Powered by Deep Web Technologies
Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

2

U-151: Bugzilla Cross-Site Request Forgery Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51: Bugzilla Cross-Site Request Forgery Vulnerability 51: Bugzilla Cross-Site Request Forgery Vulnerability U-151: Bugzilla Cross-Site Request Forgery Vulnerability April 19, 2012 - 8:15am Addthis PROBLEM: A vulnerability has been reported in Bugzilla, which can be exploited by malicious people to conduct cross-site request forgery attacks. PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. reference LINKS: Vendor Advisory Secunia Advisory 48835 CVE-2012-0465 CVE-2012-0466 IMPACT ASSESSMENT: Medium Discussion: When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout policy allowing a possible brute-force discovery of a valid user password. An attacker can get access to some bug information using the victim's

3

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco Wireless Lan Controller Cross-Site Request Forgery 8: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability December 17, 2012 - 1:00am Addthis PROBLEM: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN Controller. REFERENCE LINKS: SecurityTracker Alert ID: 1027886 Secunia Advisory SA51546 CVE-2012-5991 CVE-2012-5992 CVE-2012-6007 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the

4

U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

5

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

6

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

7

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

8

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

9

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

10

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

11

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval  

E-Print Network (OSTI)

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user's and the population's query distribution, and contemplated the entropy of the user's distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

Rebollo-Monedero, David; Forné, Jordi

2011-01-01T23:59:59.000Z

12

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

13

Probabilistic algebraic attacks  

Science Conference Proceedings (OSTI)

This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the ... Keywords: algebraic attack, algebraic immunity, annihilator, combination and filter generator, walsh spectrum

An Braeken; Bart Preneel

2005-12-01T23:59:59.000Z

14

Seven Deadliest Network Attacks  

Science Conference Proceedings (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

2010-05-01T23:59:59.000Z

15

Denial-of-service attacks on battery-powered mobile computers  

E-Print Network (OSTI)

Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures. 1.

Thomas Martin; Michael Hsiao; Dong Ha; Jayan Krishnaswami

2004-01-01T23:59:59.000Z

16

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

17

Introduction to side channel attacks and non invasive attacks  

Science Conference Proceedings (OSTI)

... FIPS conference side channel attacks and perturbation attacks 7 Pow er analysis Pow er leakage usec m A Instruction fetch Instruction processing ...

2007-09-21T23:59:59.000Z

18

Extending the resynchronization attack  

Science Conference Proceedings (OSTI)

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their ...

Frederik Armknecht; Joseph Lano; Bart Preneel

2004-08-01T23:59:59.000Z

19

Beware of BGP attacks  

Science Conference Proceedings (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

Ola Nordström; Constantinos Dovrolis

2004-04-01T23:59:59.000Z

20

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

GPS software attacks  

Science Conference Proceedings (OSTI)

Since its creation, the Global Positioning System (GPS) has grown from a limited purpose positioning system to a ubiquitous trusted source for positioning, navigation, and timing data. To date, researchers have essentially taken a signal processing approach ... Keywords: gps, rf attacks, security

Tyler Nighswander; Brent Ledvina; Jonathan Diamond; Robert Brumley; David Brumley

2012-10-01T23:59:59.000Z

22

Beware of BGP Attacks  

E-Print Network (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.

Ola Nordström; Constantinos Dovrolis

2004-01-01T23:59:59.000Z

23

Funeral Leave Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

FUNERAL LEAVE REQUEST (Supplement to Annual or Sick Leave Request) Employee's Name (Please Print) Date Request Submitted: Name of deceased family member: Relationship: Place of death:

24

Information Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 25, 2008 November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel Management and Disposal Act" submitted to Congress March 6, 2007 3. State-by-State Maps that outline each state's electricity generation mix, commercial spent nuclear fuel inventories, and payments into the Nuclear Waste Fund The additional information on the history of the use of engineered barriers will be

25

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

26

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

27

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

28

Reining in the web with content security policy  

Science Conference Proceedings (OSTI)

The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against websites using Cross Site Scripting (XSS) and Cross Site Request Forgery ... Keywords: content restrictions, http, security policy, web security

Sid Stamm; Brandon Sterne; Gervase Markham

2010-04-01T23:59:59.000Z

29

Information Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request Information Request Information Request, November 25, 2008, Testimony, RWAdditionalInformation.pdf Information Request More Documents & Publications The Report To The...

30

Appendix A. Request Letter  

Annual Energy Outlook 2012 (EIA)

U.S. Energy Information Administration | Analysis of Impacts of a Clean Energy Standard as requested by Chairman Hall Appendix A. Request Letter U.S. Energy Information...

31

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

32

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

33

REQUESTS FOR RETIREMENT ESTIMATE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REQUEST FOR RETIREMENT ANNUITY ESTIMATE REQUEST FOR RETIREMENT ANNUITY ESTIMATE Instructions: Please read and answer the following questions thoroughly to include checking all applicable boxes. Unanswered questions may delay processing. Print and Fax back your request form to 202.586.6395 or drop request to GM-169. The request will be assigned to your servicing retirement specialist. They will confirm receipt of your request. SECTION A Request Submitted _____________________ ______________________ ________________________ _____________________ Name (last, first, middle) Last four SSN Date of Birth ___________________________ _________________________ __________________________ Organization Office Telephone Number Fax Number

34

Attacking Automatic Wireless Network Selection  

E-Print Network (OSTI)

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as Preferred or Trusted Networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker’s wireless network without user interaction or notification. This will occur even if the user has never connected to a wireless network before or they have an empty Preferred/Trusted Networks List. We describe these vulnerabilities as well as their implementation and impact. 1

Dino A. Dai Zovi; Shane A. Macaulay

2005-01-01T23:59:59.000Z

35

Serial model for attack tree computations  

Science Conference Proceedings (OSTI)

In this paper we extend the standard attack tree model by introducing temporal order to the attacker's decision making process. This will allow us to model the attacker's behaviour more accurately, since this way it is possible to study his actions related ...

Aivo Jürgenson; Jan Willemson

2009-12-01T23:59:59.000Z

36

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

37

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

38

FOIA Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

You are here: DOEID Home > FOIA > FOIA Request Form You are here: DOEID Home > FOIA > FOIA Request Form U.S. Department of Energy Idaho (DOE-ID) Operations Office Electronic FOIA Request Form* To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. For individuals making a request for personal records under FOIA or the Privacy Act, please fill out the Privacy Act Request Form ( This link opens an 14 kb size Adobe Acrobat File 15 kb), print out the form and have your identity validated by having the form notarized and send the form to DOE-Idaho Privacy Officer, 1955 Freemont Avenue, Mail Stop 1203, Idaho Falls, ID 83405. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form.

39

Frequently Requested Documents  

Energy.gov (U.S. Department of Energy (DOE))

This is an index of frequently requested documents provided by the Department of Energy Headquarters and Field Organizations.

40

A collusion attack optimization strategy for digital fingerprinting  

Science Conference Proceedings (OSTI)

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of ... Keywords: Multimedia security, collusion attack, digital fingerprinting, optimization

Hui Feng; Hefei Ling; Fuhao Zou; Weiqi Yan; Zhengding Lu

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Cybersecurity - Foiling attackers | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in...

42

Non-Invasive Attack Testing Workshop  

Science Conference Proceedings (OSTI)

Non-Invasive Attack Testing Workshop. Purpose: To encourage development of test methods, metrics and tools for evaluating the effectiveness of ...

2013-05-14T23:59:59.000Z

43

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

44

Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs  

Science Conference Proceedings (OSTI)

As computers have become ever more interconnected, the complexity of security configuration has exploded. Management tools have not kept pace, and we show that this has made identity snowball attacks into a critical danger. Identity snowball attacks ... Keywords: access control, attack graph, authentication, combinatorial optimization, identity snowball, machine learning, sparsest cut, support vector machine

John Dunagan; Alice X. Zheng; Daniel R. Simon

2009-10-01T23:59:59.000Z

45

WIPP - Frequently Requested Records  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA Quick Links FOIA Home Page What is a FOIA? How to Submit A FOIA Request Cost of a FOIA Request Electronic FOIA Request Form FOIA Annual Reports FOIA Public Reading Facilities/Electronic Reading Facilities FOIA Requester Service Centers and FOIA Public Liaisons FOIA Reading Room FOIA Requests Received and Estimated Completion Dates FOIA Requests Received by the Carlsbad Field Office since 2009 5 U.S.C. § 552 10 CFR 1004 Fiscal Year FOIA Annual Reports for DOE Carlsbad Field Office FOIA 2009 Fiscal Year Annual Report FOIA 2008 Fiscal Year Annual Report FOIA 2007 Fiscal Year Annual Report FOIA 2006 Fiscal Year Annual Report FOIA 2005 Fiscal Year Annual Report FOIA 2004 Fiscal Year Annual Report FOIA 2003 Fiscal Year Annual Report FOIA 2002 Fiscal Year Annual Report

46

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

47

Higher Order Differential Attack of Camellia (II)  

Science Conference Proceedings (OSTI)

Camellia is a 128-bit block cipher, proposed by NTT and Mitsubishi in 2000. It has been shown that 10 round variant without FL function under a 256-bit secret key is attackable by Higher Order Differential Attack and even if FL function is included, ...

Yasuo Hatano; Hiroki Sekine; Toshinobu Kaneko

2002-08-01T23:59:59.000Z

48

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

49

Retirement Plaque Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Retirement Plaque Request Form Retirement Plaque Request Form Fill out a separate form for each plaque requested. Allow two weeks for delivery. If you have any questions, please call Rudy Bartolo, Retirement Plaque Coordinator at ext. 5558. FORM MUST BE SUBMITTED (mailed or faxed) in order for work to commence. Return form to Retirement Plaque Coordinator, Mailstop 77R0125, or fax 4993. Please Print Clearly Requester's Name:_______________________________ Extension:_______________ Mail Stop: ________________ Today's date:__________________ With Frame _____ Without Frame_____ Date Needed: ________________________ Full name as it is to appear on plaque:_________________________________________ Number of years employed at Lab:______________ Beginning and ending dates of employment: ____________________________________

50

Test Request LTFY-2  

SciTech Connect

This test request defines pre-test data for the irradiation of enriched yttrium-uranium hydride samples in the LITR C-48 facility.

1964-12-01T23:59:59.000Z

51

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

Science Conference Proceedings (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

52

Travel Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Lodging Lodging Transportation SNAP COLLABORATION MEETING JUNE 1 - 3, 2006 TRAVEL FUNDING REQUEST FORM If you require Travel funding support from LBNL to attend the SNAP Collaboration Meeting, please fill out the travel request form below and click on the "SEND" button. As an alternative, you can simply email the requested information on the form to snap@lbl.gov Deadline: Please submit your request NLT Wednesday, May 10, 2006. Disclaimer: Please note that the submission of this request does not automatically constitute funding approval. 1. First Name Last Name 2. Has this travel funding support been pre-approved by the SNAP management? Yes No 3. If answer to #2 is "Yes": a) Approval by whom? b) What was the maximum reimbursement amount from SNAP?

53

Frequently Requested Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequently Requested Documents Frequently Requested Documents Frequently Requested Documents This is an index of frequently requested documents provided by the Department of Energy Idaho Operations Office. You must use the Adobe Acrobat file reader to read the files. If you do not have the reader you can download it free from http://get.adobe.com/reader/. FOIA Requests Received by DOE-ID in 2013 (pdf) April - ID-2013-00854 AMWTP - Charcoal filter breakdown in PAPRs - 600 KB Adobe Acrobat Icon Employee Concern - 135 KB Adobe Acrobat Icon All Hands Feedback - 63 KB Adobe Acrobat Icon AMWTP Employee Concern Ltr 1 - 70 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 43 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 69 KB Adobe Acrobat Icon

54

Disk Quota Increase Request  

NLE Websites -- All DOE Office Websites (Extended Search)

Disk Disk Quota Increase Disk Quota Increase Request NERSC will consider reasonable requests for changes in disk space and inode limits. Please submit a request through the "Request Forms" section at the NERSC help portal. If you select "Hopper scratch directory" from the "File System" menu below, the quota value requested applies to the combined contents of $SCRATCH and $SCRATCH2. Please ask for the least amount of resources you need, since the sum of disk space and inodes allocated to users already exceeds system capacity. In other words, system resources would be exhausted before all users could use their existing quotas. You can find out the current quotas and usage of disk space and inodes for your home and scratch file systems with the myquota command. You can find

55

DOE FOIA Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Administration FOIA Request Form Administration FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: (Required) Organization: Address: (Required) Phone: FAX: Email: Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that you provide, the better the opportunity there is to determine if the

56

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

57

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

58

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

59

FOIA Request - June 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02, 2008 2:33 PM 02, 2008 2:33 PM FOIA-Central DOE Headquarters FOIA Request Name:~el L. Krista~ Organization: Chaper 228, NTEU Address: NATIONAL TREASURY EMPLOYEES UNION Chapter 228 P.O. Box 2283 Germantown, MD 20874 Phone: 3019037143 FAX: 3019031758 Email: joel.kristal@em.doe.gov Record Description: RE: The~partmeiliof Energy's failure to comply with the Federal Code of Regulations 5 U.S.C. 7114(b) (4) The 7114 information request provides information relevant and necessary to rep ent Bargaining Unit Employees. This request is made under the Freedom of Information Act by Chapter 228 of the National Treasury Employees Union. We request the following information from January 1, 1998 to the June 1, 2008 for DOE Headquarters Union Chapters (i.e., Germantown and Forrestal) and every DOE site which has

60

FOIA Request - January 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, January 01, 2008 7:11 PM Tuesday, January 01, 2008 7:11 PM FOrA-Central DOE Headquarters FOIA Request Name: §~ Clements ] Organization: Friends of the Earth Address: 2736 Blossom Street Columbia, SC 29205 Phone: FAX: Email: 1 Record Description: January 1, 2008 Freedom of Information Officer U.S. Department of Energy Washington, DC 20585 RE: FOIA Request on DOE's Waste Solidification Building at SRS To Whom it May Concern - This is a request being made on behalf of the non-profit public-interest organization Friends of the Earth (FOE) under the Freedom of Information Act (FOIA), as amended. This request is being made under new revisions to the Freedom of.Information Act, recently passed by Congress and signed into law by President Bush in December 2007. If new regulations have not yet been finalized by the Department of Energy (DOE) to comply

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

62

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein  

Science Conference Proceedings (OSTI)

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein. For Immediate Release: November 3, 2009. ...

2012-10-02T23:59:59.000Z

63

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

64

When Utility Bills Attack! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

65

Request For Records Disposition | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategic Petroleum Reserve Request For Records Disposition More Documents & Publications Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management...

66

FOIA Request - August 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Name:~semary L~ Name:~semary L~ Organization: Input Address: FOIA-Central@hq.doe.gov Tuesday, August 05,200810:18 AM FOIA-Central DOE Headquarters FOJA Request 11720 Plaza America 12th FL Reston, VA 20190 Phone: 703-707-3500 FAX: 703-707-6201 Email: rlaw@input.com Record Description: 11720 Plaza America Drive, 12th Floor Reston, VA 20190 Tel: (703) 707-3500 Fax: (703) 707-6201 www.input.com Freedom of Information Act (FOIA) ID# 9401 Dear FOIA Officer, AUG 0 5 2008 OZ- Under the Freedom of Information Act, 5 U.S.C. § 552, as amended, I am requesting clearly releasable portions of the documents regarding all contracts awarded under~tract # DEAC0494AL85001 the STRATEGICALLY HARDENED FACILITY DEFEAT (SHFD) requirement, awarded to Sandia Nationai Laboratory. Specifically, I am requesting copies of the following

67

FOIA Request - September 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 01, 2008 9:29 PM September 01, 2008 9:29 PM FOIA-Central DOE Headquarters FOIA Request Name~illiam Trimbli) Organization: individual Address: Phone: FAX: Email : Record Description: S£ P0 2 20 0 86{ I request a copy of each of the/Contracts between uc~go Argonne, LLC and Pontarelli Group Charter, Inc., of Chicago,~L, that were signed or renewed in fiscal year 20~ Preferred Form or Format: Type of Requester (if provided) : An individual seeking information for personal use and not for commercial use. Fees and Fee Waivers: I agree to pay up to a specified amount for fees. Enter amount $ 75 Waiver or Reduction of Fees Factors (if provided): Expedited Processing: Specific Justification for Expedited Processing: 1 Morris. Alexander From: FOIA-Central@hq.doe.gov

68

FOIA Request - February 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Morris. Alexander Morris. Alexander From: Sent: To: Subject: FOIA-Central@hq.doe.gov Friday, February 01, 2008 11 :50 AM FOIA-Central DOE Headquarters FOIA Request Name:lf~te Win~/senior Writer and Investigative Reporter Organization: Cybercast News Service Address: 325 S. Patrick Street Alexandria, VA 22314 Tel: 703-302-8352 E-Mail: pwinn@mediaresearch.org Phone: 7033028352 FAX: Email: pwinn@mediaresearch.org Record Description: RE: Freedom of Information Act Request Dear Sir or Madam I am a senior writer and investigative reporter for Cybercast News Service researching a news story for CNSNews.com. Pursuant to the Freedom of Information Act (5 U.S.C. Section 552), I request that the U.S. Department of Energy produce~ll correspondence, memoranda, documents, reports~ records,

69

Compute Reservation Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Queue Look Queue Wait Times Hopper Queues and Policies Edison Queues and Policies Carver Queues and Policies Dirac Queues and Policies Compute Reservation Request Form Job Logs & Analytics Training & Tutorials Software Accounts & Allocations Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home » For Users » Queues and Scheduling » Compute Reservation Request Form Compute Reservation Request Form

70

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

71

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

72

Extending gibson's attacks on the GPT cryptosystem  

Science Conference Proceedings (OSTI)

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibson's attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank ...

Raphael Overbeck

2005-03-01T23:59:59.000Z

73

Current Name Academic Unit Request  

E-Print Network (OSTI)

Current Name Academic Unit Request Department/College/School/Institute/Center Names: New or Changes This form is to be used to request new academic units (departments, colleges, schools, institutes, or centers) or to request changes to existing academic units. Complete the following and submit

Hart, Gus

74

Defending against side-channel attacks : DynamoREA  

E-Print Network (OSTI)

Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

75

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

76

User_ApproveTrainingRequest  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

77

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

78

Countering DoS attacks with stateless multipath overlays  

Science Conference Proceedings (OSTI)

Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that attackers will attack a fixed and bounded set of overlay nodes causing service ... Keywords: key agreement, spread-spectrum communications

Angelos Stavrou; Angelos D. Keromytis

2005-11-01T23:59:59.000Z

79

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

80

On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers  

E-Print Network (OSTI)

the vulnerabilities of DNS and SIP message handling in the Vonage phone, stealthily become the remote MITM and launch flaw in handling a malformed INVITE message, which allows the remote attacker to remotely crashOn the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers Ruishan

Wang, Xinyuan "Frank"

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

FOIA Request - May 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kate S. Keane Kate S. Keane PIICINB: (202) 434·1641 EMAIL: KSKcane@perkinscoic.com April 28, 2008 VIA U.S. MAIL Kevin Hagerty Director, FOINP A Division, ME-73 Department of Energy 1000 Independence Ave., SW Washington, DC 20585 Re: Freedom of Information Act Request Dear Mr. Hagerty: perki~ Coie 607 Fourteenth Street N.W. Washington, D.C. 20005-2003 PHONE: 202.628.6600 FAX: 202.4341690 www.perkinscoie.com I am writing to request records, regardless of format, medium, or physical characteristics, and including electronic records and information, audiotapes, videotapes and photographs, pursuant to the Freedom ofInformation Act ("FOIA"), 5 U.S.C. §§ 552, et seg. Specifically, I am requestin~y record~(including correspondence)~lated to former Governor Mark

82

FOIA Request - November 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOIA-Central@hq.doe.gov FOIA-Central@hq.doe.gov Sent: To: Thursday, October 02,200810:40 AM FOIA-Central Subject: DOE Headquarters FOIA Request NameC:;ddie IVins~ Organization: AREVA NP Address: 3315 Old Forest Road, P.O. Box 10935 Lynchburg, VA 24506-0935 Phone: 434-832-3781 FAX: 434-382-3781 Email: eddie.ivins@areva.com Record Description: (Phase I of the applications for "Federal reference Number: DE-FOA-0000006.j Loan Guarantees for Nuclear Power Facitlies" Please provide the applications for NRG at the South Texas Project, Georgia Power for Vogtle and Dominion for North Anna. Preferred Form or Format: Electronic PDF Type of Requester (if provided): Affiliated with a private corporation and seeking information for the use in the company's business.

