI]

    Wang, Wenye

    From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce

  1. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on di#erent cryptosystems. Recently, the principle of combined attacks#erent fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  2. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  3. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on different cryptosystems. Recently, the principle of combined attacks different fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  4. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

    E-Print Network [OSTI]

    Stehr, Mark-Oliver

    Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis with conference proceedings. So-called rubber hose attacks have long been the bane of security systems

  5. Learn What a Heart Attack Feels Like--It Could Save Your Life.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

  6. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C. Edwin (Golden, CO); Benson, David K. (Golden, CO)

    1988-01-01T23:59:59.000Z

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate before metal deposition to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  7. Silicon nitride protective coatings for silvered glass mirrors

    DOE Patents [OSTI]

    Tracy, C.E.; Benson, D.K.

    1984-07-20T23:59:59.000Z

    A protective diffusion barrier for metalized mirror structures is provided by a layer or coating of silicon nitride which is a very dense, transparent, dielectric material that is impervious to water, alkali, and other impurities and corrosive substances that typically attack the metal layers of mirrors and cause degradation of the mirrors' reflectivity. The silicon nitride layer can be deposited on the substrate prior to metal deposition thereon to stabilize the metal/substrate interface, and it can be deposited over the metal to encapsulate it and protect the metal from corrosion or other degradation. Mirrors coated with silicon nitride according to this invention can also be used as front surface mirrors.

  8. Encapsulants for protecting MEMS devices during post-packaging release etch

    DOE Patents [OSTI]

    Peterson, Kenneth A.

    2005-10-18T23:59:59.000Z

    The present invention relates to methods to protect a MEMS or microsensor device through one or more release or activation steps in a "package first, release later" manufacturing scheme: This method of fabrication permits wirebonds, other interconnects, packaging materials, lines, bond pads, and other structures on the die to be protected from physical, chemical, or electrical damage during the release etch(es) or other packaging steps. Metallic structures (e.g., gold, aluminum, copper) on the device are also protected from galvanic attack because they are protected from contact with HF or HCL-bearing solutions.

  9. attacks avian flu: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from wild waterfowl Tipple, Brett 14 Free Flu Vaccinations protect yourself and your family Environmental Sciences and Ecology Websites Summary: Free Flu Vaccinations protect...

  10. Environmental Life-cycle Assessment of Passenger Transportation: A Detailed Methodology for Energy, Greenhouse Gas and Criteria Pollutant Inventories of Automobiles, Buses, Light Rail, Heavy Rail and Air v.2

    E-Print Network [OSTI]

    Chester, Mikhail; Horvath, Arpad

    2008-01-01T23:59:59.000Z

    A Life-Cycle Model of an Automobile, Environmental Science &Cycle Assessment of Automobile/Fuel Options, EnvironmentalCycle Energy Analysis for Automobiles, Society of Automotive

  11. Protected Areas Stacy Philpott

    E-Print Network [OSTI]

    Gottgens, Hans

    Convention of Biological Diversity, 1992 #12;IUCN Protected Area Management Categories Ia. Strict Nature. Protected Landscape/ Seascape VI. Managed Resource Protected Area #12;Ia. Strict Nature Preserves and Ib. Wilderness Areas Natural preservation Research No No #12;II. National Parks Ecosystem protection

  12. Fire Protection Program Metrics

    Broader source: Energy.gov [DOE]

    Presenter: Perry E. D Antonio, P.E., Acting Sr. Manager, Fire Protection - Sandia National Laboratories

  13. Glass Composition Constraint Recommendations for Use in Life-Cycle Mission Modeling

    SciTech Connect (OSTI)

    McCloy, John S.; Vienna, John D.

    2010-05-03T23:59:59.000Z

    The component concentration limits that most influence the predicted Hanford life-cycle HLW glass volume by HTWOS were re-evaluated. It was assumed that additional research and development work in glass formulation and melter testing would be performed to improve the understanding of component effects on the processability and product quality of these HLW glasses. Recommendations were made to better estimate the potential component concentration limits that could be applied today while technology development is underway to best estimate the volume of HLW glass that will eventually be produced at Hanford. The limits for concentrations of P2O5, Bi2O3, and SO3 were evaluated along with the constraint used to avoid nepheline formation in glass. Recommended concentration limits were made based on the current HLW glass property models being used by HTWOS (Vienna et al. 2009). These revised limits are: 1) The current ND should be augmented by the OB limit of OB ? 0.575 so that either the normalized silica (NSi) is less that the 62% limit or the OB is below the 0.575 limit. 2) The mass fraction of P2O5 limit should be revised to allow for up to 4.5 wt%, depending on CaO concentrations. 3) A Bi2O3 concentration limit of 7 wt% should be used. 4) The salt accumulation limit of 0.5 wt% SO3 may be increased to 0.6 wt%. Again, these revised limits do not obviate the need for further testing, but make it possible to more accurately predict the impact of that testing on ultimate HLW glass volumes.

