Powered by Deep Web Technologies
Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

2

V-221: WordPress A Forms Plugin Cross-Site Request Forgery and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

recommends updating to version 1.4.2 Addthis Related Articles U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks...

3

A Forgery Attack against PANDA-s Yu Sasaki and Lei Wang  

E-Print Network [OSTI]

A Forgery Attack against PANDA-s Yu Sasaki and Lei Wang NTT Secure Platform Laboratories, Japan claim that PANDA-s, which is one of the designs of the PANDA-family, provides 128-bit security is computed by Ci Pir. Finally, by taking the 7-block state value after the associated data #12

4

T-649: Red Hat Network Satellite Server Request Validation Flaw...  

Broader source: Energy.gov (indexed) [DOE]

49: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits...

5

U-151: Bugzilla Cross-Site Request Forgery Vulnerability  

Broader source: Energy.gov [DOE]

The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.

6

U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

7

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks  

Broader source: Energy.gov [DOE]

The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

8

Where Do All The Attacks Go? Dinei Flor^encio and Cormac Herley  

E-Print Network [OSTI]

. While it has not declined, exploits such as Cross-Site Request Forgery and keylogging Tro- jans have

Herley, Cormac

9

Image Forgery Detection Using Multi-Resolution Weber Local Descriptors  

E-Print Network [OSTI]

Image Forgery Detection Using Multi-Resolution Weber Local Descriptors Muhammad Hussain1 , Ghulam * ghulam@ksu.edu.sa Abstract-- In this paper, a multi-resolution Weber law descriptors (WLD) based image of the images. Keywords: image forgery detection, Weber local descriptor, splicing forgery, copy-move forgery

Bebis, George

10

FSAAWG, ROME 2011 1 Synthetic Voice Forgery in the Forensic Context: a  

E-Print Network [OSTI]

FSAAWG, ROME 2011 1 Synthetic Voice Forgery in the Forensic Context: a short tutorial Guillaume Paristech, dép. TSI 37-39 rue Dareau 75014 PARIS Abstract--Technical voice forgery in the forensic area has, the forensic context is quite different since the human ear might be able to detect a synthetic voice, thus

Paris-Sud XI, Université de

11

The So-Called Velasco Map: A Case of Forgery?  

E-Print Network [OSTI]

Coordinates Series A, No. 5 The So-Called ?Velasco Map?: A Case of Forgery? Persistent URL for citation: http://purl.oclc.org/coordinates/a5.pdf Date of Publication: 02/14/06 Revised: David Y. Allen David Y. Allen (e-mail: dyallen2@aol... and Southeastern Canada at the end of the first decade of the seventeenth century.[1] Page 2 Figure 1. The Velasco Map. Source: Stokes, Iconography of Manhattan Island. High resolution image available at http://www.she-philosopher.com/gallery/1610mapC1...

Allen, David Y.

2006-02-14T23:59:59.000Z

12

Commentary to "The So-Called Velasco Map: A Case of Forgery?"  

E-Print Network [OSTI]

?" (Coordinates, Series A, no. 5). Keywords: Don Alonzo de Velasco; exploration; forgeries; frauds; fakes; maps; cartography; seventeenth century; northeastern states; Canada Page 1 David Allen is careful not to condemn the ?Velasco Map?? said...

Seaver, Kirsten A.

2006-02-14T23:59:59.000Z

13

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian

14

V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered

15

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

16

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and

17

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting AttacksForgery, and

18

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

Against Data Injection Attacks on Power Grids, IEEER. Thomas, and L. Tong, Malicious Data Attacks on SmartState Estimation: Attack Strategies and Countermeasures,

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

19

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

Data Injection Attacks on Power Grids, IEEE Transactionson Smart Grid, vol. 2, no. 2, June [21] O. Kosut, L.Data Attacks on Smart Grid State Estimation: Attack

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

20

Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response  

E-Print Network [OSTI]

1 Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response Steven Noel of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways and attacker exploits provides an attack graph showing all possible paths to critical assets. We then place IDS

Noel, Steven

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources  

E-Print Network [OSTI]

Attack Diagnosis: Throttling Distributed Denial- of-Service Attacks Close to the Attack Sources Polytechnic Institute and State University Blacksburg, VA 24061 {rlchen, jungmin}@vt.edu Abstract-- Attack mitigation schemes actively throttle attack traffic generated in Distributed Denial-of-Service (DDoS) attacks

Park, Jung-Min

22

Quantum-Space Attacks  

E-Print Network [OSTI]

Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.