83

FOIA Request - July 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2008 5:23 PM 30, 2008 5:23 PM FOIA-Central DOE Headquarters FOIA Request Name: MrS~ajitha uppal~ Organization: FedSources, Inc. Address: 8400 Westpark Dr, 4th floor, McLean, VA 22102 Phone: 703-610-8745 FAX: Email: uppallir@fedsources.com Record Description: - JUt 01 20080/ Please provide all clearly releasable copy of any~tract awarded from solicitation # DERPOI06EE110261including statement of work. This is related to TECHNICAL ENGINEERING ANALYTICAL AND~NAGEMENT SUPPORT SERVICES program. The CO Benjamin Lardizabal can be reached at (202) 287-1479 or benjamin.lardizabal@hq.doe.gov. Preferred Form or Format: Electronic Format Type of Requester (if provided): Affiliated with a private corporation and seeking information for the use in the company's

84

FOIA Request - April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NTEU NTEU The National Treasury Employees Union Abel Lopez FOIA Officer Department of the Energy 1000 Independence Avenue, SW Washington, DC 20585 RE: FOIA Request Dear· Sir or Madam:· March 21, 2008 Pursuant to the Freedom of Information Act, 5 U.S.C. §§ 552, et ~, the National Treasury Employees Union (NTEU) cf equests that the Department of the Energy provide it with a ist of all current positions (with series numbers) in the bargaining unit represented by NTEU whose position sensitivity is nonsensitive or low risk~ By this request, NTEU is seeking to identify all positions in the bargaining unit whose incumbents (or appointees or applicants for that position) have to complete the SF 85 as part of their background investigation. The list should simply

85

Response to Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Booz Allen Hamilton Response to Booz Allen Hamilton Response to Department of Energy Request for Information Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Department of Energy August 9, 2010 1 Booz Allen Hamilton Introduction Booz Allen Hamilton (Booz Allen) has had an enduring relationship with the Department of Energy (DOE) for more than two decades. We are pleased to be responding to the DOE's Request for Information (RFI), Implementing the National Broadband Plan by Studying the Communcations Requirements of Electric Utilities to Inform Federal Smart Grid Policy, with our perspectives on the use of broadband communications technology to meet emerging Smart Grid requirements. In its RFI,

86

FOIA Request - December 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Saturday, November 29. 2008 1 :24 PM Saturday, November 29. 2008 1 :24 PM FOIA-Central DOE Headquarters FOIA Request Name~eila Thompso~ Organization: G4i Consulting, Inc. Address: 46169 Westlake Drive, Suite 120, Sterling, VA 20165 Phone; 703-433-5460 FAX: 877.286.9645 Email: sthompson@govg4i.com Record Description: DEC 01 2008 Nationwide Professional Skills Training Program ~esolicitation #DE-SOL-00001~Please accept this as a formal FOIA request for Informa~ on the prior incumbents' contracts/solicitation. Please send the incumbents' proposals and the government's Section B pricing table and tabulation across all bidders in the last procurement for these services. Thank you for your assistance. Nationwide Professional Skills Training Program -

87

Fire Protection Account Request Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fire Protection System Account Request Form Fire Protection System Account Request Form To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to hssUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your

88

NIST FY 2011 Budget Request  

Science Conference Proceedings (OSTI)

NIST FY 2011 Budget Request. FY 2008 Enacted, ... 2010 enacted level. Back to News Release>>. Back to FY 2011 Budget in Brief>>.

2010-10-05T23:59:59.000Z

89

FY 2007 Congressional Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

state tables preliminary Department of Energy FY 2007 Congressional Budget Request February 2006 Printed with soy ink on recycled paper Office of Chief Financial Officer state...

90

Request Data.PDF | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data.PDF Request Data.PDF Request Data.PDF More Documents & Publications Suggested Format for Submitting Frequency Data Requests to the Department of Energy ALTERNATES I & II TO...

91

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

92

2013 Allocation Request Submissions Due September 28  

NLE Websites -- All DOE Office Websites (Extended Search)

3 Allocation Request Submissions Due September 28 2013 Allocation Request Submissions Due September 28 August 1, 2012 by Francesca Verdier (0 Comments) The deadline for submissions...

93

2014 NERSC allocation requests due September 22  

NLE Websites -- All DOE Office Websites (Extended Search)

allocation requests due September 22 2014 NERSC allocation requests due September 22 August 13, 2013 by Francesca Verdier (0 Comments) NERSC's allocation submission system is...

94

Analysis of Automated Model against DDoS Attacks  

E-Print Network (OSTI)

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with the overall DDoS problem. With a new packet marking technique and agent design, our approach has many advanced features to minimize the DDoS attacks within a single ISP domain. In this paper we discuss different types of attacks that are possible on our model and propose techniques to counteract the identified attacks. We will also discuss security protocols for communication between different entities in our model.

Udaya Kiran Tupakula

2003-01-01T23:59:59.000Z

95

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

v-048-cisco-wireless-lan-controller-cross-site-request-forgery-vulnerability Download LNG Export Study - Related Documents EIA and NERA analysis of LNG exports, and associated...

96

The FY 2005 Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 Budget Request 5 Budget Request Building on a Record of Success February 2, 2004 David Garman Assistant Secretary Office of Energy Efficiency and Renewable Energy Building on a Record of Success Meeting Presidential Priorities Citizen Centered Affordable Energy Energy Security Climate Change Building on a Record of Success FY 2005 Budget Request * Supports Presidential commitment to strengthen energy security and enhance energy choices for all Americans while protecting the environment * Maintains FY 2004 request levels in budget constrained year * Builds upon and sustains a record of success * Research & Development (R&D) * Deployment * Management Building on a Record of Success Still EERE's Request Is ^ Priority Driven 1. Dramatically reduce or even end dependence on foreign oil

97

DOE Headquarters FOIA Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Oak Ridge Office FOIA Request Form Oak Ridge Office FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: (Required) Organization: Address: (Required) Phone: FAX: Email: Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that you provide, the better the opportunity there is to determine if the

98

The FY 2006 Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 Budget Request 6 Budget Request David Garman Assistant Secretary Office of Energy Efficiency and Renewable Energy February 7, 2005 FY 2006 Budget Request * Supports Presidential commitment to strengthen energy security and enhance energy choices for all Americans while protecting the environment * Builds upon and sustains a record of success ƒ Research & Development (R&D) ƒ Deployment ƒ Management * Continues trend of budget requests in the $1.2 billion range 2 Budget Request is Priority Driven 1. Dramatically reduce or even end dependence on foreign oil 2. Reduce the burden of energy prices on the disadvantaged 3. Increase the viability and deployment of renewable energy technologies 4. Increase the reliability and efficiency of electricity generation and use

99

ARM - Baseline Change Request Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

DocumentsBaseline Change Request Guidelines DocumentsBaseline Change Request Guidelines Page Contents Introduction Submit a BCR BCR Process Flowchart Baseline Change Request Guidelines Introduction Baseline Change Requests (BCR) are used by the ARM Infrastructure as a process to provide configuration control and for formally requesting and documenting changes within the ARM Infrastructure. Configuration Control: BCRs are required for changes to instruments, data systems, data processes, datastreams, measurement methods, and facilities. They help ensure that all aspects of the ARM Infrastructure are consulted prior to implementing changes. Seemingly minor changes can have significant repercussions throughout the Facility and therefore, NO change to an operational instrument, computer, facility, or other system can or will be

100

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Hydrogen Attack in Creeping Polycrystals Due to Cavitation on ...  

Science Conference Proceedings (OSTI)

Sep 1, 1994 ... Hydrogen Attack (HA) is the development at elevated temperatures of grain boundary cavitation by internal methane gas, which is generated by ...

102

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

103

Precision air data support for chem/bio attack response .  

E-Print Network (OSTI)

??The defense response against chemical and biological (Chem/bio) weapons has gained a renewed focus in light of the 11 Sept 2001 terrorist attack. A successful… (more)

Tan, Kwang Liang

2003-01-01T23:59:59.000Z

104

Rapid cooling technology could aid surgery patients, heart attack...  

NLE Websites -- All DOE Office Websites (Extended Search)

cooling technology could aid surgery patients, heart attack victims Diagram shows how ice slurry cools blood INTERNAL COOLING - An ice slurry, delivered through an endotracheal...

105

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

106

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

secure software providing independent testing, monitoring, and control of energy control system component operation Trust Anchor Lifecycle Attack Protection More Documents...

107

Thermal Barrier Coatings for Resistance Against Attack by Molten ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested ...

108

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... to disrupt the energy distribution of smart ... attacks against distributed energy routing in smart grid. ... on Cyber Technology in Automation, Control, and ...

2012-04-12T23:59:59.000Z

109

Request Data.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hudson-Reed Limited Hudson-Reed Limited ) ) ) ) ) Case Number: 2010-CW- 1403 REQUEST FOR DATA Date issued: March 2, 2010 On September 1, 2009, the Department of Energy (DOE or the Department) received a complaint regarding Hudson Reed "shower tower" model number AS333. The complaint alleges that testing of this model demonstrated that the showerhead exceeds the Federal maximum water flow rate requirement. DOE' s regulations for enforcement, contained in 10 CFR § 430.70, state that DOE may conduct enforcement testing of a covered product upon receiving information in writing that a particular covered product may not be in compliance with the applicable performance standard. The first step of this procedure is for the Department to examine the manufacturer's test data.

110

FY 2014 NIST Budget Request Emphasizes Advanced ...  

Science Conference Proceedings (OSTI)

FY 2014 NIST Budget Request Emphasizes Advanced Manufacturing, Cybersecurity. From NIST Tech Beat: April 17, 2013. ...

2013-04-17T23:59:59.000Z

111

Survey and Simulation on Malicious Data Attack on Power Market  

E-Print Network (OSTI)

It is expected that the next generation of power grid will be more intelligent in power distribution, grid data attack. A cyber-spy may inject malicious data to make power grid in danger. In this report the financial risk of data attack, a bunch of notions with respect to power grid are studies. Observability

Lavaei, Javad

112

Selective Attack of Welds by Flow-Accelerated Corrosion  

Science Conference Proceedings (OSTI)

Flow-accelerated corrosion (FAC), a degradation mechanism that attacks carbon steel material, has been a significant issue for nuclear plants for some time. Until recently, though, welds were thought to be largely immune to this mechanism. This work demonstrates that significant weld attacks have been occurring at a number of nuclear plants throughout the world.

2002-07-26T23:59:59.000Z

113

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

114

Attacking the IPsec Standards in Encryption-only Configurations  

Science Conference Proceedings (OSTI)

We describe new attacks which break any RFCcompliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted ...

Jean Paul Degabriele; Kenneth G. Paterson

2007-05-01T23:59:59.000Z

115

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

116

Heart Attack Survival Plan Information To Share With  

E-Print Network (OSTI)

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

117

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

118

Metrics for Assessment of Smart Grid Data Integrity Attacks  

Science Conference Proceedings (OSTI)

There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

119

TMS PUBLICATIONS PERMISSION REQUEST FORM  

Science Conference Proceedings (OSTI)

Zip: Phone Number: Fax: E-mail: Are you a TMS member? YES NO. Are you the author of the TMS material for which permission is being requested? YES NO.

120

SSRL Computer Account Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

SSRLLCLS Computer Account Request Form August 2009 Fill in this form and sign the security statement mentioned at the bottom of this page to obtain an account. Your Name:...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Microsoft Word - GIS Extension Request  

NLE Websites -- All DOE Office Websites (Extended Search)

GIS Extension Request (previous BNL visitors with a BNL Guest Number.) 1. Go to https:fsd84.bis.bnl.govguestbnlguest.asp 2. Fill out ONLY the information that has changed. a....

122

Felix Storch: Data Request (2010-SCE-0111) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request (2010-SCE-0111) Felix Storch: Data Request (2010-SCE-0111) February 23, 2011 DOE requested additional test data from Felix Storch regarding various models of refrigerators...

123

Delta Faucet: Data Request (2010-SW-1603) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delta Faucet: Data Request (2010-SW-1603) Delta Faucet: Data Request (2010-SW-1603) March 2, 2010 DOE requested test data from Delta Faucet Corporation for Delta Faucet's...

124

Mueller Streamline: Data Request (2011-SW-2802) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2011-SW-2802) Mueller Streamline: Data Request (2011-SW-2802) May 17, 2011 DOE requested water efficiency test data, including complete test reports, from Mueller...

125

Disposition Record Request: Oil Import Appeals Board | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Record Request: Oil Import Appeals Board Disposition Record Request: Oil Import Appeals Board OIAB Case Files. Records consist of company requests for relief from hardship imposed...

126

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REQUEST FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS DISPOSITION AUTHORITY U. S. Atomic Energy Commision REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents &...

127

Response to several FOIA requests - Renewable Energy. | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy....

128

Request For Records Disposition Authority | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oil and Gas Division Request For Records Disposition Authority More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY Request For Records Disposition Autnority...

129

Request For Records Disposition Authority | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Petroleum and Oil Shale Reserves Request For Records Disposition Authority More Documents & Publications Request For Records Disposition Authority Request For Records...

130

White House Mission Requests Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

White House Mission Requests Memorandum White House Mission Requests Memorandum White House Mission Requests Memorandum More Documents & Publications THE WHITE HOUSE THE WHITE...

131

FY 2007 Congressional Budget Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2007 Congressional Budget Request FY 2007 Congressional Budget Request FY 2007 Budget Highlights FY 2007 Congressional Budget Request More Documents & Publications FY 2007...

132

Current Annualized Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Organization Organization FY 2012 FY 2013 FY 2014 Current Annualized Request CR $ % National Security Weapons Activities* 7,214,834 7,557,342 7,868,409 +311,067 +4.1% Defense Nuclear Nonproliferation 2,300,950 2,409,930 2,140,142 -160,808 -7.0% Naval Reactors 1,080,000 1,086,610 1,246,134 +166,134 +15.4% Office of the Administrator 410,000 412,509 397,784 -12,216 -3.0% Total, National Nuclear Security Administration 11,005,784 11,466,391 11,652,469 +304,177 +2.8% Energy and Environment Energy Efficiency and Renewable Energy 1,780,548 1,820,713 2,775,700 +995,152 +55.9% Electricity Delivery and Energy Reliability 136,178 139,954 169,015 +32,837 +24.1% Fossil Energy 554,806 714,033 637,975 +83,169 +15.0% Nuclear Energy 853,816 863,996 735,460 -118,356 -13.9% Race to the Top for Energy Efficiency and Grid Modernization

133

SSRL Computer & Networking Support Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

Help Request Help Request To use this form - Please enter your contact information below and select a category for your request. Also, provide a brief description of your request. When purchasing items, please include an account number. Priority*: Normal Urgent Requestor: (Name of person to contact for this request) Email: Phone: Support Required: I don't know Computer Support Network Support Printer Support Select Type of Request I don't know Details of your request: Property Control #: PC# Account number (as needed): * Normal priority requests will be attended to within the next two business days at the most. Urgent requests will receive attention as soon as possible. Submit Clear Fields SSRL Computing SSRL Home SLAC Home Stanford University Last Updated: 06 JUN 2007

134

TCPL: A Defense against wormhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

135

Comments Requested on Risk Management Publication  

Science Conference Proceedings (OSTI)

... and costly. These dangers can come from human error, environmental problems and planned attacks. They can compromise ...

2011-07-18T23:59:59.000Z

136

Preventing history forgery with secure provenance  

Science Conference Proceedings (OSTI)

As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, and government, data provenance tracking is essential for rights protection, ... Keywords: audit, confidentiality, integrity, lineage, provenance, security

Ragib Hasan; Radu Sion; Marianne Winslett

2009-12-01T23:59:59.000Z

137

Request Log Closedl Date Yes  

NLE Websites -- All DOE Office Websites (Extended Search)

6 FOIA 6 FOIA - Request Log Closedl Date Yes 01 127106 Yes 02/23/06 Yes 04/05/06 Yes 04/03/06 Yes 04/03/06 Yes 05/22/06 Yes 35/30/06 - No. - 00 1 - 002 - 003 - 004 005 006 - 307 - Dated 01 125106 0211 6106 03/29/06 03/31 106 14/03/06 1511 8/06 )5/22/06 Date Rec'd 0 I I2 5/06 02/23/06 03130/06 0313 1 106 04/03/06 05/22/06 05/22/06 HQ or Dir. Direct Transfer from HQ Direct Trans from HQ Direct Direct Transfer 'rom HQ Subject Requesting a list of all your Procurement card holders Requesting copies of any and all Freedom of Information Act (FOIA) requests submitted to the Department of Energy (DOE) by Donna Wright, the Bradenton Herald, or any other individual that requested documentation or information pertaining to the Loral American Beryllium Corporation (also known as the

138

Healing heart attack victims, one cell at a time  

NLE Websites -- All DOE Office Websites (Extended Search)

E-mail: stark8@llnl.gov FOR IMMEDIATE RELEASE April 2, 2009 NR-09-04-02 Healing heart attack victims, one cell at a time LIVERMORE, Calif. -- By using the amount of carbon...

139

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

140

Risk-Based models of attacker behavior in cybersecurity  

Science Conference Proceedings (OSTI)

Even as reliance on information and communication technology networks continues to grow, and their potential security vulnerabilities become a greater threat, very little is known about the humans who perpetrate cyber attacks--what are their strategies, ...

Si Li; Ryan Rickert; Amy Sliva

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

142

Argonne applied mathematicians use INCITE awards to attack energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for...

143

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS DISPOSITION AUTHORITY Atomic Energy Commission REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications...

144

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RECORDS DISPOSITION AUTHORITY More Documents & Publications Disposition Schedule: Human Radiation Experiments REQUEST FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS...

145

Information Request Yucca Mountain Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2008 , 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested last week regarding use of engineered barriers. Please let me know if you need additional information or have any questions. A,4- -/0 7 The Suitability of the Yucca Mountain Site and the Issue of Natural Barriers as the Principal Barriers for Demonstrating Safety This paper addresses two issues that are frequently raised concerning the suitability of the Yucca Mountain site for development as a repository. The first issue is that the Yucca Mountain site is technically unsound and that an engineered barrier system is required because the site is not capable of protecting public health and safety. The second issue is

146

NNSA FY14 BUDGET REQUEST  

National Nuclear Security Administration (NNSA)

FY14 BUDGET REQUEST FY14 BUDGET REQUEST We're keeping the American people safe. President Obama has laid out the most ambitious view of nuclear security in decades. Our nonproliferation, counterterrorism, and modern-day nuclear deterrent programs keep the American people safe every day. The President remains committed to a safe, secure, and reliable nuclear deterrent, and his FY14 budget provides $7.9 billion for NNSA's weapons activities. o Our Life Extension Programs (LEPs) are moving forward to ensure the aging American nuclear weapons deterrent remains safe, secure, and effective. $1 billion is requested in FY14 to directly support these programs. The W76-1 LEP, now in Phase 6.6 full

147

COM-CAT Request for Proposals Issued  

NLE Websites -- All DOE Office Websites (Extended Search)

Science Division XSD Groups Industry Argonne Home Advanced Photon Source COM-CAT Request for Proposals Issued Image of COM-CAT Brochure A request for proposals (RFP) to...

148

Tenant data request: Sample letter | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

government resources Tenant data request: Sample letter Use this sample letter to request energy data from your tenants. This is helpful for instances where you want whole-building...

149

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to make a request Requests for records pursuant to the Act can be submitted to the NNSA Albuquerque Complex in writing at the following address: NNSA Albuquerque Complex Office...

150

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network (OSTI)

The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through con- trolled switching sequence. Such switching is facilitated by cyber-attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to effectively model the cyber-physical aspects of a smart grid and determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the different power system test cases including the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system frame- work. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of co-ordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.

Liu, Shan

2013-05-01T23:59:59.000Z

151

Search and View a Service Request Search and View a Service Request,vlr  

E-Print Network (OSTI)

FAMIS Search and View a Service Request Search and View a Service Request,vlr 10/6/2012 © 2012 Northwestern University 1 Search and View a Service Request This training guide will show you how to search completion of this guide you will be able to: · Sign in to FAMIS Self Service · Search for service requests

Shull, Kenneth R.

152

Appendix A: Request Letters - Energy Information Administration  

U.S. Energy Information Administration (EIA)

18 U.S. Energy Information Administration | Analysis of Impacts of a Clean Energy Standard as requested by Chairman Bingaman

153

PIA - Human Resources - Personal Information Change Request ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Laboratory PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory More Documents & Publications PIA - Human Resources Information...

154

Request for Information Regarding a Proposed Funding ...  

... purpose of this Request for Information (RFI) is to solicit feedback from industry, academia, research laboratories, government agencies, ...