  14. A fundamental threat to quantum cryptography: gravitational attacks

    E-Print Network [OSTI]

    R. Plaga

    2006-03-26T23:59:59.000Z

    An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

  15. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect (OSTI)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10T23:59:59.000Z

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  16. Resilience of Social Networks Under Different Attack Strategies

    E-Print Network [OSTI]

    Latif, Mohammad Ayub; Zaidi, Faraz

    2014-01-01T23:59:59.000Z

    Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small world-scale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesti...

  17. ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W, FRANCE ABSTRACT In this paper, we present a novel attack named colorization attack. This attack of such an attack and thus to take it into account for the future color-hiding watermarking schemes. Index Terms

  18. Protection Program Operations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-14T23:59:59.000Z

    This Order establishes requirements for the management and operation of the Department of Energy (DOE) Federal Protective Forces (FPF), Contractor Protective Forces (CPF), and the Physical Security of property and personnel under the cognizance of DOE.

  19. Interaction, protection and epidemics

    E-Print Network [OSTI]

    Goyal, Sanjeev; Vigier, Adrien

    2015-03-06T23:59:59.000Z

    unique equilibrium: individuals who invest in protection choose to interact more relative to those who do not invest in protection. Changes in the contagiousness of the disease have non-monotonic effects: as a result interaction initially falls...

  20. Voluntary Protection Program Announcement

    Broader source: Energy.gov [DOE]

    Secretary O'Leary formally announced a new initiative, "The Department of Energy Voluntary Protection Program (DOEVPP)," which is designed to recognize contractor sites that are providing excellent safety and health protection to their employees.

  1. Protective Force Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-30T23:59:59.000Z

    Provides detailed requirements to supplement DOE O 473.2, Protective Force Program, which establishes the requirements and responsibilities for management and operation of the Department of Energy (DOE) Protective Force (PF) Program. Does not cancel other directives.

  2. Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

    E-Print Network [OSTI]

    Drozdova, Katya; Samoilov, Michael

    2010-01-01T23:59:59.000Z

    early-warning detection of attack signals from terroristtowards detecting terrorist attack precursors. We ?nd thatof impending terrorist attacks. (Such potential practical

  3. Ethnicity and gender in the face of a terrorist attack: A national longitudinal study of immediate responses and outcomes two years after September 11

    E-Print Network [OSTI]

    Chu, T Q; Seery, M D; Ence, W A; Holman, E A; Silver, Roxane Cohen

    2006-01-01T23:59:59.000Z

    reactions to terrorist attacks: Findings from the national11, 2001, terrorist attacks. New England Journal ofthe 9/11/01 terrorist attacks. Journal of Adolescent Health,

  4. Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    E-Print Network [OSTI]

    Briesemeister, Linda

    . Modern control systems are increasingly connected to other control systems as well as to corporate.lastname@sri.com Abstract--Digital control systems are essential to the safe and efficient operation of a variety from conventional enterprise systems. These trends can make control systems vulnerable to cyber attack

  5. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Abadi, Martín

    Guessing Attacks and the Computational Soundness of Static Equivalence Mart´in Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  6. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  7. Defending against Unidentifiable Attacks in Electric Power Grids

    E-Print Network [OSTI]

    Li, Qun

    Defending against Unidentifiable Attacks in Electric Power Grids Zhengrui Qin, Student Member, IEEE THE electric power grid is a distribution network that connects the electric power generators to customers, Qun Li, Senior Member, IEEE, and Mooi-Choo Chuah, Senior Member, IEEE Abstract--The electric power

  8. Energy Attack on Server Systems Zhenyu Wu, Mengjun Xie

    E-Print Network [OSTI]

    Wang, Haining

    Power management is one of the critical issues for server systems nowadays. To date energy cost hasEnergy Attack on Server Systems Zhenyu Wu, Mengjun Xie , and Haining Wang The College of William server power consump- tion and achieve energy proportional computing. How- ever, the security perspective