Ran Gelles; Tal Mor

2007-11-25T23:59:59.000Z

23

Improving Attack Graph Visualization through Data Reduction and Attack Grouping  

E-Print Network [OSTI]

Improving Attack Graph Visualization through Data Reduction and Attack Grouping John Homer1 Laboratory, USA Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often

Ou, Xinming "Simon"

24

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid, to appear in IEEE

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

25

Improving Attack Graph Visualization through Data Reduction and Attack Grouping  

SciTech Connect (OSTI)

Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

2008-09-01T23:59:59.000Z

26

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

27

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMUs are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

28

Sulfate attack expansion mechanisms  

SciTech Connect (OSTI)

A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (1050 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

Mllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

2013-10-15T23:59:59.000Z

29

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

30

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

31

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

32

Genetic attack on neural cryptography  

SciTech Connect (OSTI)

Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido [Institut fuer Theoretische Physik, Universitaet Wuerzburg, Am Hubland, 97074 Wuerzburg (Germany); Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900 (Israel)

2006-03-15T23:59:59.000Z

33

Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report Of

34

Request Number:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report Of6 FOIA

35

Request Number:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report Of6

36

ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire  

E-Print Network [OSTI]

ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire rev AA.01 2013/04/02 GUIDELINES which exceed the normal schedule by completing this Energy Exception Request and submitting it to the Office of Energy Management. Energy Management will prepare a cost analysis and return

Rock, Chris

37

Another Generalization of Wiener's Attack on RSA  

E-Print Network [OSTI]

Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

Nitaj, Abderrahmane

38

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

39

Requested Funding Categories  

E-Print Network [OSTI]

Requested Funding Categories: Department's Funding Priority Request (in the event partial funding is granted): Committee recommends the following funding: Wages for adjunct or part- time faculty or admin Factors: Has unit received previous internship grant funding? _______ ifso

Martinez, Tony R.

40

attack synthetic polymers: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

attacks draft resolution: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

42

armed attacks draft: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

43

HAN Attack Surface and the Open Smart Energy Gateway Project  

E-Print Network [OSTI]

HAN Attack Surface and the Open Smart Energy of California. HAN Attack Surface and the Open vulnerable to cyber attacks (i.e. hacking) and

Searle, Justin

2014-01-01T23:59:59.000Z

44

The Attack on Planned Parenthood: A Historical Analysis  

E-Print Network [OSTI]

Party Republicans' Latest Attack on Women's Health and Birthtea-party-republicans-latest-attack-womens-health- birth-ARTICLES THE ATTACK ON PLANNED PARENTHOOD: A HISTORICAL

Primrose, Sarah

2012-01-01T23:59:59.000Z

45

The Sybil Attack John R. Douceur  

E-Print Network [OSTI]

1 The Sybil Attack John R. Douceur Microsoft Research johndo@microsoft.com "One can have, some undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks

Keinan, Alon

46

The GHS Attack Revisited Computer Science Department,  

E-Print Network [OSTI]

The GHS Attack Revisited F. Hess Computer Science Department, Woodland Road, University of Bristol the number of elliptic curves which succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude

Hess, Florian

47

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

48

Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple  

E-Print Network [OSTI]

Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

Zincir-Heywood, Nur

49

Stealthy Deception Attacks on Water SCADA Systems  

E-Print Network [OSTI]

Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

Hu, Fei

50

The Zombie Attack on the Computational Conception of Mind  

E-Print Network [OSTI]

The Zombie Attack on the Computational Conception of Mind Selmer Bringsjord Department defense of the zombie attack against computationalism. Dennett, more than any other thinker, says, rigorous attack on computationalism -- the zombie attack. If this attack is sound, it will follow not only