155

Compilation of requests for nuclear data  

SciTech Connect

This compilation represents the current needs for nuclear data measurements and evaluations as expressed by interested fission and fusion reactor designers, medical users of nuclear data, nuclear data evaluators, CSEWG members and other interested parties. The requests and justifications are reviewed by the Data Request and Status Subcommittee of CSEWG as well as most of the general CSEWG membership. The basic format and computer programs for the Request List were produced by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory. The NNDC produced the Request List for many years. The Request List is compiled from a computerized data file. Each request has a unique isotope, reaction type, requestor and identifying number. The first two digits of the identifying number are the year in which the request was initiated. Every effort has been made to restrict the notations to those used in common nuclear physics textbooks. Most requests are for individual isotopes as are most ENDF evaluations, however, there are some requests for elemental measurements. Each request gives a priority rating which will be discussed in Section 2, the neutron energy range for which the request is made, the accuracy requested in terms of one standard deviation, and the requested energy resolution in terms of one standard deviation. Also given is the requestor with the comments which were furnished with the request. The addresses and telephone numbers of the requestors are given in Appendix 1. ENDF evaluators who may be contacted concerning evaluations are given in Appendix 2. Experimentalists contemplating making one of the requested measurements are encouraged to contact both the requestor and evaluator who may provide valuable information. This is a working document in that it will change with time. New requests or comments may be submitted to the editors or a regular CSEWG member at any time.

Weston, L.W.; Larson, D.C. (eds.)

1993-02-01T23:59:59.000Z

156

A random M-ary method based countermeasure against side channel attacks  

Science Conference Proceedings (OSTI)

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ... Keywords: DPA, SPA, elliptic curve cryptosystems, power analysis attacks, random m-ary recoding algorithm, side channel attacks

MahnKi Ahn; JaeCheol Ha; HoonJae Lee; SangJae Moon

2003-05-01T23:59:59.000Z

157

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

158

DUF6 Final EIS Document Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

EIS Request Form EIS Request Form Final EIS Document Request Form Use the form below to order copies of the DUF6 Conversion Facility Final EISs and Records of Decision. Step 3 Select the EIS that you want to receive. Select one of the three options below. My request applies to the Paducah Conversion Facility EIS My request applies to the Portsmouth Conversion Facility EIS My request applies to both the Paducah and the Portsmouth Conversion Facility EISs Step 1 Request EIS copies. Choose one or more of the following: Mail me a compact disc (CD-ROM) of the Final EIS and Record of Decision. Mail me a printed copy of the Final EIS and Record of Decision. Step 2 Enter your personal information. You must submit your full name and complete address including zip code to receive postal mail. You must provide an email address if you want to receive email notifications.

159

FY 2007 Congressional Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

state tables state tables preliminary Department of Energy FY 2007 Congressional Budget Request February 2006 Printed with soy ink on recycled paper Office of Chief Financial Officer state tables preliminary The numbers depicted in this document represent the gross level of DOE budget authority for the years displayed. The figures include both the discretionary and mandatory funding in the budget. They do not consider revenues/receipts, uses of prior year balances, deferrals, rescissions, or other adjustments appropriated as offsets to the DOE appropriations by the Congress. State Index Page Number FY 2007 Congressional Budget 1/31/2006 Department Of Energy (Dollars In Thousands) 12:09:13PM Page 1 of 2 FY 2005 Appropriation FY 2006 Appropriation FY 2007 Request State Table 1 1 $32,439

160

Authorization Request (non-proprietary)  

E-Print Network (OSTI)

Enclosed are change pages for Duke Cogema Stone & Webster's (DCS) request for authorization of construction of the Mixed Oxide (MOX) Fuel Fabrication Facility. The enclosed change pages replace pages in the Construction Authorization Request as updated through Reference 1. The enclosed change pages do not contain information which is considered to be proprietary to DCS. Enclosure 1 provides twenty-five copies of the change pages, which may be disclosed to the public. Enclosure 2 provides replacement instructions. The changes are additional clarification of previously closed open items and have been discussed in subsequent telephone conversations with the NRC staff. If I can provide any additional information, please feel free to contact me at (704) 373-7820.

Duke Cogema; Stone Webster; Duke Cogema Stone; Duke Cogema Stone; Webster Mixed Oxide (moxj Fuel; Andrew Persinko Usnrc/hq; Kenneth L. Ashe; David A. Ayres

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

162

Kipnis-shamir attack on unbalanced oil-vinegar scheme  

Science Conference Proceedings (OSTI)

The public key of the Oil-Vinegar scheme consists of a set of m quadratic equations in m+n variables over a finite field Fq. Kipnis and Shamir broke the balanced Oil-Vinegar scheme where d = n-m = 0 by finding equivalent ... Keywords: Kipnis-Shamir attack, Oil-Vinegar scheme, multivariate public key cryptosystem, signature scheme

Weiwei Cao; Lei Hu; Jintai Ding; Zhijun Yin

2011-05-01T23:59:59.000Z

163

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

164

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

165

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields  

E-Print Network (OSTI)

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields Electrical Engineering that the challenges software optimizers and microarchitects face every day boil down to a single problem: bottleneck cache miss or window stall. Tasks such as tuning processors for energy efficiency and finding the right

Hill, Mark D.

166

MULTOPS: a data-structure for bandwidth attack detection  

Science Conference Proceedings (OSTI)

A denial-of-service bandwidth attack is an attempt to disrupt an online service by generating a traffic overload that clogs links or causes routers near the victim to crash. We propose a heuristic and a data-structure that network devices (such as routers) ...

Thomer M. Gil; Massimiliano Poletto

2001-08-01T23:59:59.000Z

167

Compilation of requests for nuclear data  

Science Conference Proceedings (OSTI)

A request list for nuclear data which was produced from a computerized data file by the National Nuclear Data Center is presented. The request list is given by target nucleus (isotope) and then reaction type. The purpose of the compilation is to summarize the current needs of US Nuclear Energy programs and other applied technologies for nuclear data. Requesters are identified by laboratory, last name, and sponsoring US government agency. (WHK)

Not Available

1981-03-01T23:59:59.000Z

168

WIPP - How to submit a FOIA request  

NLE Websites -- All DOE Office Websites (Extended Search)

How to submit a Freedom of Information Act (FOIA) request FOIA requests to the U.S. Department of Energy Carlsbad Field Office (CBFO) may be submitted by request form, letter, fax, or e-mail. You may contact CBFO at the following address: George W. Hellstrom Freedom of Information Act/Privacy Act Public Liaison U.S. Department of Energy Carlsbad Field Office P.O. Box 3090 4021 National Parks Highway Carlsbad, New Mexico 88221-3090 foialiaison@ FOIA requests may be mailed or faxed to (505) 234-7025, e-mailed to the Freedom of Information Act /Privacy Act Public Liaison, or submitted electronically using the FOIA Request form. Clearly mark the envelope, fax, or e-mail "Freedom of Information Act request." Describe the records you are requesting as completely and accurately as possible, and provide your name, address, and telephone number. A telephone call between the requester and the FOIA contact person may be necessary to clarify a request and expedite processing time.

169

Request for Information (RFI) Manufacturing Technology ...  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) released a request for information (RFI) to interested parties to comment on NIST's ...

2013-08-06T23:59:59.000Z

170

request for propsals | OpenEI Community  

Open Energy Info (EERE)

energy generation, renewable energy certificates, and green power as a courtesy to our web site visitors. Unless otherwise noted, these requests for proposals (RFPs) and...

171

Request for Training Exemption/Waiver Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Modified for use by Photon Sciences Effective 06282013 Photon Sciences Request for Training Reciprocity Form For General Employee Radiological Training (GERT) Individuals may be...

172

Microsoft Word - 2010 Foreign Visit Request form  

NLE Websites -- All DOE Office Websites (Extended Search)

to submit a Foreign Visit Request. First Name Middle Initial or "NMI" Last Name Gender Date of Birth (MMDDYYYY) City of Birth Male Female Country of Birth Country...

173

Request For Records Disposition Authority: Strategic Petroleum...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Authority: Strategic Petroleum Reserve Project Management Office Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office Paper case files...

174

Requesting Input on Materials Sustainability Topics - TMS  

Science Conference Proceedings (OSTI)

Jun 18, 2010 ... To increase the value of the Materials Sustainability website, feedback from users is requested on the following: 1) Should additional forum ...

175

NREL: Business Opportunities - Inactive Solicitations/Request...  

NLE Websites -- All DOE Office Websites (Extended Search)

Proposals (RFP) Number RHB-3-23114 Service and Preventive Maintenance Agreement for Standby Power Generators Request for Proposals Attachment 1 - Appendix A - Statement of Work...

176

Energy Department Requests Proposals for Advanced Scientific...  

Office of Science (SC) Website

Energy Department Requests Proposals for Advanced Scientific Computing Research News In the News 2013 2012 2011 2010 2009 2008 2007 2006 2005 In Focus Presentations & Testimony...

177

Share and request data | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

metrics Interpret your results Verify and document your savings Share and request data Save energy Find financing Earn recognition Communicate your success Share and...

178

Felix Storch: Data Request/Warning (2010-SCE-0111) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RequestWarning (2010-SCE-0111) Felix Storch: Data RequestWarning (2010-SCE-0111) December 13, 2010 DOE requested test data from Felix Storch for several models of refrigerators...

179

Zoe Industries: Data Request (2010-SW-1602) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-SW-1602) Zoe Industries: Data Request (2010-SW-1602) March 2, 2010 DOE requested test data from Zoe Industries, Inc., regarding the water consumption of a model...

180

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Control Number Receipt Date Status FOIA 09-00008-C 01072009 Request out for search FOIA 09-00025-C 01272009 Request out for search FOIA 09-00057-P 2182009 Request...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 1000 of 28,560 results. 91 - 1000 of 28,560 results. Rebate Model Ordinance for Siting of Wind-Energy Systems In 2009, the South Dakota Public Utilities Commission (PUC) created a [http://puc.sd.gov/commission/twg/WindEnergyOrdinance.pdf model ordinance] for siting wind-energy systems. This nine-page model... http://energy.gov/savings/model-ordinance-siting-wind-energy-systems Article T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. http://energy.gov/cio/articles/t-649-red-hat-network-satellite-server-request-validation-flaw-permits-cross-site

182

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

183

A proposal of extension of FMS-Based mechanism to find attack paths  

Science Conference Proceedings (OSTI)

With the increase of internet service providers(companies) for the rapidly growing numbers of internet users in recent years, malicious attackers has been growing too. Due to these attacks, corporate image can be impaired significantly by such damages ...

Byung-Ryong Kim; Ki-Chang Kim

2006-05-01T23:59:59.000Z

184

Whirlpool: Data Request (2010-SE-0103) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-SE-0103) Whirlpool: Data Request (2010-SE-0103) April 5, 2010 DOE received information that a model of refrigerator-freezer manufactured by Whirlpool Corporation...

185

DOE Requests Information to Improve Energy Efficiency Enforcement...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requests Information to Improve Energy Efficiency Enforcement Process DOE Requests Information to Improve Energy Efficiency Enforcement Process May 4, 2010 - 12:33pm Addthis Today,...

186

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

187

Response to several FOIA requests - Renewable Energy. | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to several FOIA requests - Renewable Energy,1992-99 Energy Efficiency & CO, Emissions Trends. Response to several FOIA requests - Renewable Energy. More Documents & Publications...

188

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Power Plant Docket Records REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications PIA - Savannah River Remediation Accreditation Boundary (SRR AB) REQUEST...

189

Re: Request for Information on Regulatory Burden of DOE Regulations...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re: Request for Information on Regulatory Burden of DOE Regulations Comments from Edison Electric Institute on DOE's Request for Information regarding the burden of DOE...

190

Response to several FOIA requests - Renewable Energy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, Electricity Price and Supply Pattern, nepdg50015250.pdf Response to several FOIA...

191

Response to several FOIA requests - Renewable Energy. Demand...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. nepdg251500.pdf....

192

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

This disposition requests describe records of the History Division under the Office Executive Secretariat at the Department of Energy Headquarters REQUEST FOR RECORDS DISPOSITION...

193

Video Tutorial for Submitting a 2014 ERCAP Request available  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Tutorial for Submitting a 2014 ERCAP Request available Video Tutorial for Submitting a 2014 ERCAP Request available September 17, 2013 (0 Comments) Rushing to meet the...

194

Department of Energy Issues Final Request for Proposals for Savannah...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Proposals for Savannah River Site Liquid Waste Contract Department of Energy Issues Final Request for Proposals for Savannah River Site Liquid Waste Contract September...

195

Request For Records Disposition Authority | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Authority Request For Records Disposition Authority Office of Naval Petroleum and Shale Oil Reserves Request For Records Disposition Authority More Documents & Publications...

196

FY 2013 Budget Request Office of Environmental Management | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2013 Budget Request Office of Environmental Management FY 2013 Budget Request Office of Environmental Management The FY 2013 budget will support major cleanup accomplishments in...

197

FY 2014 Environmental Management Budget Request to Congress ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2014 Environmental Management Budget Request to Congress FY 2014 Environmental Management Budget Request to Congress Department of Energy - Environmental Management FY 2014...

198

FY 2014 Budget Request for the Office of Electricity Delivery...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Budget Request for the Office of Electricity Delivery and Energy Reliability FY 2014 Budget Request for the Office of Electricity Delivery and Energy Reliability Table showing the...

199

FY 2013 Budget Request for the Office of Electricity Delivery...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Budget Request for the Office of Electricity Delivery and Energy Reliability FY 2013 Budget Request for the Office of Electricity Delivery and Energy Reliability Table showing...

200

Request for Information on Evaluating New Products for the Battery...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Evaluating New Products for the Battery Chargers and External Power Supply Rulemaking - Ex Parte Communication Request for Information on Evaluating New...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Department of Energy Issues Requests for Applications for Nuclear...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Department of Energy Issues Requests for Applications for Nuclear Science and Engineering Scholarships and Fellowships Department of Energy Issues Requests for...

202

Response to several FOIA requests - Renewable Energy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, World Oil Price, 1970-2020 (1999 dollars per barrel) Response to several FOIA...

203

Request For Records Disposition Authority | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Disposition Authority Request For Records Disposition Authority Naval Petroleum and Oil Shale Reserves Request For Records Disposition Authority More Documents & Publications...

204

COMMENTS OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COMMENTS OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST FOR INFORMATION REGARDING SMART GRID POLICY COMMENTS OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST...

205

Information Collection Requests/Paper Reduction Act | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Collection RequestsPaper Reduction Act Information Collection RequestsPaper Reduction Act Training Presentation on the on Information Collection and the Paper...

206

Information Request Yucca Mountain Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Request Yucca Mountain Site Information Request Yucca Mountain Site The Suitability of the Yucca Mountain Site and the Issue of Natural Barriers as the Principal...

207

Smart Grid Request for Information and Public Comments | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Smart Grid Request for Information and Public Comments Smart Grid Request for Information and Public Comments Electricity Advisory Committee Technology Development Transmission...

208

Ice slurry technology can save heart attack victims, surgery patients  

NLE Websites -- All DOE Office Websites (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

209

Argonne applied mathematicians use INCITE awards to attack energy problems  

NLE Websites -- All DOE Office Websites (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

210

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

211

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

212

Recommendations on frequently encountered relief requests  

SciTech Connect

This paper is based on the review of a large database of requests for relief from enservice testing (1ST) requirements for pumps and valves. From the review, the paper identifies areas where enhancements to either the relief request process or the applicable test codes can improve IST of pumps and valves. Certain types of requests occur frequently. The paper examines some frequent requests and considers possible changes to the requirements to determine if the frequent requests can be eliminated. Recommended changes and their bases will be discussed. IST of safety-related pumps and valves at commercial nuclear power plants is done according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code (the Code), Section XI. Because of the design and function of some safety systems in nuclear plants, performing Code testing of certain pumps and valves is impractical or a hardship without a compensating increase in the level of safety. Deviations from the Code are allowed by law, as reviewed and approved by the United States Nuclear Regulatory Commission (NRC), through the relief request process. Because of similarities in plant design and system function, many problems encountered in testing components are similar from plant to plant. Likewise, there are often common problems associated with test methods or equipment. Therefore, many relief requests received by the NRC from various plants are similar. Identifying and addressing the root causes for these common requests will greatly improve IST.

Hartley, R.S.; Ransom, C.B.

1992-01-01T23:59:59.000Z

213

Recommendations on frequently encountered relief requests  

SciTech Connect

This paper is based on the review of a large database of requests for relief from enservice testing (1ST) requirements for pumps and valves. From the review, the paper identifies areas where enhancements to either the relief request process or the applicable test codes can improve IST of pumps and valves. Certain types of requests occur frequently. The paper examines some frequent requests and considers possible changes to the requirements to determine if the frequent requests can be eliminated. Recommended changes and their bases will be discussed. IST of safety-related pumps and valves at commercial nuclear power plants is done according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code (the Code), Section XI. Because of the design and function of some safety systems in nuclear plants, performing Code testing of certain pumps and valves is impractical or a hardship without a compensating increase in the level of safety. Deviations from the Code are allowed by law, as reviewed and approved by the United States Nuclear Regulatory Commission (NRC), through the relief request process. Because of similarities in plant design and system function, many problems encountered in testing components are similar from plant to plant. Likewise, there are often common problems associated with test methods or equipment. Therefore, many relief requests received by the NRC from various plants are similar. Identifying and addressing the root causes for these common requests will greatly improve IST.

Hartley, R.S.; Ransom, C.B.

1992-09-01T23:59:59.000Z

214

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

215

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

m m - REQUEST FOR RECORDS DISPOSITION AUTHORITY (See Instructions on reverse) GENERAL SERVICES ADMINISTRATION N A T I O N A L ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 1. F R O M ( A g e n c y o r e s t a b l i s h m e n t ) jepartment of Energy 2. MAJOR S U B D I V I S I O N Oak Ridse Operations Office 3. M I N O R S U B D I V I S I O N 4 . N A M E O F PERSON W I T H W H O M T O C O N F E R ( 5 . T E L E P H O N E E X T . L E A V E B L A N K - JOB N O . d/-d33P PO- ZJ - - - - p p D A T E R E C E I V E D p - NOTIFICATION TO AGENCY In accordance with the provisions of 44 U.S.C. 3303a the disposal request, including amendments, is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. If no records are proposed for disposal, the signature of the Archivist is not required. - DATE ARCHIVIST

216

The NERSC Allocation Request Form (ERCAP)  

NLE Websites -- All DOE Office Websites (Extended Search)

NIM (NERSC Information Management portal) NIM (NERSC Information Management portal) Awarded projects Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 How to Submit a 2014 ERCAP Request Home » For Users » Accounts & Allocations » Allocations » Allocation Request Form (ERCAP) Show All | 1 2 3 4 5 ... 16 | Next » The NERSC Allocation Request Form (ERCAP) Requests to use NERSC resources are submitted annually via a web form known as the ERCAP (Energy Research Computing Allocations Process) Request Form.

217

Social media request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

About Energy.gov » Web Policies » Social Media » Social media About Energy.gov » Web Policies » Social Media » Social media request Social media request Please fill out the information below in order to request access to a social media application or to have an existing account verified as an official Department of Energy presence. Please wait for a response from the Office of Digital Strategy before proceeding with establishing an account. Contact information First name * Last name * Title * Office * Email address * Phone number * Are you authorized to make this request or have you received the proper approvals to do so? * No, I'm not authorized Yes, I'm authorized Application Social media application(s) you want to utilize * Facebook LinkedIn Slideshare Socrata Twitter Instagram Storify Myspace SurveyMonkey Request a tool we don't currently offer

218

Requesting a Revision to PUB-3000  

NLE Websites -- All DOE Office Websites (Extended Search)

Requesting a Change to the ES&H Manual Requesting a Change to the ES&H Manual The following procedure describes the process for making changes to Berkeley Lab's ES&H Manual (PUB-3000). It identifies Responsible Authors who participate in the revision process. A request to revise the ES&H Manual may be initiated by any Berkeley Lab employee; however, all requests must be sent to the Responsible Author and approved by the ES&H Manual Manager, Mike Wisherop. If you wish to request a change to a PUB-3000 chapter, follow these steps: Contact the Responsible Author for the chapter in need of revision. Submit PUB-3000 revisions to the Responsible Author and the ES&H Manual Manager. Direct all questions or comments concerning ES&H Manual content to the ES&H Manual Manager.