  9. A Deception Framework for Survivability Against Next Generation Cyber Attacks

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

  10. Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks M.H.R. Khouzani, Saswati Sarkar Abstract Large scale proliferation of wireless technologies are dependent on developing reliable to the spread of self-replicating malicious codes known as malware. The malware can be used to initiate

  11. Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures

    E-Print Network [OSTI]

    Caesar, Matthew

    range of sparsely located mobile nodes (e.g., disaster-response networks), and limited energy resources, DTNs are used for scientific, military, and industrial applications that place high demands against spoofing attacks in DTNs. To the best of our knowledge, we are the first to propose

  12. Selective Jamming Attacks in Wireless Networks Alejandro Proa~no

    E-Print Network [OSTI]

    Lazos, Loukas

    for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15-one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming

  13. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    day irrigation canal systems. This type of monitoring and control infrastructure is also commonStealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern

  14. Attacking Tor through Unpopular Ports Muhammad Aliyu Sulaiman

    E-Print Network [OSTI]

    Almulhem, Ahmad

    of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack and the destination of the traffic: the first (entry) relay knows the source but not the destination, the last (exit and exit relays. Indeed, if the entry and exit relays traffic is observed, a simple traffic analysis can

  15. Offline Dictionary Attack on Password Authentication Schemes using Smart Cards

    E-Print Network [OSTI]

    decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility

  16. PUF Modeling Attacks on Simulated and Silicon Data

    E-Print Network [OSTI]

    that rest on the Strong PUF's unpredictability and physical unclonability. Our method is less relevant these problems, but they all rest on the concept of a secret binary key: It is assumed that the Ulrich R API-attacks and viruses, can lead to key exposure and full security breaks. The fact that the devices

  17. De-anonymization attack on geolocated data Sebastien Gambs

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    , inference attack, de- anonymization. I. INTRODUCTION With the recent advent of ubiquitous devices and smart.g., to optimize the placement of cellular towers, to conduct market and sociological studies or to analyze (such as his home and place of work) [5], [6], [7], [8], to predict his past, current and future

  18. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  19. RADIONUCLIDE RADIATION PROTECTION

    E-Print Network [OSTI]

    Healy, Kevin Edward

    RADIONUCLIDE AND RADIATION PROTECTION DATA HANDBOOK 2002 D. Delacroix* J. P. Guerre** P. Leblanc'Energie Atomique, CEA/Saclay, France ISBN 1 870965 87 6 RADIATION PROTECTION DOSIMETRY Vol. 98 No 1, 2002 Published by Nuclear Technology Publishing #12;RADIONUCLIDE AND RADIATION PROTECTION DATA HANDBOOK 2nd Edition (2002

  20. Corium protection assembly

    DOE Patents [OSTI]

    Gou, Perng-Fei (Saratoga, CA); Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Sirtori, IT)

    1994-01-01T23:59:59.000Z

    A corium protection assembly includes a perforated base grid disposed below a pressure vessel containing a nuclear reactor core and spaced vertically above a containment vessel floor to define a sump therebetween. A plurality of layers of protective blocks are disposed on the grid for protecting the containment vessel floor from the corium.

  1. Model Fire Protection Program

    Broader source: Energy.gov [DOE]

    To facilitate conformance with its fire safety directives and the implementation of a comprehensive fire protection program, DOE has developed a number of "model" program documents. These include a comprehensive model fire protection program, model fire hazards analyses and assessments, fire protection system inspection and testing procedures, and related material.

  2. Life-Cycle Assessment of Highway Pavement Alternatives in Aspects of Economic, Environmental, and Social Performance

    E-Print Network [OSTI]

    Mao, Zhuting

    2012-10-19T23:59:59.000Z

    Assessments EIO-LCA Economic Input-Output Life Cycle Assessment EIS Environmental Impact Statements EO Executive Order EPA Environmental Protection Agency ESAL Equivalent Single Axle Loads FHWA Federal Highway Administration GWP... Transaction Cost ............................................. 48 Figure 11. Environmental Impact: Global Warming Potential ........................................ 50 Figure 12. Environmental Impact: CO2 Emissions...

  3. Coastal Marshlands Protection Act (Georgia

    Broader source: Energy.gov [DOE]

    The Coastal Marshlands Protection Act provides the Coastal Resources Division with the authority to protect tidal wetlands. The Coastal Marshlands Protection Act limits certain activities and...