Bringsjord, Selmer

51

Managing Attack Graph Complexity Through Visual Hierarchical Aggregation  

E-Print Network [OSTI]

Managing Attack Graph Complexity Through Visual Hierarchical Aggregation Steven Noel Center a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph

Noel, Steven

52

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

53

The GHS Attack in odd Characteristic Claus Diem  

E-Print Network [OSTI]

The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points

Diem, Claus

54

GARNET : a Graphical Attack graph and Reachability Network Evaluation Tool  

E-Print Network [OSTI]

Attack graphs are valuable tools in the assessment of network security, revealing potential attack paths an adversary could use to gain control of network assets. Creating an effective visualization for attack graphs is ...

Williams, Leevar (Leevar Christoff)

2008-01-01T23:59:59.000Z

55

Jaguar Attack on a Child: Case Report and Literature Review  

E-Print Network [OSTI]

Harlan G. Fatal Big Cat Attacks. Am J Forensic Med Pathol.Iserson et al. Jaguar Attack on a Child 18. Rabinowitz AR,SM, Mills A, Shoff WH. Human attacks by large 25. Bahram R,

Iserson, Kenneth V.; Francis, Adama M.

2015-01-01T23:59:59.000Z

56

Modeling Attacks on Physical Unclonable Functions Ulrich Rhrmair  

E-Print Network [OSTI]

against these problems, but they all rest on the concept of a secret binary key. Classical cryp- tography, semi-invasive, or side-channel attacks, as well as software attacks like API- attacks and viruses, can

57

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

SciTech Connect (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

58

A Scalable Framework for Cyber Attack Discovery and Situational...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

59

DISCOUNTED EVENT PERMIT REQUEST  

E-Print Network [OSTI]

DISCOUNTED EVENT PERMIT REQUEST Discounted daily parking rates are available for CSM events where or the daily scratch off permits: COMMUTER LOTS: $3.00 / day GENERAL LOTS: $4.00 / day Please e-mail or drop

60

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

PIA - Human Resources - Personal Information Change Request ...  

Office of Environmental Management (EM)

PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory PIA - Human Resources - Personal Information Change Request - Idaho National...

62

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC- SHA-1

Paris-Sud XI, Université de

63

Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices  

E-Print Network [OSTI]

Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices Steven Noel}@gmu.edu Abstract We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across

Noel, Steven

64

A Game Theoretic Approach to Cyber Attack Prediction  

SciTech Connect (OSTI)

The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

Peng Liu

2005-11-28T23:59:59.000Z

65

Towards Attack-Agnostic Defenses David Brumley and Dawn Song  

E-Print Network [OSTI]

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

Brumley, David

66

A Probabilistic Routing Disruption Attack on DSR and Its Analysis  

E-Print Network [OSTI]

A Probabilistic Routing Disruption Attack on DSR and Its Analysis ?zleyi Ocakolu, Burak Bayolu}@sabanciuniv.edu Abstract -- In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack

Levi, Albert

67

The GHS Attack in odd Characteristic March 24, 2003  

E-Print Network [OSTI]

The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points. In this article we give a generalization of the attack to degree 0 class groups of (hyper-)elliptic curves over

Diem, Claus

68

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network  

E-Print Network [OSTI]

BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

Dharmaraja, S.

69

Attack Containment Framework for Large-Scale Critical Infrastructures  

E-Print Network [OSTI]

Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

Nahrstedt, Klara

70

Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses  

E-Print Network [OSTI]

Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data

71

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy Savers [EERE]

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information...

72

SWS Variance Request  

Broader source: Energy.gov [DOE]

As Grantees update and revise their field standards to align with the SWS, they may discover certain specifications that cannot be implemented precisely as described in the relevant SWS. In such cases, Grantees may request a variance from the relevant SWS.

73

PROGRESS REPORT CONTINUATION REQUEST  

E-Print Network [OSTI]

PROGRESS REPORT and CONTINUATION REQUEST SUBMITTED TO THE U.S. DEPARTMENT OF ENERGY BY Prof (year 2): $135,000 Unexpended Balance from Previous Year: $0 #12;2 Abstract of FY 2005 Research City. Prof. Odile Eisenstein and Dr. Eric Clot at the University of Montpellier, France Overview

Jones, William D.