219

Requesting a Digital ID | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requesting a Digital ID Requesting a Digital ID Requesting a Digital ID Step One - Registering with MIS To request a DOE Digital Identity you must first register in DOE's Management Information System (MIS) by going to https://mis.doe.gov, selecting "Requesting Access" and following the onscreen instructions. Note: DOE Federal employees are already registered and do not need to complete this step, they may skip to step 2. During the registration process you will be required to search for, and select, a DOE sponsor. Your DOE sponsor is the DOE federal employee that is certifying that you have a recognized relationship with the Department and have a valid need for a DOE Digital Identity. For contractors this person is often your Contract Task Manager, Contracting Officer's Representatives

220

Frequently Requested Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act » Documents Freedom of Information Act » Documents » Frequently Requested Documents Frequently Requested Documents This is an index of frequently requested documents provided by the Department of Energy Headquarters and Field Organizations. Headquarters (HQ) DOE Corporate Overview - 2012 FOIA Requests Received by DOE HQ in 2008 FOIA Requests Received by DOE HQ in 2009 FOIA Responses Processed by DOE HQ in 2009 DOE Transition Documents - 2008 Modifications 001 thru 085 to DOE Contract #DEAC13-02GJ79491 DOE Contract #DEAC13-02GJ79491 Freedom of Information & Privacy Act Group - Enron Documents Sylvania Corporation, Hicksville, NY and Bayside, NY - Additional Sylvania Corporation, Hicksville, NY and Bayside, NY documents Secretary of Energy's Recusal Memorandum for the Secretary on the Determination to Grant a Limited

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

222

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

223

DDoS attack detection method based on linear prediction model  

Science Conference Proceedings (OSTI)

Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. The IP Flow feature value (FFV) algorithm is proposed based on the essential features of DDoS attacks, such as the abrupt traffic change, flow dissymmetry, ... Keywords: ARMA model, attack features, distributed denial of service, linear prediction, network security

Jieren Cheng; Jianping Yin; Chengkun Wu; Boyun Zhang; Yun Liu

2009-09-01T23:59:59.000Z

224

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks  

Science Conference Proceedings (OSTI)

SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, ... Keywords: SQL injection attacks, dynamic monitoring, retrofitting code, symbolic evaluation

Prithvi Bisht; P. Madhusudan; V. N. Venkatakrishnan

2010-02-01T23:59:59.000Z

225

Countermeasures against fault attacks on software implemented AES: effectiveness and cost  

Science Conference Proceedings (OSTI)

In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm and analyze the efficiency of these countermeasures. We propose ... Keywords: countermeasures, fault attacks, side-channel attacks

Alessandro Barenghi; Luca Breveglieri; Israel Koren; Gerardo Pelosi; Francesco Regazzoni

2010-10-01T23:59:59.000Z

226

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

227

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

instructions on reverse) instructions on reverse) L E A V E B L A N K JOB NO. #/-Y3Y-ff-L GENERAL SERVICES ADMINISTRATION NATIONAL ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 1. f R O M (Agency orertabluhment) lepartment of Energy 2. M N O R SUBDIVISION 3. M I N O R SUBDIVISION - . ,#q/FEF 4. NAME OF P ~ R S O N WITH WHOM TO CONFER 15. TELEPHONE EXT. 1 hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records; that the records proposed for disposal in this Request of page(s) are not now needed for the business of this .agency or will not be needed after the retention periods specified; and that written concurrence from the General Accounting Office, if required under the prov~sions of Title 8 of the GAO Manual for Guidance of Federal Agenctes, is

228

Information requested in Protocol No  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2010 1, 2010 Smart Grid RFI U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Re: Smart Grid RFI: Addressing Policy and Logistical Challenges In response to the Department of Energy's (DOE) Request for Information regarding smart grid implementation listed in the September 17, 2010 Federal Register, the New York Independent System Operator, Inc. (NYISO) offers the attached white paper entitled "Envisioning a Smarter Grid for New York Consumers." This white paper, issued by the NYISO in September 2010, was filed at the New York Public Service Commission (NYPSC) in response to a call for comments in its Smart Grid Proceeding. 1 The NYISO would also like to bring to the DOE's attention a white paper prepared

229

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LEAVE BLANK (NARA use only) LEAVE BLANK (NARA use only) JOB NUMBER To: NATIONAL ARCHIVES & RECORDS ADMINISTRATION 8601 ADELPHI ROAD, COLLEGE PARK, MD 20740-6001 Date Received 1. FROM (Agency or establishment) NOTIFICATION TO AGENCY In accordance with the provisions of 44 U.S.C 3303a, the disposition request, including amendments is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. 2. MAJOR SUB DIVISION 3. MINOR SUBDIVISION 4. NAME OF PERSON WITH WHOM TO CONFER 5. TELEPHONE DATE ARCHIVIST OF THE UNITED STATES 6. AGENCY CERTIFICATION I hereby certify that I am authorized to act for this agency in matters pertaining to the disposition of its records and that the records proposed for disposal on the attached______page(s) are not needed now for the business of this agency or will not be

230

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

Energy.gov (U.S. Department of Energy (DOE))

Document describes the request for information for federal government power purchase agreement (PPA) issues.

231

President's FY 2014 Budget Request for NIST Supports ...  

Science Conference Proceedings (OSTI)

President's FY 2014 Budget Request for NIST Supports Research in Advanced Manufacturing, Cybersecurity. For Immediate ...

2013-04-10T23:59:59.000Z

232

Request for Proposal | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Request for Proposal | National Nuclear Security Administration Request for Proposal | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Request for Proposal Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

233

Request for Rehearing and Request for Interim Clarification by David K.  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rehearing and Request for Interim Clarification by Rehearing and Request for Interim Clarification by David K. Paylor, Director of the Virginia Department of Environmental Quality Request for Rehearing and Request for Interim Clarification by David K. Paylor, Director of the Virginia Department of Environmental Quality Docket No. EO-05-01: Pursuant to Federal Power Act § 313, David K. Paylor, Director of the Virginia Department of Environmental Quality, through his counsel Robert F. McDonnell, the Attorney General of Virginia, requests rehearing of Order No. 202-05-3 entered by the Secretary of Energy on December 20, 2005. Specifically, Director Paylor requests rehearing based on the following assignments of error: 1. The Secretary erred by holding that the FPA preempts the Clean Air Act and related state laws;

234

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network (OSTI)

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

235

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

236

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

237

NSLS User Access | Requesting Beam Time  

NLE Websites -- All DOE Office Websites (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

238

Iran's Response to a U.S. Attack  

E-Print Network (OSTI)

Click to skip to the comments section. Editor's Note: Readers, you can click the PDF button on the menu above to make this article into a PDF suitable for printing or e-reading. Michael Rienzi lays out a detailed analysis of Iran's potential reactions to a strike and finds the following thesis to be likely. Iran’s reaction to an attack by the US would be to use all means at its disposal including their large arsenal of missiles, asymmetric warfare, regular forces, and economic/political disruption methods that would cause large amounts of devastation, casualties, economic disruption, and fear; in the hopes that the enemy would lose the support of its citizens and allies, thus forcing them to end the confrontation; Iran would use all means at its disposal to accomplish this goal rather quickly as they would try to avoid an extended conflict. “Iran would not hesitate to retaliate if attacked. If enemies intend to endanger our welfare and security, we will adopt measures which will make them regret their actions."Islamic Revolutionary Guards Corps

V. Rienzi; Brig Gen; Mohammad Hejazi

2012-01-01T23:59:59.000Z

239

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

~nstructions on reverse) ~nstructions on reverse) G E N E R A L SERVICES A D M I N I S T R A T I O N N A T I O N A L ARCHIVES A N D RECORDS SERVICE, WASHINGTON, D C 20408 1. F R O M (Agency or ertablishment) L E A V E B L A N K JOB NO. di-%3%-fF / C D A T E R E C E I V E D flzg)~? NOTIFICATION TO AGENCY n t n f F n e r a v - Sari Francisco Operations Office . 3. M I N O R S U B D I V I S I O N b ~ s ~ ~ 5 ? % 5 2 5 Lawrence Berkel ey Laboratory 4. N A M E O F PERSON W I T H W H O M T O CONFER IS. TELEPHONE EXT. I hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records; that the records proposed for disposal in this Request of 1 page(s) are not now needed for the business of this agency or will not be needed after the retention periods specified; and that written concurrence from the General Accounting Office, if required under the provisions of Title 8 of the GAO Manual for Guidance of Federal Agencies, is

240

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Instructions on reverse) Instructions on reverse) LEAVE BLANK - GENERAL SERVICES ADMINISTRATION NATIONAL ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 I . F R O M (Agency or ertabluhmentJ D A T E RECEIVED NOTIF~CATION TO AGENCY Department of Energy 2. MAJ0.R S U B D I V I S I O N I 4 . N A M E O F PERSON W I T H W H O M T O CONFER 15. TELEPHONE E X T . \OATS l A R C H l V l S T O F T H E U N I T E D STATES In accordance with the provisions of 44 U.S.C. 3303 the dispoal request. including amendmentr, is approved . 3. M I N O R S U B D I V I S I O N except for items that may be marked "disposition not approved" or "withdrawn" in column 10. If no records are proposed for disposal, the signature of the Archivist is not required. I hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records;

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

ARM - Engineering Change Request & Engineering Change Order Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Change Request & Change Request & Engineering Change Order Guidelines Page Contents: Guideline for Starting a Request for a New ARM Product, Capability, or Functionality Engineering Task Tracking Tool Tracking Capabilities Getting Closure, the Baseline Change Request Glossary Engineering Change Request & Engineering Change Order Guidelines Requesting Engineered Products and Services in ARM Guideline for Starting a Request for a New ARM Product, Capability, or Functionality The purpose of this guideline is to establish a method that members of the ARM Infrastructure team may use to submit requests for products and services from the ARM Engineering Group. The concept of "new product, capability, or functionality" refers to the idea that requests the ARM Infrastructure Team to make to the Engineering Group that will ultimately

242

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

243

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network (OSTI)

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

244

Chemical Request Form (Request to bring/ use a new chemical in the Microfab)  

E-Print Network (OSTI)

Chemical Request Form (Request to bring/ use a new chemical in the Microfab) Name: Phone #:Email: PI Name: PI Phone #: The Microfab Laboratory does not permit anyone to bring or use chemicals in the Microfab area without prior approval by the Microfab Staff. This applies to all chemical containing

Provancher, William

245

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

246

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

247

Real-time wind estimation and display for chem/bio attack response using UAV data .  

E-Print Network (OSTI)

??The defense response to a Chemical and Biological attack would be importantly based on predicting the dispersion of a toxic cloud. Considering that an Unmanned… (more)

Sir, CristiaÌ

2003-01-01T23:59:59.000Z

248

Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in Integrated Gas Combined Cycle Turbine Engines. Author(s), Andrew D.

249

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network (OSTI)

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

250

A simple and low cost platform to perform Power Analysis Attacks.  

E-Print Network (OSTI)

??Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it… (more)

Carmona, Manuel

2012-01-01T23:59:59.000Z

251

Requesting A Token | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

A Token A Token Requesting A Token Step One - Registering with MIS To request a DOE Two-Factor Authentication Token you must first register in DOE's Management Information System (MIS) by going to https://mis.doe.gov/, selecting "Requesting Access" and following the onscreen instructions. Note: DOE Federal employees are already registered and do not need to complete this step, they may skip to step 2 During the registration process you will be required to search for, and select, a DOE sponsor. Your DOE sponsor is the DOE federal employee that is certifying that you have a recognized relationship with the Department and have a valid need for a DOE Two-Factor Authentication Token. For contractors this person is often your Contract Task Manager, Contracting

252

I REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REQUEST FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS DISPOSITION AUTHORITY LEAVE BL ...A (NARA use only1 JOB NUMBER TO: NATIONAL ARCHIVES & RECORDS ADMINISTRATION In accordance with the provisions of 44 U.S.C. 3303a, the Office of the Chief Information Officer disposition request, including amendments, is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. Records Management Division N1-434-02-2 Date received 860 1 ADELPHI ROAD COLLEGE PARK, MD 20740-600 1 1. FROM (Agency or establishment) Department of Energy , ( / I 4 30 -A&&& NOTIFICATION TO AGENCY 6. AGENCY CERTIFICATION I hereby certify that I am authorized to act for this agency in matters pertaining to the disposition of its records and that the

253

FY 2014 Budget Request Now Available | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2014 Budget Request Now Available FY 2014 Budget Request Now Available FY 2014 Budget Request Now Available April 10, 2013 - 5:20pm Addthis The Office of Electricity Delivery and Energy Reliability's (OE) FY 2014 budget request represents an increased investment in the continued commitment to help keep America's energy flowing, promote economic prosperity, and move the nation closer to a cleaner and more secure energy future. Highlights of OE's FY2014 budget request, and Assistant Secretary Patricia Hoffman's presentation on the budget request are also available online. For more information, click here. The entire FY 2014 budget request for the Department of Energy is also available online. For highlights of the Department's FY 2014 budget request, read the press release. Addthis Related Articles

254

POCs for Emergency Requests of Oil from the SPR | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POCs for Emergency Requests of Oil from the SPR POCs for Emergency Requests of Oil from the SPR SPR personnel are available to answer any questions you might have. Please contact...

255

Alternative Fuels Data Center: Request to Report Research on Second  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Request to Report Request to Report Research on Second Generation Biofuels to someone by E-mail Share Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Facebook Tweet about Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Twitter Bookmark Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Google Bookmark Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Delicious Rank Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Digg Find More places to share Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on AddThis.com... More in this section...

256

REQUEST FOR QUALIFICATIONS Siting, Transmission, and Environmental Protection  

E-Print Network (OSTI)

REQUEST FOR QUALIFICATIONS FOR Siting, Transmission, and Environmental Protection Peak Workload RFQ ON ELECTRICITY INFRASTRUCTURE PERMITTING AND OPERATION

257

Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention  

Science Conference Proceedings (OSTI)

A chlorine tank truck attack could cause thousands of fatalities. As a means of preventing chlorine truck attacks, I consider the on-site generation of chlorine or hypochlorite at all U.S. facilities currently receiving chlorine by truck. I develop and ... Keywords: applications, cost-effectiveness, public policy, risk analysis, terrorism, uncertainty

Anthony M. Barrett

2010-12-01T23:59:59.000Z

258

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

259

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

260

Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes  

Science Conference Proceedings (OSTI)

Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasures, a number of secure architectures based on linear and nonlinear error detecting codes were proposed. Linear codes provide protection only against primitive ... Keywords: arithmetic codes, cryptography, multipliers, sidechannel attacks

Zhen Wang, Mark Karpovsky, Ajay Joshi

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A defence scheme against Identity Theft Attack based on multiple social networks  

Science Conference Proceedings (OSTI)

Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind ... Keywords: Identity Theft Attack, Multi-dimensional social network, Social networks

Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun

2014-04-01T23:59:59.000Z

262

Power and EM Attacks on Passive $13.56\\,\\textrm{MHz}$ RFID Devices  

Science Conference Proceedings (OSTI)

During the last years, more and more security applications have been developed that are based on passive 13.56 MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the ... Keywords: AES, DEMA, DPA, EM Attacks, Power Analysis, RFID, Side-Channel Attacks

Michael Hutter; Stefan Mangard; Martin Feldhofer

2007-09-01T23:59:59.000Z

263

Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks  

Science Conference Proceedings (OSTI)

This paper proposes a novel approach for cryptanalysis of keystream generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis ... Keywords: LFSRs, algebraic attacks, decimation, fast correlation attack, nonlinear combination keystream generator, state transition matrix, stream ciphers

Miodrag J. Mihaljevi?; Marc P. C. Fossorier; Hideki Imai

2005-12-01T23:59:59.000Z

264

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

265

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

266

Program on Technology Innovation: Chloride Attack-Induced Aging of Concrete Structures in the Energy Industry  

Science Conference Proceedings (OSTI)

Corrosion of embedded steel elements (reinforcement, liner, pre- or post-tensioning device) is a major cause of structure dysfunction resulting in large maintenance and repair costs worldwide. This report focuses on chloride attack–induced aging of concrete structures in the energy industry. Chloride attack is a common aging issue caused by marine environment, the extensive ...

2012-11-30T23:59:59.000Z

267

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network (OSTI)

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

268

Exploring Power-Efficient Provisioning for Online Virtual Network Requests  

Science Conference Proceedings (OSTI)

In the paradigm of cloud computing, multiple users can share the cloud infrastructure resources. The application or service requests from a user can be abstracted as a virtual network (VN) request and submitted to the cloud-based data centers. How to ... Keywords: power efficien, provisioning, virtual network request, embedding, datacenters

Gang Sun, Hongfang Yu, Vishal Anand, Dan Liao, Lemin Li

2012-10-01T23:59:59.000Z

269

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

270

Free energies for acid attack reactions of lithium cobaltate.  

Science Conference Proceedings (OSTI)

The attack of lithium-ion battery cathodes by stray aqueous HF, with resultant dissolution, protonation, and possibly other unintended reactions, can be a significant source of capacity fade. We explore the calculation of reaction free energies of lithium cobaltate in acid by a 'hybrid' method, in which solid-phase free energies are calculated from first principles at the generalized gradient approximation + intrasite coulomb interaction (GGA+U) level and tabulated values of ionization potentials and hydration energies are employed for the aqueous species. Analysis of the dissolution of the binary oxides Li{sub 2}O and CoO suggests that the atomic energies for Co and Li should be shifted from values calculated by first principles to yield accurate reaction free energies within the hybrid method. With the shifted atomic energies, the hybrid method was applied to analyze proton-promoted dissolution and protonation reactions of LiCoO{sub 2} in aqueous acid. Reaction free energies for the dissolution reaction, the reaction to form Co{sub 3}O{sub 4} spinel, and the proton-for-lithium exchange reaction are obtained and compared to empirical values. An extension of the present treatment to consider partial reactions is proposed, with a view to investigating interfacial and environmental effects on the dissolution reaction.

Benedek, R.; van de Walle, A.; Chemical Sciences and Engineering Division; California Inst. of Tech.

2008-01-01T23:59:59.000Z

271

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

272

REQUEST FOR APPROVAL OF OUTSIDE EMPLOYMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

APPROVAL OF OUTSIDE EMPLOYMENT APPROVAL OF OUTSIDE EMPLOYMENT TO: Name of supervisor Title and Routing Symbol and Deputy Assistant General Counsel for Standards of Conduct (GC-77) or Chief Counsel for Local Site FROM: Name and Title DATE: I request approval to engage in outside employment as described below: 1. Name of prospective employer 2.

273

REQUEST FOR PROPOSALS: RETHINKING THE TURING TEST  

E-Print Network (OSTI)

1 REQUEST FOR PROPOSALS: RETHINKING THE TURING TEST An Exhibition of the Collection of Historical Scientific Instruments seeks designs that creatively reinterpret the Turing Test, which Alan Turing originally posed as a dialogic interrogation of a human and computer. In the test, an interrogator poses

Heller, Eric

274

REQUEST FOR PROPOSALS LOUISIANA TRANSPORTATION RESEARCH CENTER  

E-Print Network (OSTI)

1 REQUEST FOR PROPOSALS LOUISIANA TRANSPORTATION RESEARCH CENTER LTRC PROJECT NO. 14-3PF, SIO NO. 30001422 SOUTHEASTERN TRANSPORTATION CONSORTIUM SYNTHESES OF STATE-OF-PRACTICE Transportation Funding Sources and Alternatives in the Southeastern States Now and in the Future PROBLEM STATEMENT According

Harms, Kyle E.

275

ENDTOEND REQUEST HANDLING IN DISTRIBUTED VIDEOONDEMAND SYSTEMS  

E-Print Network (OSTI)

that adequate storage and stream handling capacities are present at the servers in the remote clusters. In addition, the remote sites act as sources of supplemental request handling capacity minimizing overall service is delivered only when the local cluster can­ not handle the load. Between the two remote clusters

Mundur, Padma

276

In the Matter of National Broadband Plan Request for Information:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

In the Matter of National Broadband Plan Request for Information: In the Matter of National Broadband Plan Request for Information: Communications Requirements In the Matter of National Broadband Plan Request for Information: Communications Requirements The American Public Power Association ("APPA") appreciates this opportunity to respond to the Department of Energy ("the Department" or "DOE") regarding its Request for Information ("RFI") on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy. In the Matter of National Broadband Plan Request for Information: Communications Requirements More Documents & Publications Communications Requirements of Smart Grid Technologies RE: NBP RFI: Communications Requirements

277

Fire Protection System Account Request Form | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fire Protection System Account Request Form Fire Protection System Account Request Form Fire Protection System Account Request Form December 2, 2010 Account request form used to obtain user credentials for the Fire Protection Database To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to HSSUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your account information. Fire Protection System Account Request Form More Documents & Publications CAIRS Registration Form Microsoft Word - PARS II User Acct Access Guide.rtf PARS Domain User Maintenance Function Support Team Guide (v

278

ARM - Engineering Work Request & Engineering Work Order Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Work Request & Engineering Work Request & Engineering Work Order Guidelines Page Contents: Introduction Discussion of the ARM Climate Research Facility Engineering Process: The Engineering Change Request (ECR) and the Engineering Change Order (ECO) Operations and Engineering Task Consulting: The Engineering Work Request (EWR) and the Engineering Work Order (EWO) Relationship of the ECR/ECO and EWR/EWO to the Engineering Task Tracking Tool Relationship of the ECR/ECO and EWR/EWO to the Existing Configuration Control Process in the ARM Climate Research Facility(PIF/CAR, PRR, ORR, and BCR) Glossary Frequently Asked Questions (PDF, 173K) Engineering Work Request & Engineering Work Order Guidelines Process Guidelines for the Engineering Change Request/Engineering Change Order and Engineering Work Request/Engineering Work Order

279

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. to reduce energy prices and for the positions of the Coal-Based Generation Stakeholders group, I am pleased to enclose AAR briefing papers on the following three railroad priorities: repeal of the 4.3 cent per gallon "deficit reduction" diesel fuel tax, an acceptable resolution of the coal mine valley fill issue, and establishment of a locomotive fuel efficiency program within the Department of Energy. nepdg_2251_2500.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy. PoliResponse to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy.