  4. Radiation Protection Guidance Hospital Staff

    E-Print Network [OSTI]

    Kay, Mark A.

    Page 1 Radiation Protection Guidance For Hospital Staff Prepared for Stanford ..................................................................................................................... 17 The Basic Principles of Radiation Protection........................................................... 17 Protection against Radiation Exposure

  5. On the robustness of network infrastructures to disasters and physical attacks

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    2013-01-01T23:59:59.000Z

    Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

  6. Anthem Cyber Attack: Information and Call-in Phone Number | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Anthem Cyber Attack: Information and Call-in Phone Number Colleagues, As you may have heard by now, Anthem was the latest victim of a cyber attack. Anthem reports that they were...

  7. T-702: Apache web servers that allows a DOS attack | Department...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has...

  8. Fire Protection Program Manual

    SciTech Connect (OSTI)

    Sharry, J A

    2012-05-18T23:59:59.000Z

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  9. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  10. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  11. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  12. A 2nd-Preimage Attack on AURORA-512 NTT Information Sharing Platform Laboratories, NTT Corporation

    E-Print Network [OSTI]

    A 2nd-Preimage Attack on AURORA-512 Yu Sasaki NTT Information Sharing Platform Laboratories, NTT. In this note, we present a 2nd-preimage attack on AURORA- 512, which is one of the candidates for SHA-3. Our is approximately 2290 AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2512

  13. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  14. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan for more insidious attacks. This paper proposes DoX, a peer-to-peer based scheme, to detect and correct inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  15. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This paper presents a contact- less

  16. A Formal Method for Attack Modeling and Seyit Ahmet C amtepe and Bulent Yener

    E-Print Network [OSTI]

    Bystroff, Chris

    1 A Formal Method for Attack Modeling and Detection Seyit Ahmet C¸ amtepe and B¨ulent Yener,yener}@cs.rpi.edu TR-06-01 Abstract This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach [1] to capture (i

  17. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia , Florian D, University of California, Santa Barbara Abstract Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon the computational complexity of the attack identification problem

  18. Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack

    E-Print Network [OSTI]

    Henderson, Shane

    Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack W. Matthew will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well-informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service

  19. An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing

    E-Print Network [OSTI]

    Wing, Jeannette M.

    An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University's security? We propose to use the measure of a system's attack surface as an indication of the system, prior work has shown that a system's attack surface measurement serves as a reliable proxy for security

  20. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  1. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace-zero group can always be transferred methods than by attacking it directly via generic methods. The speed-up one obtains corresponds

  2. Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems

    E-Print Network [OSTI]

    Dreibholz, Thomas

    Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems attacks has not been intensively ad- dressed yet. In particular, there have not been any analyses for real the attack bandwidth which is necessary for a significant impact on RSerPool-based services. This analysis

  3. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

  4. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack calculus methods than by attacking it directly via generic methods. The speed-up one obtains

  5. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  6. Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem

    E-Print Network [OSTI]

    Hess, Florian

    Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem F. Hess Technical succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude that they are not likely to yield further

  7. Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera

    E-Print Network [OSTI]

    Lindgren, Staffan

    Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera beetle (Dryocoetes confusus Swaine) predominately attacked trees from the three to four largest diameter classes at each site. However, the mean diameter of attacked trees was significantly different among sites

  8. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key

    E-Print Network [OSTI]

    Myasnikov, Aleksey

    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

  9. Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts Semantic Networks

    E-Print Network [OSTI]

    Ansari, Nirwan

    Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts networks from Distributed Denial of Service (DDoS) attacks has become a critical issue that must be tackled, the overwhelming volume of alerts makes it difficult for security administrators to analyze and extract the attack

  10. A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar

    E-Print Network [OSTI]

    Wing, Jeannette M.

    A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar Jeannette M software [18]. In this paper, we propose to use a software system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We

  11. Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa Sushil Jajodia

    E-Print Network [OSTI]

    Noel, Steven

    Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective techniques for visualizing such attack graphs

  12. On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller University of Wisconsin, Madison Computer Sciences Department {shai,jha,bart}@cs.wisc.edu Abstract An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances

  13. Discovering Novel Attack Strategies from INFOSEC Xinzhou Qin and Wenke Lee

    E-Print Network [OSTI]

    Lee, Wenke

    Discovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College. Correlating security alerts and discovering attack strategies are impor- tant and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from

  14. Attack on Private Signature Keys of the OpenPGP format, PGPTM

    E-Print Network [OSTI]