74

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

75

How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack  

E-Print Network [OSTI]

adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

Duan, Yitao; Canny, J

2006-01-01T23:59:59.000Z

76

The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General  

E-Print Network [OSTI]

emphasis added). Procedural Attack on Civil Rights contraryat 1 (1976). Procedural Attack on Civil Rights plaintiffs357, 367 & Procedural Attack on Civil Rights fee recovery

Albiston, Catherine R.; Nielsen, Laura Beth

2006-01-01T23:59:59.000Z

77

Predicting the effect of climate change on wildfire behavior and initial attack success  

E-Print Network [OSTI]

wildfire behavior and initial attack success Van Rheenen, N.2006a. Analysing initial attack on wildland fires usingwildfire behavior and initial attack success Fried, J.S. ,

Fried, Jeremy S.

2008-01-01T23:59:59.000Z

78

Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control  

E-Print Network [OSTI]

477 CHAPTER 31 Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control ................................................................................................................................... 478 White Shark Attack Statistics........................................................................................................ 479 Definition of Shark Attack

Klimley, A. Peter

79

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

80

Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs  

E-Print Network [OSTI]

1 Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs Steven Noel and Sushil optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph. The set of all such paths through the network constitutes an attack graph, which we aggregate according

Noel, Steven

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED  

E-Print Network [OSTI]

A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED FIRE CONTAINMENT MODEL Jeremy S, contemporary initial attack models, such as the California Fire Economics Simulator (CFES) ver- sion 2 simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics

Fried, Jeremy S.

82

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack  

E-Print Network [OSTI]

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor Leander, Mohamed Ahmed PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we

Zenner, Erik

83

WHOP: Wormhole Attack Detection Protocol using Hound Packet  

E-Print Network [OSTI]

WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

Dharmaraja, S.

84

A Fast Eavesdropping Attack Against Touchscreens Federico Maggi  

E-Print Network [OSTI]

A Fast Eavesdropping Attack Against Touchscreens Federico Maggi Alberto Volpatto Politecnico di, we arise this concern by presenting an automatic attack against mod- ern touchscreen keyboards. We demonstrate the attack against the Apple iPhone--2010's most popular touchscreen device-- although it can

Paris-Sud XI, Université de

85

Attack-Resilient Time Synchronization for Wireless Sensor Networks  

E-Print Network [OSTI]

Attack-Resilient Time Synchronization for Wireless Sensor Networks Hui Song, Sencun Zhu in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time

Yener, Aylin

86

Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda  

E-Print Network [OSTI]

Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

Chiueh, Tzi-cker

87

Architectural Support for Automated Software Attack Detection, Recovery, and Prevention  

E-Print Network [OSTI]

Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

Zambreno, Joseph A.

88

Efficient DHT attack mitigation through peers' ID distribution  

E-Print Network [OSTI]

Efficient DHT attack mitigation through peers' ID distribution Thibault Cholez, Isabelle Chrisment.festor}@loria.fr Abstract--We present a new solution to protect the widely deployed KAD DHT against localized attacks which DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback

Paris-Sud XI, Université de

89

Extending the GHS Weil Descent Attack No Author Given  

E-Print Network [OSTI]

Extending the GHS Weil Descent Attack No Author Given No Institute Given Abstract. In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to elds of composite degree over F2 . The principle behind

Hess, Florian

90

ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin  

E-Print Network [OSTI]

ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin Inria, France ludovic Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted

Paris-Sud XI, Université de

91

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek  

E-Print Network [OSTI]

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Dartmouth College Hanover, NH College Hanover, NH 03755 sws@cs.dartmouth.edu ABSTRACT Currently, work on malware attack and defense become the launching point for many attacks on the enterprise network in which the embedded devices

Smith, Sean W.