280

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network (OSTI)

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses LRU cache filtering to capture the high bandwidth flows followed by computation of wavelet variance on the aggregate miss traffic. The introduction of attack traffic in the network would elicit changes in the wavelet variance. This is combined with thresholding methods to enable attack detection. Sampling techniques can be used to tailor the cost of our detection mechanism. The mechanism we suggest is independent of routing information, thereby making attack detection immune to IP address spoofing. Using simulations and quantitative measures, we find that our mechanism works successfully on several kinds of attacks. We also use statistical methods to validate the results obtained.

Ramanathan, Anu

2002-01-01T23:59:59.000Z

282

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

283

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

284

SLAC Dosimeter / ID Request Form A  

NLE Websites -- All DOE Office Websites (Extended Search)

Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 SLAC Dosimeter / ID Request Form A (For applicants who have completed SLAC Environment, Safety, and Health Training) Sections 1-5 completed by applicant. Section 1: Contact Information Last name: First name: MI: Male Female Birth year (yyyy): Job title: Contact information/mailing address: City: State: Zip code: Country: Dept/Group: Phone number: Mail stop: Users or non-SLAC employees only: List employer, company, or university : Section 2: Identification Badge Request I am applying for my first SLAC identification badge; I have successfully completed the following ES&H training (indicate all that apply): SON SOC EOESH GERT RWT I RWT II

285

PARS II Change Request (CR) Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Title: Phone #: Office/Symbol: Email: CHANGE TYPE: Defect: New Requirement: PRIORITY: PARS II Change Request Form (APR 2011) PARS II Change Request (CR) Form 1 = Prevents the accomplishment of an essential PARS-II capability 3 = Adversely affects the accomplishment of an essential PARS-II capability, but a work-around solution is known 4 = Results in User / Operator inconvenience or annoyance, but does not affect an essential PARS-II capability 5 = Any other effect 1) Detailed description of problem/need. (If possible, provide project #(s) you are working with). PROBLEM/CHANGE DESCRIPTION: 2) Where in system defect is seen or where new functionality is required (i.e., which screen, which report). Screenshots (as separate attachments) are helpful.

286

Joint Responses to Audit Response Requests  

E-Print Network (OSTI)

documenting the NRC Staff s conclusions regarding a pre-application audit of Tennessee Valley Authority (TVA) and Duke Energy Carolinas (Duke) combined license (COL) application preparation activities, conducted from July 30- August 3, 2007. Because TVA's Bellefonte COL application and Duke's Lee Nuclear COL application were prepared in close coordination through NuStart and the AP 1000 Design Centered Work Group (DCWG), and because these two COL applications were prepared by the same contractor, the audits were performed essentially simultaneously. The referenced audit report requested that the audit response requests (ARRs) be addressed prior to or as part of the respective COL application submittals. Responses to the ARRs are enclosed. The ARRs in the audit report did not directly impact the content of the COL applications, and the timing of the issuance of the audit report did not facilitate a response prior to the filing of the applications.

Juan Peralta Chief; Tennessee Valley

2007-01-01T23:59:59.000Z

287

FY 1996 Congressional budget request: Budget highlights  

SciTech Connect

The FY 1996 budget presentation is organized by the Department`s major business lines. An accompanying chart displays the request for new budget authority. The report compares the budget request for FY 1996 with the appropriated FY 1995 funding levels displayed on a comparable basis. The FY 1996 budget represents the first year of a five year plan in which the Department will reduce its spending by $15.8 billion in budget authority and by $14.1 billion in outlays. FY 1996 is a transition year as the Department embarks on its multiyear effort to do more with less. The Budget Highlights are presented by business line; however, the fifth business line, Economic Productivity, which is described in the Policy Overview section, cuts across multiple organizational missions, funding levels and activities and is therefore included in the discussion of the other four business lines.

Not Available

1995-02-01T23:59:59.000Z

288

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

289

A study on visual attack to BPCS-Steganography and countermeasure  

Science Conference Proceedings (OSTI)

This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS replaces noisy blocks with the binary patterns mapped from secret data. The logical operation called conjugate ...

Michiharu Niimi; Hideki Noda; Bruce Segee

2005-09-01T23:59:59.000Z

290

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

291

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

292

Exposing Digital Forgeries in Scientific Images Department of Computer Science  

E-Print Network (OSTI)

that as many as 20% of accepted manuscripts contain figures with inappropriate manipulations, and 1% with fraudulent manipulations. Several scientific editors are considering putting safeguards in place to help to be a need for computational techniques that automatically detect common forms of tam- pering. We describe

Farid, Hany

293

Jefferson Lab Science Series - Multi-Million Dollar Forgeries...  

NLE Websites -- All DOE Office Websites (Extended Search)

Comic Book Physics Previous Video (Comic Book Physics) Science Series Video Archive Next Video (Science Headlines from the 21st Century) Science Headlines from the 21st Century...

294

Request for Information - Operations and Maintenance (O & M) Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information - Operations and Maintenance (O & M) Request for Information - Operations and Maintenance (O & M) Support Services for the iManage Request for Information - Operations and Maintenance (O & M) Support Services for the iManage Request for Information (THIS IS NOT A NOTICE OF SOLICITATION ISSUANCE) This is a Special Notice that includes a Request for Information (RFI) to receive comments regarding the attached draft Performance Work Statement (PWS), notice regarding an upcoming Industry Day, and notice regarding one-on-one conferences. This Special Notice is issued solely for information and planning purposes - it does not constitute a Request for Proposal (RFP) or a promise to issue an RFP in the future. This RFI does not commit the Government to contract for any supply or service

295

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, epdg_13501_13750.pdf Mr. BARTON. Right.1639 Mr. GARMAN. You know, it varies widely. I can give you 1640 a very kind of gross median savings. 1641 Mr. BARTON. Well, my understanding is the industry 1642 estimates that the cost of an air conditioner"will increase 1643 by $407, 16.9 percent increase at 12 SEER, and $712 or a 29.5 1644 percent increase at a 13 SEER. So the difference is nearly 1645 double between the 12 and 13, just in the cost of the air 1646 conditioner. Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy

296

DOE to Hold Public Information Meetings on Requested Permit Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

Requested Permit Modifications Requested Permit Modifications CARLSBAD, N.M., March 15, 2001 -- The public is invited to comment on requested modifications to the Hazardous Waste Facility Permit for the Waste Isolation Pilot Plant (WIPP). Submittal of the proposed modification request to the New Mexico Environment Department (NMED) by the U.S. Department of Energy (DOE) begins a formal review process that includes a 60-day public comment period and public information meetings. In its submittal, DOE requests five permit changes to modify conditions at the facility. The proposed modifications conform to industry standards for the handling of hazardous materials and would continue to protect the safety of the facility, its employees, and the public. The first two requested changes would eliminate redundant and obsolete training

297

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Energy Efficiency Policy Recommendations for the New Administration and Congress. American Council for an Energy-Efficient Economy February, 2001. nepdg_1_250.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy AARP, National Consumer Law Center, and Public Citizen Comments to:DEPARTMENT OF ENERGY Smart Grid RFI: Addressing Policy and Logistical Challenges AARP Reply Comments to Department of Energy Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy

298

Waste Isolation Pilot Plant Electronic FOIA Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

Request (FOIA) Request (FOIA) Waste Isolation Pilot Plant Electronic FOIA Request Form To make an Electronic FOIA request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: Organization: Address: Phone: FAX: Email: Reasonable Describe Records Describe the specific record(s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that

299

NNSA FY 2013 Budget Request | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

FY 2013 Budget Request | National Nuclear Security Administration FY 2013 Budget Request | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > NNSA FY 2013 Budget Request NNSA FY 2013 Budget Request NNSA FY 2013 Budget Request FY 2013 Budget Request Seeks $11.5 Billion to Achieve President Obama's Nuclear Security Objectives, Shape Future of Nuclear Security

300

Request For Records Disposition Authority: Strategic Petroleum Reserve  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request For Records Disposition Authority: Strategic Petroleum Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office Paper case files pertaining to environmental permit applications, permits and related correspondence as well as NEPA correspondence within of the Strategic Petroleum Reserve Project Management Office (SPRPMO) Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office More Documents & Publications 2012 Annual Planning Summary for Fossil Energy, National Energy Technology Laboratory, RMOTC, and Strategic Petroleum Reserve Field Office CX-002673: Categorical Exclusion Determination CX-009794: Categorical Exclusion Determination

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

REQUESTS FOR PAYMENTS UNDER FIRM-FIXED PRICE CONSTRUCTION CONTRACTS  

REQUESTS FOR PAYMENTS UNDER FIRM-FIXED PRICE CONSTRUCTION CONTRACTS Author: wshelto Last modified by: wshelto Created Date: 2/28/2008 3:26:00 PM Company:

302

Response to several FOIA requests - Renewable Energy. | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

37514000.pdf Impediments to Conventional Energy Production, February 12, 2001 Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to...

303

DOE Issues Request for Proposals Seeking a Contractor to Manage...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Princeton Plasma Physics Laboratory DOE Issues Request for Proposals Seeking a Contractor to Manage and Operate its Princeton Plasma Physics Laboratory July 3, 2008 - 2:15pm...

304

Request for Comments on the Electric Grid Integration Technical...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and the Department of Energy is requesting public comments. The documents are the Electricity Distribution System Workshop Discussion Summary and the Electricity...

305

REQUEST BY WESTINGHOUSE POWER GENERATION, A FORMER DIVISION OF...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Statement of Considerations REQUEST BY WESTINGHOUSE POWER GENERATION, A FORMER DIVISION OF CBS CORPORATION, FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN RIGHTS IN SUBJECT...

306

REQUEST BY ABB POWER GENERATION, INC., FOR AN ADVANCE WAIVER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Statement of Considerations REQUEST BY ABB POWER GENERATION, INC., FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN RIGHTS IN SUBJECT INVENTIONS MADE IN THE COURSE OF OR UNDER...

307

FY2012 EERE Congressional Budget Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year 2012 budget request from the Department of Energy's Office of Energy Efficiency and Renewable Energy fy2012eerecongressionalbudgetrequest.pdf More Documents &...

308

Notice of inquiry and request for Information - Study of the...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

inquiry and request for Information - Study of the potential benefits of distributed generation: Federal Register Notice Volume 71, No. 19 - Jan. 30, 2005 Notice of inquiry and...

309

Browning: Email in Response to Smart Grid Request for Information  

Energy.gov (U.S. Department of Energy (DOE))

Email from Stephen Browning explaing the two attachments submitted in response to the Smart Grid Request for Information on Addressing Policy and Logistical Challenges.

310

STATEMENT OF CONSIDERATIONS REQUEST BY EASTMAN CHEMICAL COMPANY...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

waiver petition and in subsequent discussions with DOE Patent Counsel, Eastman Chemical Company (Eastman) has requested an advance waiver of domestic and foreign patent...

311

Re~ Request for Information NBP RFI: Data Access | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

312

Request for Information NBP RFI: Data Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

313

Request for Proposals Number RHB-3-23115  

NLE Websites -- All DOE Office Websites (Extended Search)

9 National Renewable Energy Laboratory Managed and Operated by the Alliance for Sustainable Energy, LLC Request for Proposals Number RHB-3-23115 "Construction Project Management...

314

STATEMENT OF CONSIDERATIONS REQUEST BY TEXACO EXPLORATION AND...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the request is clarified to include the inventions of the subcontractor, Texaco Inc's Exploration and Production Technology Division (EPTD). EPTD has joined and approved this...

315

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Crude Oil REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications Oil Overcharge Refund Cases 2003 Oil Overcharge Refund Cases 1996 Oil Overcharge Refund Cases 1999...

316

FY 2014 Budget Request Summary Table | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Table FY 2014 Budget Request Summary Table Summary Table by Appropriations Summary Table by Organization More Documents & Publications FY 2014 Budget Justification Details...

317

FY 2007 Congressional Budget Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Laboratory Tables for the Department of Energy's 2007 Congressional budget. FY 2007 Congressional Budget Request More Documents & Publications Department of Energy FY 2007 Budget...

318

STATEMENT OF CONSIDERATIONS REQUEST BY THE UNITED STATES ADVANCED...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

708 )2 2779 P. 002 STATEMENT OF CONSIDERATIONS REQUEST BY THE UNITED STATES ADVANCED BATTERY CONSORTIUM (USABC) FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS UNDER...

319

Response to several FOIA requests - Renewable Energy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOIA requests - Renewable Energy More Documents & Publications Steps to Establish a Real-Time Transmission Monitoring System for Transmission Owners and Operators within the...

320

STATEMENT OF CONSIDERATIONS REQUEST BY SHELL SOLAR SYSTEMS, LP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

As set out ins the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Shell Solar Systems, LP (SSI) has requested an advance waiver of domestic...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

STATEMENT OF CONSIDERATIONS REQUEST BY SOLAREX FOR AN ADVANCE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CH-0945 The Petitioner, Solarex, has requested a waiver of domestic and foreign patent rights for all subject inventions arising from its participation under the above...

322

Patent STATEMENT OF CONSIDERATIONS REQUEST BY CERAMATEC CORPORATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Patent STATEMENT OF CONSIDERATIONS REQUEST BY CERAMATEC CORPORATION FOR AN ADVANCE WAIVER OF FOREIGN AND DOMESTIC PATENT RIGHTS FOR INVENTIONS DEVELOPED UNDER DOE CONTRACT NO....

323

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

04 * * STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER ITS SUBCONTRACT WITH THE GLASS TECHNOLOGY INSTITUTE UNDER DOE COOPERATIVE...

324

Request For Records Disposition Authority-Nuclear Weapons | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Records Disposition Authority-Nuclear Weapons Request For Records Disposition Authority-Nuclear Weapons This document identifies the nuclear weapon records generated by the...

325

STATEMENT OF CONSIDERATIONS REQUEST BY WEIRTON STEEL CORPORATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

was requested to develop an integrated manufacturing information system (IMIS) for the steel industry. Accordingly, DOE, acting through its Office of Industrial Processes under...

326

NNSA FY 2013 Budget Request | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

FY 2013 Budget Request | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

327

Request for Information on Improving Performance of Federal Permitting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and...

328

Statement on the FY 2012 President's Budget Request before the...  

National Nuclear Security Administration (NNSA)

2 President's Budget Request before the House Appropriations Committee Subcommittee on Energy and Water Development | National Nuclear Security Administration Our Mission Managing...

329

Response to several FOIA requests - Renewable Energy. | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Glendale, Burbank),Summer 2001 nepdg7511000.pdf Total Load (CEC Draft Demand Forecast 10162000 Response to several FOIA requests - Renewable Energy. More Documents &...

330

Response to several FOIA requests - Renewable Energy. | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to several FOIA requests - Renewable Energy. BACKGROUND: Section 3112(b)(2) of the USEC Privatization Act requires the Department of Energy to sell uranium hexafluoride into...

331

Response to several FOIA requests - Renewable Energy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to several FOIA requests - Renewable Energy, Electricity Consumption Estimates (million kWh)National Petroleum Council Assumption: The definition of electricity consumption and...

332

FRN Request for Proposals for New or Upgraded Transmission Line...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Administration Request for Proposals for New or Upgraded Transmission Line Projects Under Section 1222 of the Energy Policy Act of 2005 AGENCY:...

333

Response to Request for Information titled "Addressing Policy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

energy and climate policy reduces the likelihood of a significant reduction in greenhouse gas emissions or energy imports. Response to Request for Information titled "Addressing...

334

Request for Information on Permitting of Transmission Lines:...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal...

335

Response to several FOIA requests- Renewable Energy pages 4001- 4250  

Energy.gov (U.S. Department of Energy (DOE))

Response to several FOIA requests - Renewable Energy. nepdg_4001_4250.pdf R.eport Statement/Recommendation Background Pros/Cons discussion

336

STATEMENT OF CONSIDERATIONS REQUEST BY GOLDEN PHOTON INC. FOR...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from its participation under the above referenced subcontract entitled "Thin Film Photovoltaics Partnership Program." GPI has requested that, in granting the waiver, the same...

337

Re: DOE Request for Information - Implementing the National Broadband...  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy Re: DOE Request for Information - Implementing the National Broadband...

338

Regarding Request for Information Published at 75 Fed. Reg. 26...  

NLE Websites -- All DOE Office Websites (Extended Search)

(May 11, 2010) "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy" Regarding Request for Information...

339

Reply comments to DOE Request for Information-Implementing the...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments to DOE Request for...

340

DOE Request for Information - Implementing the National Broadband...  

NLE Websites -- All DOE Office Websites (Extended Search)

Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy DOE Request for Information -...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

342

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

343

Hudson-Reed: Data Request (2010-CW-1403) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-CW-1403) Hudson-Reed: Data Request (2010-CW-1403) March 2, 2010 DOE requested test data from Hudson-Reed Limited for Hudson Reed's showerhead ("shower tower")...

344

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

345

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 9660 of 28,905 results. 51 - 9660 of 28,905 results. Map START Program Project Sites The Strategic Technical Assistance Response Team (START) Program is part of the DOE Office of Indian Energy effort to assist in the development of tribal renewable energy projects. Through START,... http://energy.gov/indianenergy/maps/start-program-project-sites Article V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. http://energy.gov/cio/articles/v-153-symantec-brightmail-gateway-input-validation-flaw-permits-cross-site-scripting Article V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form

346

NRC requests another round of modifications  

Science Conference Proceedings (OSTI)

This article summarizes a number issues and events in the commercial nuclear power industry during this reporting period. Included are items on: (1) Issuance of NRC Bulletin 96-03 requesting modifications to BWR emergency core cooling systems, (2) Augmented inspection team to investigate a reactor trip/steam generator boil-off event at ANO-1, (3) Overall performance improvement at Dresden Station, (4) FSAR violations during refueling at a number of facilities in which the core is fully off-loaded, (5) Safety assessment at Maine Yankee, (6) Startup of Watts Bar-1, and (6) Cooling tower fire at Brown`s Ferry.

NONE

1996-07-01T23:59:59.000Z

347

FOIA Requests Received by DOE HQ in 2008 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

- December 2008 More Documents & Publications FOIA Requests Received by DOE HQ in 2009 FOIA Requests received by DOE Headquarters (HQ) since December 31, 2008 Audit Report: IG-0812...

348

Florida Power and Light Comments on Smart Grid Request For Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Florida Power and Light Comments on Smart Grid Request For Information (RFI): Addressing Policy & Logistical Challenges. Florida Power and Light Comments on Smart Grid Request For...

349

Microsoft Word - Student Travel Request Form.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

neup@inl.gov | Fax: (208) 526-8076 | Phone: (208) 526-1336 neup@inl.gov | Fax: (208) 526-8076 | Phone: (208) 526-1336 FELLOWSHIP TRAVEL REQUEST FORM Student Name: _____________________________ Date of Request: _________________________ University: ________________________________ Email Address: ___________________________ Phone: ___________________________________ In-State Travel Out-of-State Travel Event Name: ___________________________________________________________________________ Destination: ___________________________________________________________________________ Justification: ___________________________________________________________________________ *Presentation/Poster Title: _______________________________________________________________ Departure Date: _________________________ Return Date: _________________________

350

Medical Leave of Absence Without Pay Request Georgia Southern University  

E-Print Network (OSTI)

Medical Leave of Absence Without Pay Request Georgia Southern University Employee Name Request Justification: Medical leave without pay: Medical leave without pay may be granted for reasons including extenuating personal health problems or immediate family issues. Medical leaves of absence without

Hutcheon, James M.