    - 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

  15. An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace­zero group can always be transferred methods than by attacking it directly via generic methods. The speed­up one obtains corresponds

  16. CAT A Practical SDL Based Attack Attribution Toolkit for 3G Networks

    E-Print Network [OSTI]

    Yener, Aylin

    CAT ­ A Practical SDL Based Attack Attribution Toolkit for 3G Networks Kameswari Kotapati Peng Liu University University Park, PA 16802 Abstract-- This paper presents the Cross Infrastructure Attack telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global

  17. On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services

    E-Print Network [OSTI]

    Chang, Rocky Kow-Chuen

    On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services Yajuan Tang, Xiapu Luo,csrchang}@comp.polyu.edu.hk, qing.hui@ttu.edu Abstract--Low-rate Denial of Quality (DoQ) attacks, by send- ing intermittent bursts generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results

  18. Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack

    E-Print Network [OSTI]

    Dessouky, Maged

    Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack Abstract In the event of a catastrophic bio-terror attack, major urban centers need to effi- ciently distribute large of a hypothetical anthrax attack in Los Angeles County. Keywords: Capacitated facility location, distance

  19. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

  20. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  1. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  2. Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

  3. Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach

    E-Print Network [OSTI]

    Bullo, Francesco

    Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach to operate safely and reliably against cyber-physical attacks. The large dimensionality and the difficulty system and cyber- physical attacks as unknown inputs. This modeling framework captures, for instance

  4. Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation

    E-Print Network [OSTI]

    Kundur, Deepa

    Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

  5. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  6. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Curtmola, Reza

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  7. Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and their transmission power is low. These properties introduce great challenges on PUE detection and existing meth- ods]. However, all of them focus on the attackers that emulate stationary primary users (TV towers

  8. A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses

    E-Print Network [OSTI]

    Sundaram, Ravi

    , a common form of distributed denial of service (DDoS) attacks. In particular, our traffic injection game statistical methods for creating defense mechanisms that can detect a DDoS attack and that even when--changing the source address of IP packets-- has been used in DDoS attacks on popular websites (Ya- hoo!) and root DNS

  9. Sustaining Availability of Web Services under Distributed Denial of Service Attacks

    E-Print Network [OSTI]

    Vigoda, Eric

    adequate service to a large percentage of clients during DDoS attacks. The worst-case performance adversarial relationship between a DDoS adversary and the proposed system. We also conduct a simulation study (DDoS) attacks against high-pro#12;le web sites demonstrate how devastating DDoS attacks are, and how

  10. On the Effectiveness of DDoS Attacks on Statistical Temasek Laboratories

    E-Print Network [OSTI]

    Chang, Ee-Chien

    by the filter that guards the victim network. We study the effectiveness of DDoS attacks on such statistical first study the effectiveness of DDoS attacks on statistical-based filtering in a general context whereOn the Effectiveness of DDoS Attacks on Statistical Filtering Qiming Li Temasek Laboratories

  11. Non-Control-Data Attacks Are Realistic Threats , Emre C. Sezer

    E-Print Network [OSTI]

    Zhang, Xiangyu

    make systems susceptible to Internet worms and distributed denial of service (DDoS) attacks. Recipe, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to such attacks. In each case, the generated them down, they have incentives to study and employ non-control-data attacks. This paper emphasizes

  12. An Analysis of the Economic and Financial Life-Cycle Costs of Reverse-Osmosis Desalination in South Texas: A Case Study of the Southmost Facility

    E-Print Network [OSTI]

    Sturdivant, A.; Rister, M.; Rogers, C.; Lacewell, R.; Norris, J.; Leal, J.; Garza, J.; Adams, J.

    for $26.2 million, an implicit commitment for another $39.1 million (basis 2006 dollars) was also made for Continued and Capital Replacement costs. Investigation into life-cycle costs during the design and planning stages of a desalination facility can...

  13. I2S2 Idealised Scientific Research Activity Lifecycle Model The model represents the processes and phases of a typical physical science

    E-Print Network [OSTI]

    Rzepa, Henry S.