92

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

93

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

and storage. In this research, we identify a new kind of attacks on IMDs - Resource Depletion (RD) attacks information. IMD attacks may also be launched by insurance companies. IMD readers may be installed near, and storage. An IMD is implanted in patient's body and expected to run for several years. Typical IMDs

Wu, Jie

94

A Network Game with Attackers and a Defender Marios Mavronicolas  

E-Print Network [OSTI]

International Symposium on Algorithms and Computation, X. Deng and D. Du eds., pp. 288­297, Vol. 3827, Lecture a probability distribution to choose a node of the network to damage. Opponent to the attackers is a protector]. Typically, an attack exploits the discovery of loopholes in the security mechanisms of the Internet. Attacks

Mavronicolas, Marios

95

FY 2015 Budget Request Webinar  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

based on actual integrated biorefinery project plant performance data. eere.energy.gov 19 Bioenergy Technologies - FY 2015 Budget Request (Dollars in Thousands) FY 2013 Current FY...

96

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

97

2014 NERSC allocation requests due September 22  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC allocation requests due September 22 2014 NERSC allocation requests due September 22 August 13, 2013 by Francesca Verdier (0 Comments) NERSC's allocation submission system is...

98

Third Party CNOT Attack on MDI QKD  

E-Print Network [OSTI]

In this letter, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). We study how one can suitably present an eavesdropping strategy on MDI QKD, that is in the direction of the fundamental CNOT attack on BB84 protocol, though our approach is quite different. In this strategy, Eve will be able to know expected half of the secret bits communicated between Alice and Bob with certainty (probability 1) without introducing any error. Further, for the remaining bits, where Eve will only be able to predict the bit values as in random guess (with probability 1/2), she will certainly find out whether her interaction induced an error in the secret bits between the communicating parties. Given the asymmetric nature of the CNOT attack, we also introduce Hadamard gates to present a symmetric version. Though our analysis does not refute the security claims in MDI QKD, adapting the CNOT attack in this scenario requires nontrivial approach using entanglement swapping.

Arpita Maitra

2012-09-06T23:59:59.000Z

99

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

100

DRIVER RECORD CHECK REQUEST FORM  

E-Print Network [OSTI]

DRIVER RECORD CHECK REQUEST FORM This form must be submitted to the Sport Clubs Office at least TWO weeks prior to your club's departure and serves as a request for permission to become an approved driver, please email us at sportclb@umn.edu or call 612-625-6017. Driver Information *Enter the following

Amin, S. Massoud

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Request a Reprint  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories » Removing nuclearReportingJ. BennettTO REQUEST A

102

Requests for Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories » Removing nuclearReportingJ.Requests for

103

Requesting a DSO 216  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report7 ATTACHMENTSMR

104

FY 2012 FOIA Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFOR IMMEDIATE RELEASE17 Budget2-FOIA-Requests Sign

105

2014 State Capital Request Board of Regents  

E-Print Network [OSTI]

on FY 2015 capital budget Financial Summary Request dollars in thousands Location Project Total State U

Weiblen, George D

106

The Impact of Imperfect Information on Network Attack  

E-Print Network [OSTI]

This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

2014-01-01T23:59:59.000Z

107

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

108

Attack polish for nickel-base alloys and stainless steels  

DOE Patents [OSTI]

A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

Not Available

1980-05-28T23:59:59.000Z

109

Attack polish for nickel-base alloys and stainless steels  

DOE Patents [OSTI]

A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

1983-01-01T23:59:59.000Z

110

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Broader source: Energy.gov (indexed) [DOE]

project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event...

111

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

112

Finite Energy and Bounded Attacks on Control System Sensor Signals  

SciTech Connect (OSTI)

Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

2014-01-01T23:59:59.000Z

113

active attack tegutsevad: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

traffic. Although it is difficult to detect shrew DDo Chen, Yu 83 Timing analysis in low-latency mix networks: attacks and defenses Computer Technologies and Information Sciences...

114

attack detection system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

115

attack model development: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

116

Optimal Power Grid Protection through A Defender-Attacker ...  

E-Print Network [OSTI]

Feb 22, 2013 ... Optimal Power Grid Protection through A Defender-Attacker-Defender Model. Wei Yuan (weiyuan ***at*** mail.usf.edu) Long Zhao (longzhao...