351

College of Engineering Request for Institutional Waiver of Indirect Cost  

E-Print Network (OSTI)

Investigator Sponsor Project Title Total Direct Costs Total Modified Direct Costs Full Indirect Costs Rate Full Indirect Costs Amount Total Project Costs (with Full IDC) Requested Indirect Costs Rate Requested Indirect Costs Amount Total Project Costs (with req'd IDC) Principal Investigator's Justification for Indirect

Eustice, Ryan

352

Internet requests for comments (RFCs) as scholarly publications  

Science Conference Proceedings (OSTI)

This note describes the various peer review processes applied to Internet Requests for Comments (RFCs) over a number of years, and suggests that these have been up to normal scholarly standards since at least 1992. The authors believe that these documents ... Keywords: request for comments, rfc

Brian E. Carpenter; Craig Partridge

2010-01-01T23:59:59.000Z

353

Energy Secretary Announces $52 Million Request for Asia Pacific Partnership  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52 Million Request for Asia Pacific 52 Million Request for Asia Pacific Partnership on Clean Development and Climate Energy Secretary Announces $52 Million Request for Asia Pacific Partnership on Clean Development and Climate January 12, 2006 - 10:33am Addthis FY 2007 money to expand the use of clean energy technologies SYDNEY, AUSTRALIA - Secretary of Energy Samuel W. Bodman today announced that President Bush will request $52 million in the upcoming FY 2007 budget to support the efforts of the Asia Pacific Partnership on Clean Development and Climate. This Partnership will expand the use of new energy technologies, improve environmental quality, and promote worldwide economic growth. This funding request will complement the $3 billion the U.S. spends each year on climate change technology solutions and the billions of

354

How to Submit a FOIA Request | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to Submit a FOIA Request | National Nuclear Security Administration to Submit a FOIA Request | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) > How to Submit a FOIA Request How to Submit a FOIA Request FOIA requests to the NNSA/Office of the General Counsel may be submitted in

355

Request for Comments on the Electric Grid Integration Technical Workshops  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Comments on the Electric Grid Integration Technical Request for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Request for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Notice is hereby given that two documents are publicly available and the Department of Energy is requesting public comments. The documents are the Electricity Distribution System Workshop Discussion Summary and the Electricity Transmission System Workshop Discussion Summary. Written comments are to be received no later than March 25, 2013. For details on how to submit comments, please view the Federal Register Notice, below. Request for Comments on the Electric Grid Integration Technical Workshops

356

DOE Headquarters FOIA Request Form | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operational Management » Freedom of Information Act » DOE Operational Management » Freedom of Information Act » DOE Headquarters FOIA Request Form DOE Headquarters FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Contact information Name * Organization Address * Fax number Phone number Email address Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are

357

Comments of Avista Corporation on DOE Request for  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Avista Corporation on DOE Request for Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy More Documents & Publications

358

Leader Electronics: Data Request (2010-SE-2301) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-SE-2301) Data Request (2010-SE-2301) Leader Electronics: Data Request (2010-SE-2301) August 19, 2010 DOE requested test data from Leader Electronics Inc. for various models of external power supplies after Leader Electronics certified energy values that did not meet federal energy conservation standards. Leader Electronics was required to provide test data, including complete test reports, for external power supply models "NU50-2093400-I3(NU50-21090-300F)" and "MU03-F050040-AI(MU03-F1050-AKOS)." Leader Electronics: Data Request (2010-SE-2301) More Documents & Publications Leader Electronics: Noncompliance Determination (2010-SE-2301) Leader Electronics: Notice of Allowance (2010-SE-2301) Lutron Electronics: Noncompliance Determination (2012-SE-3796

359

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

360

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

362

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

363

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

364

STUDENT INTERN RELOCATION BENEFIT REQUEST FORM  

NLE Websites -- All DOE Office Websites (Extended Search)

01-RBR (8-2013) 01-RBR (8-2013) UCI (When Completed) UCI (When Completed) STUDENT INTERN RELOCATION BENEFIT REQUEST FORM Instructions for New Hire, Re-hire or Year-round Intern returning to Sandia work site from remote location: Review eligibility criteria below. If you believe that you may be eligible to receive relocation benefits from Sandia, complete and sign this form, then return to the CA or NM Student Intern Programs office. ELIGIBILITY CRITERIA Name: Phone: Email: School/Academic Residence Address Permanent Address Address 1 Address 2 City State Zip Code Student Acknowledgement: I certify that the information stated on this form is correct and complete to best of my knowledge. I

365

REQUEST FOR PROPOSALS RENEWABLE ENERGY CERTIFICATES  

NLE Websites -- All DOE Office Websites (Extended Search)

5, 2005 5, 2005 REQUEST FOR PROPOSALS RENEWABLE ENERGY CERTIFICATES Issued by: World Resources Institute on behalf of corporate partners in the GREEN POWER MARKET DEVELOPMENT GROUP BACKGROUND Convened in 2000 by the World Resources Institute, the Green Power Market Development Group is a unique commercial and industrial partnership dedicated to building corporate markets for green power. The Group is transforming energy markets to enable corporate buyers to diversify their energy portfolios and reduce their impact on climate change. Group partners are Alcoa Inc., Delphi Corporation, the Dow Chemical Company, DuPont, FedEx Kinko's, General Motors, IBM, Interface, Johnson & Johnson, NatureWorks LLC, Pitney Bowes, Staples, and Starbucks Coffee Company. More information is available at

366

FY2012 EERE Congressional Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency and Renewable Energy Energy Efficiency and Renewable Energy eere.energy.gov The Parker Ranch installation in Hawaii The FY 2012 Budget Request February 2011 Henry Kelly Principal Deputy Assistant Secretary for EERE 2 | Energy Efficiency and Renewable Energy eere.energy.gov "This is our generation's Sputnik moment. We'll invest in ... clean energy technology - an investment that will strengthen our security, protect our planet, and create countless new jobs for our people. Maintaining our leadership in research and technology is crucial to America's success." President Obama State of the Union January 25, 2011 Clean Innovative Energy Solutions Securing America's Future 3 | Energy Efficiency and Renewable Energy eere.energy.gov EERE Budget Trend EERE Budget Trend FY 2003 -

367

REQUEST FOR RECORDS DISPOSITION AUTHORITY S  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

S S e e Instructions o n reverse) NATIONAL ARCHIVES and RECORDS ADMINISTRATION (NIR) WASHINGTON. DC 20408 , - - 1. FROM (Agency or establishment) Department of Energy 2. MAJOR SUBDIVISION Assistant Secretary For Fossil Energy (FE-1) I 3. MINOR SUBDIVISION Office of Naval Petroleum and Shale Oil 4 . NAME OF PERSON WITH WHOM TO CON I 1 Jerry Hinkle (FE 47) 1(202)586-43 80 I I / 6. AGENCY CERTIFICATION I NOTIFICATION TO AGENCY i I In accordance with the provisions of 44 U.S.C. 3303a the disposition request, including amendments, is ap roved except for items that may be marke! "dis osition not approved" or "withdrawn" in c o L n 10. I hereby certify that I am authorized to act for this agency in yatters pertaining to of its records and that the records roposed for disposal on the attached

368

EM FY 2012 Presidential Budget Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety performance cleanup closure safety performance cleanup closure E M Environmental Management 1 EM FY 2012 Presidential Budget Request www.em.doe.gov E M Environmental Management 2 safety performance cleanup closure Leveraging strategic investments to meet compliance and maintain cleanup momentum  We reduce risks and protect our workers, our communities and the environment through cleanup  Our work is urgent and essential to the health and economic vitality of our communities and the nation and positions our Sites for future missions and use  Our mission is not discretionary - it is a congressional mandate to D&D the gaseous diffusion plant under the U.S. Energy Policy Act of 1992 and a federal obligation to address the cold war environmental legacy cleanup and honor our

369

FY 1997 congressional budget request: Budget highlights  

SciTech Connect

This is an overview of the 1997 budget request for the US DOE. The topics of the overview include a policy overview, the budget by business line, business lines by organization, crosswalk from business line to appropriation, summary by appropriation, energy supply research and development, uranium supply and enrichment activities, uranium enrichment decontamination and decommissioning fund, general science and research, weapons activities, defense environmental restoration and waste management, defense nuclear waste disposal, departmental administration, Office of the Inspector General, power marketing administrations, Federal Energy Regulatory commission, nuclear waste disposal fund, fossil energy research and development, naval petroleum and oil shale reserves, energy conservation, economic regulation, strategic petroleum reserve, energy information administration, clean coal technology and a Department of Energy Field Facilities map.

1996-03-01T23:59:59.000Z

370

• Corrections Requested for Information Quality Compliance  

E-Print Network (OSTI)

I have received your alleged response to my April 28, 2008 Information Quality Challenge (RFC #08002) from Dr. Lawrence W. Reiter. It is unacceptable for an EPA official to provide a distorted and misleading non-responsive reply to my information quality challenge by deceptively “reframing ” my concerns. Dr. Reiter’s reply of October 3, 2008 does not address any of the challenges I provided in my request for correction. Dr. Reiter’s reply is non-responsive to my concerns. I demand that the EPA provide me with an accurate, timely, and supported response to my information quality challenge. EPA Provides a Non-Response to Citizens Concerns by Deceptively Reframing the Scope of the Information Quality Challenge. The Unacceptable Non-Response by EPA Must be Corrected Immediately. Complaint Filed with the EPA’s Inspector General Office to Hold EPA Officials Accountable. Dr. Reiter’s reply to me is completely non-responsive to my many

unknown authors

2008-01-01T23:59:59.000Z

371

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

372

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network (OSTI)

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

373

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

374

False data injection attacks against state estimation in electric power grids  

Science Conference Proceedings (OSTI)

A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, ... Keywords: Power grids, attack, state estimation

Yao Liu; Peng Ning; Michael K. Reiter

2011-05-01T23:59:59.000Z

375

Not-a-Bot: improving service availability in the face of botnet attacks  

Science Conference Proceedings (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic ...

Ramakrishna Gummadi; Hari Balakrishnan; Petros Maniatis; Sylvia Ratnasamy

2009-04-01T23:59:59.000Z

376

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

377

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Chien, Andrew A.

378

[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches  

Science Conference Proceedings (OSTI)

In this paper, we suggest handling security in embedded systems by introducing a small architectural change. We propose the use of a non-deterministic branch instruction to generate non-determinism in the execution of encryption algorithms. Non-determinism ... Keywords: embedded system security, side-channel attacks, hiding countermeasure

Pedro Malagon, Juan-Mariano de Goyeneche, Marina Zapater, Jose M. Moya

2010-01-01T23:59:59.000Z

379

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid is a new type of energy-based cyber physical system (CPS) that will provide reliable, secure, and efficient energy transmission and distribution. The way to secure the distributed energy routing process that efficiently utilizes the distributed ... Keywords: Smart grid, Distributed energy routing, False data injection attacks, Energy distribution

Jie Lin; Wei Yu; Xinyu Yang; Guobin Xu; Wei Zhao

2012-04-01T23:59:59.000Z

380

Iago attacks: why the system call API is a bad untrusted RPC interface  

Science Conference Proceedings (OSTI)

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted application's state. Under such ... Keywords: iago attacks, overshadow, system call

Stephen Checkoway; Hovav Shacham

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

382

A Look In the Mirror: Attacks on Package Managers Author Names Removed for Anonymous Submission  

E-Print Network (OSTI)

for security. There is no protection of package metadata or the root metadata. Package Metadata An attacker can of the package in the package meta- data protects the package from tampering. Packages Resistance to metadata, the package metadata is protected from tam- pering. Packages The signature on the root metadata prevents

Hartman, John H.

383

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain  

E-Print Network (OSTI)

In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and flow measure. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time. NS-2 network simulator on Linux platform is used as simulation testbed. Simulation results show that our proposed solution gives a drastic improvement in terms of detection rate and false positive rate. However, the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads as far as monitoring and analysis of traffic at single point connecting victim is concerned. To address this problem, a distributed...

Gupta, B B; Misra, Manoj; 10.1145/1523103.1523203

2012-01-01T23:59:59.000Z

384

The Small and Silent Force Multiplier: A Swarm UAV--Electronic Attack  

Science Conference Proceedings (OSTI)

At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) ... Keywords: Electronic attack, Electronic warfare, Swarm UAV, UAS, UAV, Unmanned Aircraft Systems, Unmanned aerial vehicle

Polat Cevik; Ibrahim Kocaman; Abdullah S. Akgul; Barbaros Akca

2013-04-01T23:59:59.000Z

385

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

386

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation  

E-Print Network (OSTI)

Frequency and intensity of Internet attacks are rising with an alarming pace. Several technologies and concepts were proposed for fighting distributed denial of service (DDoS) attacks: traceback, pushback, i3, SOS and Mayday. This paper shows that in the case of DDoS reflector attacks they are either ineffective or even counterproductive. We then propose a novel concept and system that extends the control over network traffic by network users to the Internet using adaptive traffic processing devices. We safely delegate partial network management capabilities from network operators to network users. All network packets with a source or destination address owned by a network user can now also be controlled within the Internet instead of only at the network user's Internet uplink. By limiting the traffic control features and by restricting the realm of control to the "owner" of the traffic, we can rule out misuse of this system. Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, new ways of collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.

Thomas Dübendorfer; Matthias Bossardt; Bernhard Plattner

2005-01-01T23:59:59.000Z

387

Contactless electromagnetic active attack on ring oscillator based true random number generator  

Science Conference Proceedings (OSTI)

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some ... Keywords: EM injections, IEMI, TRNGs, active attacks, ring oscillators

Pierre Bayon; Lilian Bossuet; Alain Aubert; Viktor Fischer; François Poucheret; Bruno Robisson; Philippe Maurine

2012-05-01T23:59:59.000Z

388

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

389

Regulating Greenhouse Gas 'Leakage': How California Can Evade the Impending Constitutional Attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation. (author)

Potts, Brian H.

2006-06-15T23:59:59.000Z

390

Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

Brian H. Potts

2006-06-15T23:59:59.000Z

391

The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure  

SciTech Connect

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

2006-08-28T23:59:59.000Z

392

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

393

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

394

How to Request & Access Beam Time | Stanford Synchrotron Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Request & Access Beam Time How to Request & Access Beam Time Step 1: Submit a proposal that summarizes proposed research plans. Step 2: Submit beam time requests. Step 3: Review & accept beam time allocations. Instructions for users allocated beam time on SSRL X-ray/VUV beam lines. Accept Beam Time & Submit Support Request Registration & Assistance User Agreements User Financial Accounts, Supplies, Gases, Domestic & International Shipments User Computer Accounts User Safety Preparing for Arrival/Lodging/Check-In Acknowledgements, Publications, Science Highlights & News Feedback Step 1: Submit a proposal that summarizes proposed research plans. Review the guidelines for proposals and scheduling procedures. Standard proposals can be submitted through the user portal three times each year:

395

Booz Allen Hamilton Response to Department of Energy Request for  

NLE Websites -- All DOE Office Websites (Extended Search)

Booz Allen Hamilton Response to Department of Energy Request for Booz Allen Hamilton Response to Department of Energy Request for Information on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Booz Allen Hamilton Response to Department of Energy Request for Information on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Booz Allen Hamilton (Booz Allen) has had an enduring relationship with the Department of Energy (DOE) for more than two decades. We are pleased to be responding to the DOE's Request for Information (RFI), Implementing the National Broadband Plan by Studying the Communcations Requirements of Electric Utilities to Inform Federal Smart Grid Policy, with our

396

Response to several FOIA requests - Renewable Energy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, nepdg_2001_2250.pdf. As in the case of the Chrysler bailout in the 1970s, if a utility must tap into the fund, the taxpayers who made the fund possible receive a legal interest in the future success of the utility. This legal interest comes in the form of stock warrants. They can only be exercised if the price of the stock goes up comfortably above the (presumably epressed) level at the time the warrants were issued. And the state would not actually hold any stock, but rather would exercise its right to buy the stock at the earlier (lower) price, and this would trigger an obligation on the part of the utility to buy it back at the present (higher) price, less

397

Response to several FOIA requests - Renewable Energy. Demand for Fossil  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Demand for Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. nepdg_251_500.pdf. Demand for Fossil Fuels. Renewable sources of power. Demand for fossil fuels surely will overrun supply sooner or later, as indeed it already has in the casc of United States domestic oil drilling. Recognition also is growing that our air and land can no longer absorb unlimited quantities of waste from fossil fuel extraction and combustion. As that day draws nearer, policymakers will have no realistic alternative but to turn to sources of power that today make up a viable but small part of America's energy picture. And they will be

398

Response to Request for Information from the Department of Energy:  

NLE Websites -- All DOE Office Websites (Extended Search)

to Request for Information from the Department of Energy: to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 Response to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." EnerNOC is a provider of demand response and energy efficiency solutions to utilities,

399

DOE Issues Request for Quotations for Depleted Uranium Hexafluoride  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Request for Quotations for Depleted Uranium Hexafluoride Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services DOE Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services December 12, 2012 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 bill.taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) today issued a Request for Quotation (RFQ) for engineering and operations technical services to support the Portsmouth Paducah Project Office and the oversight of operations of the Depleted Uranium Hexafluoride (DUF6) Conversion Project located in Paducah KY, and Portsmouth OH. The RFQ is for a Time-and-Materials Task Order for three years with two one-year option periods. The estimated contract value is approximately $15 - 20 million.

400

DOE Issues Draft Request for Proposals Seeking Contractor to Manage,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Issues Draft Request for Proposals Seeking Contractor to DOE Issues Draft Request for Proposals Seeking Contractor to Manage, Operate Waste Isolation Pilot Plant DOE Issues Draft Request for Proposals Seeking Contractor to Manage, Operate Waste Isolation Pilot Plant April 1, 2011 - 12:00pm Addthis Media Contact Bill Taylor 513-246-0539 william.taylor@emcbc.doe.gov Cincinnati - The U.S. Department of Energy (DOE) issued a Draft Request for Proposal (RFP)seeking a management and operations contractor to maintain the Waste Isolation Pilot Plan (WIPP) and manage the DOE National Transuranic Waste (TRU) Program in Carlsbad, New Mexico. The estimated value of the anticipated contract is from $130 to $160 million per year, for five years, with an option to extend the contract for an additional five years. DOE anticipates awarding a competitive, cost-plusaward-fee

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Request Photos from 2011 Secretarial Honor Awards Program | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request Photos from 2011 Secretarial Honor Awards Program Request Photos from 2011 Secretarial Honor Awards Program Request Photos from 2011 Secretarial Honor Awards Program To facilitate the distribution of photographs from the 2011 Secretarial Honor Awards Program, held in the Forrestal Building, Washington, D.C. on October 27, 2011, posted here are 1) proof sheets of the photos taken (the proofs are split into two files to facilitate downloading), and 2) an order form to request which images you want to receive, what format you want them (electronic and/or prints), and quantity. Please review the proof sheets for the photos you want, fill in the form (the form is an Acrobat file and is savable from both the free Acrobat Reader as well as a web browser). If you are interested in obtaining files or prints of the photographs

402

Comments of Southern Company Services, Inc. on DOE Request for  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments of Southern Company Services, Inc. on DOE Request for Comments of Southern Company Services, Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Southern Company Services, Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Southern Company Services, Inc., for itself and on behalf of Alabama Power Company, Georgia Power Company, Gulf Power Company, Mississippi Power Company, and its other affiliates (collectively, "Southern"), is pleased to have this opportunity to provide responses to questions contained in the Department of Energy ("DOE") Request for Information

403

SMART GRID Request for Information And Public Comments | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SMART GRID Request for Information And Public Comments SMART GRID Request for Information And Public Comments SMART GRID Request for Information And Public Comments July 20, 2011 - 2:46pm Addthis As part of its ongoing effort regarding the formation of smart grid policy, the Department of Energy issued a Request for Information in September of 2010 on the topic of "Addressing Policy and Logistical Challenges to Smart Grid Implementation." The purpose was to solicit comments from interested stakeholders on policy and logistical challenges that confront smart grid implementation, and recommendations on how to best overcome those challenges. The comments and recommendations will help inform the Department and the Administration's analysis of policy challenges and possible solutions being developed by the Smart Grid Subcommittee of the National Science and

404

Energy Department Requests Proposals for Advanced Scientific Computing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requests Proposals for Advanced Scientific Requests Proposals for Advanced Scientific Computing Research Energy Department Requests Proposals for Advanced Scientific Computing Research December 27, 2005 - 4:55pm Addthis WASHINGTON, DC - The Department of Energy's Office of Science and the National Nuclear Security Administration (NNSA) have issued a joint Request for Proposals for advanced scientific computing research. DOE expects to fund $67 million annually for three years to five years under its Scientific Discovery through Advanced Computing (SciDAC) research program. Scientific computing, including modeling and simulation, has become crucial for research problems that are insoluble by traditional theoretical and experimental approaches, hazardous to study in the laboratory, or time-consuming or expensive to solve by traditional means.