    I2S2 Idealised Scientific Research Activity Lifecycle Model The model represents the processes include: development of the research proposal; its peer-review; carrying out of the experiment; equipment configuration and calibration data; processing software and associated control parameters; wikis

  14. CCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW landfill disposal

    E-Print Network [OSTI]

    Florida, University of

    CCA-Treated wood disposed in landfills and life-cycle trade-offs with waste-to-energy and MSW February 2007 Available online 9 April 2007 Abstract Chromated copper arsenate (CCA)-treated wood is a preservative treated wood construction product that grew in use in the 1970s for both residential

  15. DOE Guidance on the Statutory Definition of Energy/Water Conservation Measures (ECMs), and Determining Life-Cycle Cost-Effectiveness for ESPCs with Multiple or Single ECMs

    Broader source: Energy.gov [DOE]

    Document provides guidance on the statutory definition of "energy conservation measure" (ECM) for the purpose of an energy savings performance contract (ESPC), including clarification that multiple ECMs under the same ESPC may be "bundled" when evaluating life-cycle cost-effectiveness. It also clarifies that an ESPC may include, or be limited to, a single ECM applied across multiple federal buildings and facilities.

  16. WP05 Labour's record on cash transfers, poverty, inequality and the lifecycle 1997-2010 Labour's Record on Neighbourhood Renewal in

    E-Print Network [OSTI]

    Banaji,. Murad

    WP05 Labour's record on cash transfers, poverty, inequality and the lifecycle 1997-2010 Labour of wealth, poverty, income inequality and spatial difference. The full programme of analysis will include and on poverty and inequality particularly. This provides a baseline for analysing and understanding the changes

  17. Preliminary evaluation of the lifecycle costs and market barriers of reflective pavements

    SciTech Connect (OSTI)

    Ting, M.; Koomey, J.G.; Pomerantz, M.

    2001-11-21T23:59:59.000Z

    The objective of this study is to evaluate the life cycle costs and market barriers associated with using reflective paving materials in streets and parking lots as a way to reduce the urban heat island effect. We calculated and compared the life cycle costs of conventional asphalt concrete (AC) pavements to those of other existing pavement technologies with higher reflectivity-portland cement concrete (PCC), porous pavements, resin pavements, AC pavements using light-colored chip seals, and AC pavements using light-colored asphalt emulsion additives. We found that for streets and parking lots, PCC can provide a cost-effective alternative to conventional AC when severely damaged pavements must be completely reconstructed. We also found that rehabilitating damaged AC streets and intersections with thin overlays of PCC (ultra-thin white topping) can often provide a cost-effective alternative to standard rehabilitation techniques using conventional AC. Chip sealing is a common maintenance treatment for low-volume streets which, when applied using light-colored chips, could provide a reflective pavement surface. If the incremental cost of using light-colored chips is low, this chip sealing method could also be cost-effective, but the incremental costs of light-colored chips are as of yet uncertain and expected to vary. Porous pavements were found to have higher life cycle costs than conventional AC in parking lots, but several cost-saving features of porous pavements fell outside the boundaries of this study. Resin pavements were found to be only slightly more expensive than conventional AC, but the uncertainties in the cost and performance data were large. The use of light-colored additives in asphalt emulsion seal coats for parking lot pavements was found to be significantly more expensive than conventional AC, reflecting its current niche market of decorative applications. We also proposed two additional approaches to increasing the reflectivity of conventional AC, which we call the chipping and aggregate methods, and calculated their potential life cycle costs. By analyzing the potential for increased pavement durability resulting from these conceptual approaches, we then estimated the incremental costs that would allow them to be cost-effective compared to conventional AC. For our example case of Los Angeles, we found that those allowable incremental costs range from less than dollar 1 to more than dollar 11 per square yard (dollar 1 to dollar 13 per square meter) depending on street type and the condition of the original pavement. Finally, we evaluated the main actors in the pavement market and the existing and potential market barriers associated with reflective pavements. Apart from situations where lifecycle costs are high compared to conventional AC, all reflective paving technologies face a cultural barrier based on the belief that black is better. For PCC, high first costs were found to be the most significant economic barrier, particularly where agencies are cons trained by first cost. Lack of developer standards was found to be a significant institutional barrier to PCC since developers are often not held accountable for the long-term maintenance of roads after initial construction, which creates a misplaced incentive to build low first-cost pavements. PCC also faces site-specific barriers such as poorly compacted base soils and proximity to areas of frequent utility cutting.

  18. Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs

    E-Print Network [OSTI]

    Boyer, Edmond

    -end applica- tions that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level counter-measures can be devised, FPGAs-rail logic. First of all, we report a CAD methodology for achieving WDDL in FPGA. An experimental security

  19. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  20. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08T23:59:59.000Z

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.