405

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy. Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, epdg_13501_13750.pdf Mr. BARTON. Right.1639 Mr. GARMAN. You know, it varies widely. I can give you 1640 a very kind of gross median savings. 1641 Mr. BARTON. Well, my understanding is the industry 1642 estimates that the cost of an air conditioner"will increase 1643 by $407, 16.9 percent increase at 12 SEER, and $712 or a 29.5 1644 percent increase at a 13 SEER. So the difference is nearly 1645 double between the 12 and 13, just in the cost of the air 1646 conditioner. Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy Electricity Advisory Committee Meeting, December 11, 2008: Meeting

406

Re: DOE Request for Information - Implementing the National Broadband  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Request for Information - Implementing the National DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy Re: DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy The Edison Electric Institute ("EEI"), on behalf of its member companies, hereby submits the following comments in response to the Request for Information ("RFI") by the Department of Energy ("Department" or "DOE") regarding the current and future communications requirements of utilities, including, but not limited to, the requirements of the Smart Grid in an effort to implement certain recommendations of the National Broadband Plan.

407

Department of Energy Issues Draft Request for Proposals for Argonne  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Draft Request for Proposals for Argonne Draft Request for Proposals for Argonne National Laboratory Contractor Department of Energy Issues Draft Request for Proposals for Argonne National Laboratory Contractor January 3, 2006 - 9:06am Addthis WASHINGTON, DC -- The Department of Energy (DOE) is seeking comments on a draft Request for Proposals (RFP) for the competitive selection of a management and operating (M&O) contractor for Argonne National Laboratory (ANL), a major DOE Office of Science research facility located near Chicago, Ill. This competition for a laboratory contractor is the first in the history of the lab. ANL is a multiprogram laboratory, funded at approximately $492 million annually by the Office of Science (SC), other DOE programs, as well as other government agencies and private industry. Argonne was chartered in

408

Response to several FOIA requests - Renewable Energy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, Financing and Technical Assistance for Energy Efficiency Investments in Federal, State, and Other Public Buildings.Background There remains a very large potential for cost-effective eergy savings in federal, state, and local government buildings. While some progress has been made through the Federal Energy Management Program (FEMP), the federal government still spends nearly S4 billion to heat, cool, light, and power its roughly 500,000 buildings. The Federal government together with state and local governments spend more than $8 billion per year on energy in public buildings, with K-12 schools responsible for additional S6 billion in

409

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. National Energy Policy Legislation - A Comprehensive Approach to Ensuring Energy Security March 2001,Summary: A confluence of even s involving rising prices and supply shortages in several energy sectors has focused public and political attention on the need to update the nation's energy policy and to provide for increased production of domestic energy sources. President George W. Bush made this central point in his campaign platform on energy issues and hasdesignated an Administration team under the leadership of Vice President Cheney to develop specific recommendations in this regard. House and Senate

410

How to Respond to data Requests in Portfolio Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

"How To" Series How to Respond to Data Requests in Portfolio Manager ® EPA's ENERGY STAR Portfolio Manager tool helps you measure and track the energy use, water use, and greenhouse gas emissions of your properties, all in a secure online environment. You can use the results to identify under-performing buildings, set investment priorities, verify efficiency improvements, and receive EPA recognition for superior energy performance. Portfolio Manager provides the ability for organizations wishing to collect data from a variety of individuals to develop and use a custom Data Request within Portfolio Manager. You may receive Data Requests from other users or organizations to provide property or portfolio data as part of a program or initiative. Each request includes a

411

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy,.Summary of Important Terms PETROLEUM PRICES Refiner acquisition cost of crude oil (RAC): The average monthly cost of crude oil to U.S. refiners, including transportation and fees. The composite cost is the weighted average of domestic and imported crude oil costs. Typically, the imported RAC is about $1.50 per barrel below the monthly average spot price of West Texas Intermediate (WTI) crude oil and is within about $0.20 per barrel of the average monthly spot price of Brent crude oil. Unless otherwise stated, the imported RAC is what is referred to in this report as the 'world oil price" or "average crude oil price." 24701

412

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Foothills Pipe Lines Ltd. On January 14, 1992, Mr. Michael J. Bayer, the U.S. Federal Inspector for the Alaska Natural Gas Transportation System ("ANGTS") sent President Bush a report which essentially recommends that the United States abandon its support for the completion of the project. Among other things, Mr. Bayer recommends (1) the repeal of the Alaska Natural Gas Transportation.Act ("ANGTA"), which limits the ability of U.S. regulatory and agencies to interfere with the construction of the ANGTS; (2) termination of longstanding agreements with Canada relating to the project;

413

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

414

REQUEST BY DETROIT DIESEL CORPORATION, FOR AN ADVANCE WAIVER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NO. DE-FC05-00OR22805; DOE WAIVER DOCKET W(A)-01-012 ORO-764 Petitioner, Detroit Diesel Corporation, has made a timely request for an advance waiver to worldwide rights in...

415

STATEMENT OF CONSIDERATIONS REQUEST BY AMERICAN WATER WORKS ASSOCIATIO...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 16:45 FR IPL DOE CH 630 252 2779 TO FlGCP-HQ P.0204 Jg * STATEMENT OF CONSIDERATIONS REQUEST BY AMERICAN WATER WORKS ASSOCIATION RESEARCH FOUNDATION (AWWARF) FOR AN ADVANCED...

416

STATEMENT OF CONSIDERATIONS 'REQUEST BY GENERAL ELECTRIC POWER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

'REQUEST BY GENERAL ELECTRIC POWER SYSTEMS, FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE. COOPERATIVE AGREEMENT NO. DE-FC26-03NT41448; W(A)-03-043,...

417

Solar Decathlon 2013 Request for Proposals Amendment No. 1  

NLE Websites -- All DOE Office Websites (Extended Search)

No. 1 Issue Date: October 10, 2011 This Amendment No. 1 to the Solar Decathlon 2013 Request for Proposals is issued to: 1) Provide an update to the anticipated Site...

418

STATEMENT OF CONSIDERATIONS REQUEST BY HYBRID POWER GENERATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE CH 630 252 2779 TO AGCP-HQ P.0203 * * STATEMENT OF CONSIDERATIONS REQUEST BY HYBRID POWER GENERATION SYSTEMS, LLC FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE...

419

Microsoft PowerPoint - Congressional Request Cover pages FY 2014  

NLE Websites -- All DOE Office Websites (Extended Search)

7 Volume 4 Department of Energy FY 2014 Congressional Budget Request Science Science Advanced Research Projects Agency Energy (ARPA E) Agency - Energy (ARPA-E) April 2013 Office of...

420

Highlights of the FY 2013 Congressional Budget Request for OE  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Electricity Delivery and Energy Reliability's FY 2013 budget request continues the commitment to modernizing the nation's electric grid to meet America's energy needs by improving the...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

STATEMENT OF CONSIDERATIONS REQUEST BY THE DOW CHEMICAL COMPANY...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE CH 630 252 2779 TO AGCP-HQ P.0204 STATEMENT OF CONSIDERATIONS REQUEST BY THE DOW CHEMICAL COMPANY FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS UNDER DOE...

422

STATEMENT OF CONSIDERATIONS REQUEST BY EASTMAN CHEMICAL COMPANY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 STATEMENT OF CONSIDERATIONS REQUEST BY EASTMAN CHEMICAL COMPANY FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER COOPERATIVE AGREEMENT NO. DE-FC22-95PC93052...

423

Analysis of the President's FY 2013 Budget Request  

E-Print Network (OSTI)

for manufacturers. #12;8 www.Lewis-Burke.com Additionally, the budget request indicates that the Administration................................................................... 58 Advanced Manufacturing objectives of job creation, clean energy, education, manufacturing and infrastructure renewal. The White

424

STATEMENT OF CONSIDERATIONS REQUEST BY LUMILEDS LIGHTING, U.S...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

STATEMENT OF CONSIDERATIONS REQUEST BY LUMILEDS LIGHTING, U.S. FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-01NT41251;...

425

STATEMENT OF CONSIDERATIONS REQUEST BY ENERGY CONVERSION DEVICES...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CH 630 252 2779 TO AGCP-HQ P.0204 * * STATEMENT OF CONSIDERATIONS REQUEST BY ENERGY CONVERSION DEVICES, INC. FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER...

426

STATEMENT OF CONSIDERATIONS REQUEST BY EATON INNOVATION CENTER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to this waiver request. The objective of the grant is to develop and commercialize nano-coatings of AlMgB 14 and AlMgB 1 4 -TiB 2 , as degradation resistance materials...

427

Highlights of the FY 2011 Congressional Budget Request for OE  

Energy.gov (U.S. Department of Energy (DOE))

The FY 2011 Office of Electricity Delivery and Energy Reliability (OE) budget request is $185.9 million, $14.0 million more than the FY 2010 Appropriation, which reflects increased investments in...

428

STATEMENT OF CONSIDERATIONS REQUEST BY NUVERA FUEL CELLS, INC...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE CH 630 252 2779 TO RGCP-HQ P.0203 * * STATEMENT OF CONSIDERATIONS REQUEST BY NUVERA FUEL CELLS, INC FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS UNDER DOE...

429

REQUEST BY THE GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Statement of Considerations REQUEST BY THE GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN RIGHTS IN SUBJECT INVENTIONS MADE IN THE COURSE OF OR UNDER PHASE...

430

STATEMENT OF CONSIDERATIONS REQUEST BY UNITED SOLAR SYSTEMS CORPORATIO...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UNDER DOE CONTRACT NO: DE-AC36-83CH10093; W(A)-95-004; CH-0848 The Petitioner, United Solar Systems Corporation, has requested a waiver of domestic and foreign patent rights...

431

STATEMENT OF CONSIDERATIONS REQUEST BY UNITED SOLAR SYSTEMS CORP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09; W(A)-99-014; CH-1007 The Petitioner, United Solar Systems Corp. (hereinafter "United Solar"), has requested a waiver of domestic and foreign patent rights for all subject...

432

STATEMENT OF CONSIDERATIONS REQUEST BY SHELL SOLAR INDUSTRIES...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CH-1345 As set out in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Shell Solar Industries LP (SSI) has requested an advance waiver of...

433

STATEMENT OF CONSIDERATIONS REQUEST BY SHELL SOLAR INDUSTRIES...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

As set out in the attached waiver petition and in subsequent discussions with DOE, Shell Solar Industries, LP (SSI) has requested an advance waiver of domestic and foreign patent...

434

STATEMENT OF CONSIDERATIONS REQUEST BY BP SOLAR INTERNATIONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CH-1112 As set out in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, BP Solar International, LLC (BP Solar) has requested an advance waiver of...

435

STATEMENT OF CONSIDERATIONS REQUEST BY SIEMENS SOLAR INDUSTRIES...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UNDER DOE CONTRACT NO. DE- AC36-83CH10093; W(A)-98-019; CH-0987 The Petitioner, Siemens Solar Industries (hereinafter "SSI"), has requested a waiver of domestic and foreign...

436

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate  

E-Print Network (OSTI)

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate Existing Consumer Behavioral research, evaluations and behavior change initiatives. The Northwest Energy Efficiency Alliance (NEEA interest groups and energy efficiency industry representatives that operate in the states of Idaho, Montana

437

STATEMENT OF CONSIDERATIONS REQUEST BY ATLANTA GAS LIGHT AND...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PLD-CHICAGO TEL:1 70 252 2779 P, 004 STATEMENT OF CONSIDERATIONS REQUEST BY ATLANTA GAS LIGHT AND ADSORBENT RESEARCH GROUP (AGLARG) FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN...

438

Response to several FOIA requests - Renewable Energy | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

& TECHNOLOGY AND JAMES DUDERSTADT UNDER SECY'S CONF. ROOM 11:45 AM (T) PRE-BRIEF FOR USEC MEETING. nepdg1200112250.pdf Response to several FOIA requests - Renewable Energy...

439

Request for Proposals for New or Upgraded Transmission Line Projects...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Proposals for New or Upgraded Transmission Line Projects Under Section 1222 of the Energy Policy Act of 2005: Federal Register Notice Volume 75, No. 111 - Jun 10, 2012...

440

Information Request, "THE REPORT TO THE PRESIDENT AND THE CONGRESS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AND THE CONGRESS BY THE SECRETARY OF ENERGY ON THE NEED FOR A SECOND REPOSITORY" Information Request, "THE REPORT TO THE PRESIDENT AND THE CONGRESS BY THE SECRETARY OF ENERGY...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

DOE Issues Request for Quotations for Depleted Uranium Hexafluoride  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Request for Quotations for Depleted Uranium Hexafluoride Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services DOE Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services December 12, 2012 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 bill.taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) today issued a Request for Quotation (RFQ) for engineering and operations technical services to support the Portsmouth Paducah Project Office and the oversight of operations of the Depleted Uranium Hexafluoride (DUF6) Conversion Project located in Paducah KY, and Portsmouth OH. The RFQ is for a Time-and-Materials Task Order for three years with two one-year option periods. The estimated contract value is approximately $15 - 20 million.

442

Comments on Request For Information regarding Reducing Regulatory Reform  

NLE Websites -- All DOE Office Websites (Extended Search)

Comments on Request For Information regarding Reducing Regulatory Comments on Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). Comments on Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). I have reviewed the Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). In the Department of Energy"s (DOE) attempt to meet its obligation to implement Executive Order 13563, ""Improving Regulation and Regulatory Review,"" issued by the President on January 18, 2011, I recommend DOE make a bold move to change

443

NETL: Gasification - Request Gasification Systems Information on a CD  

NLE Websites -- All DOE Office Websites (Extended Search)

Gasification Systems Gasification Systems Request Gasification Systems Information on a CD Please fill in the form below to receive the CDs of your choice. * Denotes required field Requestor Contact Information Requested By (Agency/Company): First Name: * Last Name: * Address: * PO Box: City: * State: * Zip: * Country: Email: * Phone: CD Request Select CD(s):* Gasification Systems Project Portfolio Gasification Technologies Training Course Special Instructions: Submit Request Reset Contacts Program Contact: Jenny Tennant (304) 285-4830 jenny.tennant@netl.doe.gov Close Contacts Disclaimer Disclaimer of Liability: This system is made available by an agency of the United States Government. Neither the United States Government, the Department of Energy, the National Energy Technology Laboratory, nor any of

444

DOE Issues Draft Request for Proposals for Hanford Site Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Draft Request for Proposals for Hanford Site Issues Draft Request for Proposals for Hanford Site Occupational Medical Services - Agency Solicits Input from Industry, Stakeholders, and Workforce DOE Issues Draft Request for Proposals for Hanford Site Occupational Medical Services - Agency Solicits Input from Industry, Stakeholders, and Workforce July 19, 2011 - 12:00pm Addthis Media Contact Geoff Tyree, DOE Geoffrey.Tyree@rl..doe.gov 509-376-4171 The Department of Energy today issued a Draft Request for Proposals (RFP) for an Occupational Medical Services acquisition at the Hanford Site in southeastern Washington State. The Draft RFP is one step in the process toward awarding a contract and provides an opportunity for companies, Hanford stakeholders, and the site's workforce to provide input on the Draft RFP. DOE will provide

445

Re: DOE Request for Information - Implementing the National Broadband...  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy (Federal RegisterVol.75, No.90Tuesday May 11, 2010). Re: DOE Request...

446

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

447

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting  

E-Print Network (OSTI)

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting agency with information regarding tuition as unallowable must____________________________________________________________ Project Name __________________________________________________________________ Funding Agency

Taylor, Jerry

448

National Broadband Plan Request for Information: Communications Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Before the Before the Department of Energy Washington, D.C. 20585 In the Matter of National Broadband Plan Request for Information: Communications Requirements To: The Office of General Counsel COMMENTS OF THE AMERICAN PUBLIC POWER ASSOCIATION The American Public Power Association ("APPA") appreciates this opportunity to respond to the Department of Energy ("the Department" or "DOE") regarding its Request for Information ("RFI") on Implementing the National Broadband Plan by Studying the

449

FY 2013 Environmental Management Budget Request to Congress  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 DOE/CF-0075 Volume 5 Environmental Management Department of Energy FY 2013 Congressional Budget Request February 2012 Office of Chief Financial Officer Volume 5 DOE/CF-0075 Volume 5 Environmental Management Printed with soy ink on recycled paper Department of Energy FY 2013 Congressional Budget Request Environmental Management Page 1 FY 2013 Congressional Budget Volume 5 Table of Contents Page Appropriation Account Summary ............................................................................................................................................ 3 Appropriation Language .......................................................................................................................................................... 5

450

Congressional House Senate Omnibus Request Marks Marks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 FY 2009 ($ in thousands) Congressional House Senate Omnibus Request Marks Marks 3/11/2009 FOSSIL ENERGY R&D Coal 623,732 681,600 644,432 692,410 Natural Gas Technologies 0 25,000 20,000 20,000 Petroleum - Oil Technology 0 3,000 5,000 5,000 Oil and Gas Security 0 0 0 0 Program Direction 126,252 126,252 152,804 152,000 Plant & Capital Equipment 5,000 5,000 17,748 18,000 Environmental Restoration 9,700 9,700 9,700 9,700 Cooperative Res. & Development 0 0 5,000 5,000 Congressional Directed Priorities 0 14,080 32,700 43,864 Special Recruitment Program 656 656 656 656 Subtotal 765,340 865,288 888,040 946,630 Use of prior year balances -11,310 -11,310 -11,310 -70,310 TOTAL FOSSIL ENERGY R&D 754,030 853,978 876,730 876,320 CLEAN COAL TECHNOLOGY*** 0 0 0 0 ULTRA-DEEPWATER AND UNCOVENTIONAL NATURAL

451

Demand or Request: Will Load Behave?  

Science Conference Proceedings (OSTI)

Power planning engineers are trained to design an electric system that satisfies predicted electrical demand under stringent conditions of availability and power quality. Like responsible custodians, we plan for the provision of electrical sustenance and shelter to those in whose care regulators have given us the responsibility to serve. Though most customers accept this nurturing gladly, a growing number are concerned with the economic costs and environmental impacts of service at a time when technology (particularly distributed generation, storage, automation, and information networks) offers alternatives for localized control and competitive service. As customers’ and their systems mature, a new relationship with the electricity provider is emerging. Demand response is perhaps the first unsteady step where the customer participates as a partner in system operations. This paper explores issues system planners need to consider as demand response matures to significant levels beyond direct load control and toward a situation where service is requested and bargains are reached with the electricity provider based on desired load behavior. On one hand, predicting load growth and behavior appears more daunting than ever. On the other, for the first time load becomes a new resource whose behavior can be influenced during system operations to balance system conditions.

Widergren, Steven E.

2009-07-30T23:59:59.000Z

452

Primary Piping Static Test Design Request  

SciTech Connect

It is requested that a design be initiated for the primary piping static test. This test is necessary to provide information as to the reliability of the pipe subjected to reactor operating conditions. The test conditions are as follows: temperature - 2000 F (isothermal), pressure effective - 42 psi, and test time - 10,000 hours. It will be necessary to test two sizes of pipe as shown on the preliminary piping layout (2.250-inch O.D. x .095-inch wall and 3 1/2 SCH. 10 pipe). The test specimens shall be jacketed in an inconel containment vessel. The test rig should be similar to the design of the 4-inch pressure vessels (T-1030244). In addition an outer containment vessel constructed of stainless steel must be provided around the clam shell heaters and the inconel containment vessel. This is to provide an inert atmosphere for the inconel vessel. Provisions should be made in the design for a 1/4-inch clad thermocouple. It is planned to use the pipe test as a vehicle for studying experimental Tc's (Cb-Mo and W-W.26% Re).

O' Brien, R.W.

1961-11-30T23:59:59.000Z

453

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks  

E-Print Network (OSTI)

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Padmavathi, Dr G

2009-01-01T23:59:59.000Z

454

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)  

E-Print Network (OSTI)

Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

CERN. Geneva

2012-01-01T23:59:59.000Z

455

Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.  

SciTech Connect

ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ã?Â?Ã?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

D.R. Coyle; D.C. Booth: M.S. Wallace

2005-12-01T23:59:59.000Z

456

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

457

The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis  

SciTech Connect

This paper develops a bottom-up approach that focuses on behavioral responses in estimating the total economic impacts of the September 11, 2001, World Trade Center (WTC) attacks. The estimation includes several new features. First, is the collection of data on the relocation of firms displaced by the attack, the major source of resilience in muting the direct impacts of the event. Second, is a new estimate of the major source of impacts off-site -- the ensuing decline of air travel and related tourism in the U.S. due to the social amplification of the fear of terrorism. Third, the estimation is performed for the first time using Computable General Equilibrium (CGE) analysis, including a new approach to reflecting the direct effects of external shocks. This modeling framework has many advantages in this application, such as the ability to include behavioral responses of individual businesses and households, to incorporate features of inherent and adaptive resilience at the level of the individual decision maker and the market, and to gauge quantity and price interaction effects across sectors of the regional and national economies. We find that the total business interruption losses from the WTC attacks on the U.S. economy were only slightly over $100 billion, or less than 1.0% of Gross Domestic Product. The impacts were only a loss of $14 billion of Gross Regional Product for the New York Metropolitan Area.

Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois; Asay, Gary [University of Southern California

2009-01-01T23:59:59.000Z

458

FY 2012 Budget Request to Congress (Volume 3) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request to Congress (Volume 3) Request to Congress (Volume 3) FY 2012 Budget Request to Congress (Volume 3) The Department of Energy's FY 2012 Congressional budget request makes strategic investments to unleash American innovation and promote economic competitiveness. The entire budget request is divided into seven volumes. Volume 3 includes: Energy Efficiency and Renewable Energy Electricity Delivery and Energy Reliability Energy Transformation Acceleration Fund Fossil Energy Research and Development Naval Petroleum and Oil Shale Reserves Strategic Petroleum Reserve Northeast Home Heating Oil Reserve Ultra-Deepwater Unconventional Natural Gas FY 2012 Congressional Budget Request for DOE (Volume3).pdf More Documents & Publications Fiscal Year 2012 Congressional Budget Fiscal Year 2011 Congressional Budget

459

Protecting Buildings From a Biological or Chemical Attack: actions to take  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

460

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network (OSTI)

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune,  

E-Print Network (OSTI)

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune 55455 {pwang,tyra,dchantin,malchow,foo,hopper,kyd}@cs.umn.edu ABSTRACT The Kad network

Kim, Dae-Shik

462

Fossil Energy Fiscal Year 2012 Budget Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fiscal Year 2012 Budget Request Fiscal Year 2012 Budget Request Fossil Energy Fiscal Year 2012 Budget Request March 30, 2011 - 2:40pm Addthis Statement of Dr. Victor Der, Acting Assistant Secretary for Fossil Energy before the House Committee on Appropriations Subcommittee on Energy and Water Development. Mr. Chairman, Members of the Committee, it is my pleasure to appear before you today to present the Office of Fossil Energy's (FE) proposed Budget for Fiscal Year 2012. The Office of Fossil Energy's primary objective is to ensure that we can continue to utilize our traditional fuel sources for clean, affordable, reliable energy. Fossil fuels currently provide 83 percent of U.S. energy consumption and are expected to continue to play a critical role in meeting our Nation's energy needs for the foreseeable future. Making use of these

463

Requests by Political Candidates to Tour DOE Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REQUESTS BY POLITICAL CANDIDATES TO TOUR DOE FACILITIES REQUESTS BY POLITICAL CANDIDATES TO TOUR DOE FACILITIES * Requests by political candidates to tour DOE facilities are subject to the provisions of the Hatch Act; the statute regulating the political activity of Federal employees. Any proposed site visit by a candidate MUST go through legal review before it can go forward. DOE employees authorizing prohibited political activities by candidates in DOE facilities or on DOE property are subject to penalties under the Hatch act. * DOE employees may not engage in political activity: (1) while on duty; (2) while on Federal property or in a room or building engaged for the purpose of conducting official duties; (3) while wearing a uniform or other item identifying the employee as a Federal employee; or (4) while using a government vehicle. Federal employees may not engage

464

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy. Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. National Energy StrategyBackground Paper - 2001, Natural Gas, In the 1988 Energy Council National Energy Strategy background paper, the role of natural gaswas characterized as a transition fuel, a bridge to a cleaner fuel future. Over the intervening decade, the growth of the importance of natural gas has been dramatic and it now appears that the "transition fuel" may have a role of its own for a long time to come. The inherent efficiency of gas, its environmental advantages and the removal of regulatory constraints are all important factors in its success. The U.S. is the world's largest gas producer, nepdg_3001_3250.pdf Response to several FOIA requests - Renewable Energy.

465

Energy Department Requests Proposals for Advanced Scientific Computing  

Office of Science (SC) Website

Energy Energy Department Requests Proposals for Advanced Scientific Computing Research News Featured Articles Science Headlines 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 12.27.05 Energy Department Requests Proposals for Advanced Scientific Computing Research Print Text Size: A A A Subscribe FeedbackShare Page WASHINGTON, DC - The Department of Energy's Office of Science and the National Nuclear Security Administration (NNSA) have issued a joint Request for Proposals for advanced scientific computing research. DOE expects to fund $67 million annually for three years to five years under its Scientific Discovery through Advanced Computing (SciDAC) research program.'

466

Preliminary Comments on Compliance Plan and Request for Clarification or,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments on Compliance Plan and Request for Comments on Compliance Plan and Request for Clarification or, in the Alternative, Rehearing of the District of Columbia Public Service Commission Preliminary Comments on Compliance Plan and Request for Clarification or, in the Alternative, Rehearing of the District of Columbia Public Service Commission Docket No. EO-05-01: Pursuant to Order No. 202-05-3, issued by the Department of Energy ("DOE") in the above-captioned docket on December 20, 2005 ("December 20 Order"), and Section 313 of the Federal Power Act ("FPA"), 16 U.S.C. § 8251, the District of Columbia Public Service Commission ("DCPSC") hereby submits its preliminary comments on the compliance plan ("Compliance Plan") proposed by MiranT Potomac River,

467

Request for Information Renewable Energy Generation/Production Shreveport  

Open Energy Info (EERE)

Request for Information Renewable Energy Generation/Production Shreveport Request for Information Renewable Energy Generation/Production Shreveport Airport Authority - Response Deadline 2 January 2014 Home > Groups > Renewable Energy RFPs Rosborne318's picture Submitted by Rosborne318(5) Member 2 December, 2013 - 11:06 pv land use Solar solar land use Solar Power The Shreveport Airport Authority intends to issue a Request for Proposal (RFP) at some future time for renewable energy generation opportunities on Shreveport Airport property. The Authority is particularly interested in solar photovoltaic generation but other technically and economically feasible technologies may also be included. A study by NREL estimates the annual capacity factor of fixed tilt covered parking at 15.3% and for one-axis tracking at 19.4%. Specifically, the

468

ABSTRACT REQUESTER CONTRACT SCOPE OF WORK RATIONAL FOR DECISION DISPOSITION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WAIVER ACTION - WAIVER ACTION - ABSTRACT REQUESTER CONTRACT SCOPE OF WORK RATIONAL FOR DECISION DISPOSITION General Motors Conduct research, development and Cost Sharing 20 percent Recommended Corporation testing of 30 KW proton-exchange- membrane (PEM) fuel cell propulsion systems 0 STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL MOTORS CORPORATION FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN RIGHTS UNDER CONTRACT NO. DE-AC02-90CH10435, W(A)-90- 056, CH-0663 The Allison Gas Turbine Division of the General Motors Corporation (hereafter GM), a large business, has petitioned for an advance waiver of patent rights under DOE Contract No. DE-AC02- 90CH10435. The contract, yet to be definitized, resulted from an RFP issued in January 1990. As set out in the attached waiver petition, GM has requested that domestic and foreign title to

469

Request for Personnel Actions (For Managers and Adminstrative Officers) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Personnel Actions (For Managers and Adminstrative Request for Personnel Actions (For Managers and Adminstrative Officers) Request for Personnel Actions (For Managers and Adminstrative Officers) Headqaurters uses the CHRIS Workflow Tool to submit and process Personnel Actions. There is no longer a need for a hard copy Standard Form-52 (SF-52). Each personnel action is approved via CHRIS workflow and is the official SF-52. All actions must be in the Human Resource office (Personnel Inbox - Step 8) for processing by the Friday before the effective date of the action. All supporting documentation must be attached or this will delay the process, causing the Human Resources Office to change the effective date to the next pay period. The manager or administrative officer must initiate the action in workflow along with assigning approving officials (the same approving

470

STATEMENT OF CONSIDERATIONS REQUEST BY SIEMENS WESTINGHOUSE POWER CORPORATION (SWPC)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

S* * S* * STATEMENT OF CONSIDERATIONS REQUEST BY SIEMENS WESTINGHOUSE POWER CORPORATION (SWPC) FOR AN ADVANCED WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS UNDER CONTRACT NO. DE-FC02-00CH11048, CH-1053, W(A)-01-006 The Petitioner, Siemens Westinghouse Power Corporation (SWPC), has requested a waiver of domestic and foreign patent rights for all subject inventions under DOE Contract No. DE-FC02-00CH11048, "Research and Development for Advanced Materials in Advanced Industrial Gas Turbines". In order to avoid fragmenting the technology, and thus adversely affect its assimilation and commercial development, as well as to enable SWPC to meet its cost sharing commitment, SWPC has requested that the waiver extend to both its own employees and those of its subcontractors, except subcontractors eligible to retain title to inventions

471

Re: National Broadband Plan (NBP) Request for Information: Data Access |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Broadband Plan (NBP) Request for Information: Data National Broadband Plan (NBP) Request for Information: Data Access Re: National Broadband Plan (NBP) Request for Information: Data Access Whirlpool Corporation is honored to have been chosen as a recipient of a U.S. Department of Energy's (DOE) Smart Grid Investment Grant program grant of $19.3 million over a two year period - which the company will match with its own investments. Whirlpool Corporation recently announced that in 2011 it would deliver one million U.S. manufactured smart dryers capable of reacting intelligently to signals from the smart grid by modifying their energy consumption to save consumers money on their home electric bills. In addition, the funds will complement the company's commitment that by 2015 all of the electronically controlled appliances it produces - everywhere in

472

Fossil Energy Fiscal Year 2011 Budget Request | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Fiscal Year 2011 Budget Request Energy Fiscal Year 2011 Budget Request Fossil Energy Fiscal Year 2011 Budget Request March 17, 2010 - 1:12pm Addthis Mr. Chairman, Members of the Committee, it is my pleasure to appear before you today to present the Office of Fossil Energy's (FE) proposed Budget for Fiscal Year 2011 (FY 2011). The Office of Fossil Energy's primary objective is to ensure that we can continue to utilize our traditional fuel sources for clean, affordable, reliable energy. Fossil fuels are anticipated to play a critical role in meeting our Nation's future energy needs. Making use of the Nation's fossil fuel assets in an environmentally responsible manner will help the United States to meet its energy requirements, minimize detrimental environmental impacts, positively contribute to energy security and compete

473

Request for Comments on the Electric Grid Integration Technical Workshops  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Comments on the Electric Grid Integration Technical for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Request for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Notice is hereby given that two documents are publicly available and the Department of Energy is requesting public comments. The documents are the Electricity Distribution System Workshop Discussion Summary and the Electricity Transmission System Workshop Discussion Summary. Written comments are to be received no later than March 25, 2013. For details on how to submit comments, please view the Federal Register Notice, below. Request for Comments on the Electric Grid Integration Technical Workshops

474

FOIA Requests Recvd Since 12-31-2008.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA Requests Received by DOE Savannah River Site FOIA Requests Received by DOE Savannah River Site Since December 31, 2008 FOIA Request Number Date Received Estimated Completion Date Page 1 of 11 SR-08-036 11/18/2008 Closed on 1/20/2009 SR-09-001 1/13/2009 Closed on 1/27/2009 SR-09-002 1/20/2009 Closed on 3/25/2009 SR-09-003 1/20/2009 Closed on 2/2/2009 SR-09-004 2/2/2009 Closed on 2/13/2009 SR-09-005 2/9/2009 Closed on 3/4/2009 SR-09-006 2/10/2009 Closed on 3/30/2009

475

Smart Grid Request for Information and Public Comments | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Smart Grid » Smart Grid Smart Grid » Smart Grid Request for Information and Public Comments Smart Grid Request for Information and Public Comments As part of its ongoing effort regarding the formation of smart grid policy, the Department of Energy issued a Request for Information in September of 2010 on the topic of "Addressing Policy and Logistical Challenges to Smart Grid Implementation." The purpose was to solicit comments from interested stakeholders on policy and logistical challenges that confront smart grid implementation, and recommendations on how to best overcome those challenges. The comments and recommendations will help inform the Department and the Administration's analysis of policy challenges and possible solutions being developed by the Smart Grid Subcommittee of the National Science and

476

Comments of Verizon and Verizon Wireless on DOE Request for  

NLE Websites -- All DOE Office Websites (Extended Search)

Wireless on DOE Request for Wireless on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Verizon and Verizon Wireless on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy The development and deployment of smart grid technology hold tremendous promise towards improving the efficiency and reliability of our nation's energy systems and empowering consumers to make better decisions about the use of electricity. Because effective communications networks will be central to the success of smart grid technology, Verizon is working closely with utilities, the developers of energy management systems, and others to

477

How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Submit a Privacy Act Request How to Submit a Privacy Act Request Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Privacy Act Request Form .pdf file (99KB) Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act How to Submit a Privacy Act Request Print Text Size: A A A RSS Feeds FeedbackShare Page Related Links Privacy Act Request Form .pdf file (99KB) You may request your own Privacy Act records by submitting a request in

478

GE to DOE General Counsel; Re:Request for Comment on Large Capacity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE General Counsel; Re:Request for Comment on Large Capacity Clothes Washers Alliance Laundry Systems to DOE General Counsel; Re:Request for Comment on Large Capacity Clothes...

479

Electrolux to DOE General Counsel; Re:Request for Comment on...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE General Counsel; Re:Request for Comment on Large Capacity Clothes Washers Alliance Laundry Systems to DOE General Counsel; Re:Request for Comment on Large Capacity Clothes...

480

LG to DOE General Counsel; Re:Request for Comment on Large Capacity...  

NLE Websites -- All DOE Office Websites (Extended Search)

LG to DOE General Counsel; Re:Request for Comment on Large Capacity Clothes Washers LG to DOE General Counsel; Re:Request for Comment on Large Capacity Clothes Washers LG response...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Response to several FOIA requests - Renewable Energy.U.S. Natural...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Natural Gas Production by Source, 1970-2020 Response to several FOIA requests - Renewable Energy.U.S. Natural Gas Production by Source, 1970-2020 Response to several FOIA requests...

482

Microsoft PowerPoint - Congressional Request Cover pages FY 2014  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Volume 4 Department of Energy FY 2014 Congressional Budget Request Science Science Advanced Research Projects Agency Energy (ARPA E) Agency - Energy (ARPA-E) April 2013 Office of Chief Financial Officer Volume 4 DOE/CF-0087 Volume 4 Department of Energy FY 2014 Congressional Budget Request Science Science Advanced Research Projects Agency Energy (ARPA E) Agency - Energy (ARPA-E) April 2013 Office of Chief Financial Officer Volume 4 Science Advanced Research Projects Agency- Energy Science Advanced Research Projects Agency- Energy Volume 4 Table of Contents Section Appropriation Account Summary .......................................................................................................... AP Science .................................................................................................................................................... SC

483

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

nepdg_15251_15616.pdf. nepdg_15251_15616.pdf. Undated draft document entitled "Corporate Average Fuel Economy (CAFE) Standards." B-5 Exemption - Information withheld consists of pre-decisional position paper containing proposed recommendations, views, discussion, or factual background pertaining to the drafting of the NEP. 2 pages. #13553-13554 Withheld 2489. Undated draft document entitled "Energy Efficiency." B-5 Exemption - Information withheld consists of pre-decisional position paper containing proposed recommendations. views, discussion, or factual background pertaining to the drafting of the NEP. 2 pages. #13555-13556 Withheld. Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy.

484

HPC Code Center Request Form | Computatioinal Scince Center, Brookhaven  

NLE Websites -- All DOE Office Websites (Extended Search)

HPC Code Center Request Form HPC Code Center Request Form All fields are required unless marked as optional. Full Name Institution/Company Email Address Telephone Number Department * Basic Energy Sciences Directorate (DC) Bioscience Department (BO) Business Development & Analysis Office (BU) Business Operations (DI) CEGPA Directorate (DK) Center for Functional Nanomaterials (NC) Chemistry Department (CO) Collider Accelerator Department (AD) Community, Education, Government and Public Affairs (PA) Computational Science Center (CC) Condensed Matter Physics and Materials Science Department (PM) Counterintelligence (CI) Department of Energy (AE) Deputy Director for Operations Directorate (DE) Director's Office Directorate (DO) Diversity Office (DV) Energy & Utilities Division (EU) Environment, Safety and Health

485

Response to several FOIA requests - Renewable Energy. | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Document entitled Document entitled "Develop "Frontier" Resources to Ensure Future Oil and Natural Gas Supply," dated March 8, 2001. B-5 Exemption - Information withheld (under Exemption 5) consists of deliberative material reflecting comments, recommendations and revisions of draft documents relating to NEPDG. 2 pages. #4139-4140 Withheld 344. Document entitled "The Northeast Home Heating Oil Reserve," dated March 7, 2001. B-5 Exemption - Information withheld (under Exemption 5) consists of deliberative material reflecting comments, recommendations and revisions of draft documents relating to NEPDG. 2 pages. #4141-4142 nepdg_15001_15250.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy.

486

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

487

Projected Benefits of Federal Energy Efficiency and Renewable Energy Programs - FY 2007 Budget Request (GPRA 2007)  

SciTech Connect

This document summarizes the results of the benefits analysis of EERE's programs, as described in the FY 2007 Budget Request.

Sheehan, J.

2006-03-01T23:59:59.000Z

488

Using GIS technology to manage information following a bio-terrorism attack.  

Science Conference Proceedings (OSTI)

The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

2005-05-01T23:59:59.000Z

489

REQUEST FOR INDIRECT COST WAIVER I. Project Director  

E-Print Network (OSTI)

REQUEST FOR INDIRECT COST WAIVER I. Project Director: Department: Project Title: Project Sponsor without fully recovering the institutional indirect costs which will be incurred in conducting the project COSTS 1. FULL: OF I. A. C. 2. PARTIAL: OF H. B. K. TOTAL PROJECT COSTS L. INDIRECT COSTS TO BE WAIVED, J

Krovi, Venkat

490

Matching customer requests to service offerings in real-time  

Science Conference Proceedings (OSTI)

Classic request-response Service-oriented architecture (SOA) has reached a level of maturity where SOA inspired extensions are enabling new and creative domains like the Internet of Things, real-time business or real-time Web. These new domains impose ... Keywords: SOA, complex event processing, mediation, nonfunctional properties, service selection

Marcel Tilly; Stephan Reiff-Marganiec

2011-03-01T23:59:59.000Z

491

SOLAR DECATHLON EUROPE 2014 IN FRANCE REQUEST FOR PROPOSAL 2014  

E-Print Network (OSTI)

SOLAR DECATHLON EUROPE 2014 IN FRANCE REQUEST FOR PROPOSAL 2014 #12;TABLE OF CONTENTS 1 and design) are invited to participate in the third edition of the Solar Decathlon Europe in 2014 in France ! The SDE (Solar Decathlon Europe) organization, the French Ministry of territorial Equality and Housing

Papadopoulos, Evangelos

492

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network (OSTI)

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

493

Dealer: application-aware request splitting for interactive cloud applications  

Science Conference Proceedings (OSTI)

Deploying interactive applications in the cloud is a challenge due to the high variability in performance of cloud services. In this paper, we present Dealer-- a system that helps geo-distributed, interactive and multi-tier applications meet their ... Keywords: cloud computing, geo-distribution, interactiv emulti-tier applications, performance variability, request redirection, service level agreement (SLA)

Mohammad Hajjat; Shankaranarayanan P. N; David Maltz; Sanjay Rao; Kunwadee Sripanidkulchai

2012-12-01T23:59:59.000Z

494

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

495

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

SciTech Connect

This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

2009-11-15T23:59:59.000Z

496

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

497

Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Electricity Delivery & Energy Reliability FY 2012 Budget Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Presentation by Patricia Hoffman of the Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request. OE's FY 2012 budget request represents a strong commitment to modernizing the grid and providing the reliable, affordable, and secure electric power needed to expand economic recovery enable sources Office of Electricity Delivery and Energy Reliability recovery, the transition to renewable energy sources, and achieve the President's clean energy goals. Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation More Documents & Publications

498

Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments  

DOE Green Energy (OSTI)

Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

1993-09-01T23:59:59.000Z

499

Highlights of the FY 2014 Congressional Budget Request for OE | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 Congressional Budget Request for OE 4 Congressional Budget Request for OE Highlights of the FY 2014 Congressional Budget Request for OE The Office of Electricity Delivery and Energy Reliability (OE) drives electric grid modernization and resiliency in the energy infrastructure through research and development, partnerships, facilitation, modeling and analysis, and emergency preparedness. The FY 2014 budget request represents an increased investment in the continued commitment to help keep America's energy flowing, promote economic prosperity, and move the nation closer to a cleaner and more secure energy future. Highlights of the FY 2014 Congressional Budget Request for OE More Documents & Publications FY 2014 OE Budget Request Presentation by Patricia Hoffman Highlights of the FY 2011 Congressional Budget Request for OE

500

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

NLE Websites -- All DOE Office Websites (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the