Wei Yuan

2013-02-22T23:59:59.000Z

117

Optimal Security Response to Attacks on Open Science Grids  

E-Print Network [OSTI]

Mar 30, 2009 ... Abstract: Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations...

Mine Altunay

2009-03-30T23:59:59.000Z

118

REQUEST FOR REPLACEMENT DIPLOMA Name: ________________________________________________________________________  

E-Print Network [OSTI]

REQUEST FOR REPLACEMENT DIPLOMA Name. ________________________________________________________________________ First Middle Maiden Last REPLACEMENT DIPLOMA INFORMATION Please print your name exactly as you want it to appear on your replacement diploma. If your name has changed since your degree was awarded, and if you

Gering, Jon C.

119

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

120

On Detecting Pollution Attacks in Inter-Session Network Coding  

E-Print Network [OSTI]

On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

Markopoulou, Athina

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

On Detecting Pollution Attacks in Inter-Session Network Coding  

E-Print Network [OSTI]

On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

Markopoulou, Athina

122

Energy-Based Attack Detection in Networked Control Emeka Eyisi  

E-Print Network [OSTI]

systems includ- ing medical devices [13] and waste water treatment plants [1]. In securing CPSEnergy-Based Attack Detection in Networked Control Systems Emeka Eyisi United Technologies Research.koutsoukos@vanderbilt.edu ABSTRACT The increased prevalence of attacks on Cyber-Physical Systems (CPS) as well as the safety

Koutsoukos, Xenofon D.

123

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

124

Avoiding the Detector Blinding Attack on Quantum Cryptography  

E-Print Network [OSTI]

We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately.

Z L Yuan; J F Dynes; A J Shields

2010-09-30T23:59:59.000Z

125

Combined Modeling and Side Channel Attacks on Strong PUFs  

E-Print Network [OSTI]

, unknown to the adversary. This requirement can be difficult to uphold in practice: Physical attacks like- tacks on PUF core properties have been reported. They con- cern their physical and digital unclonability, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter

126

Unidentifiable Attacks in Electric Power Systems Zhengrui Qin, Qun Li  

E-Print Network [OSTI]

enumerating algorithms and optimization strategy. Keywords-Smart Grid, Unidentifiable Attack, State Estimates the perspective of the control center to deal with an unidentifiable attack. We briefly evaluate and validate our locations of the power grid. The meters take vari- ous measurements, including real and reactive power

Li, Qun

127

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

128

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

129

Defending Systems Against Application-Level Denial of Service Attacks  

E-Print Network [OSTI]

Systems Against Application-Level Denial of Service Attacks Research Thesis Submitted in Partial of the Technion -- Israel Institute of Technology HESHVAN 5768 HAIFA NOVEMBER 2007 #12;#12;The Research Thesis with a Single Port . . . . . . . . . . . 66 5.3.1 Blind Attack

Keidar, Idit

130

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

131

Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways  

E-Print Network [OSTI]

Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways Ludovic Jacquin Inria the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker in use, the attack either creates a Denial of Service or major performance penalties. This attack

Paris-Sud XI, Université de

132

Metrics for Assessment of Smart Grid Data Integrity Attacks  

SciTech Connect (OSTI)

There is an emerging consensus that the nations electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

133

Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States  

E-Print Network [OSTI]

and the Multiscalar Attack on the State: Consequences forand the multiscalar attack on the state: Consequences forand the multiscalar attack on the state: Consequences for

Christopher Niedt; Margaret Weir

2007-01-01T23:59:59.000Z

134

Network attack detection and defense Manifesto of the Dagstuhl Perspective Workshop, March 2nd6th, 2008  

E-Print Network [OSTI]

y REGULRE BEITRGE Network attack detection and defense Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

2009-01-01T23:59:59.000Z

135

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

136

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

137

ACCOUNTS PAYABLE CHECK REQUEST FORM Vendor Name  

E-Print Network [OSTI]

ACCOUNTS PAYABLE CHECK REQUEST FORM Vendor Name Remit to Address City State Zip Code SECTION 2 INSTRUCTIONS Use the link to view approved categories. Vendor Number (if known) DP Requester AP Entry Check

de Lijser, Peter

138

Climate Action Champions Request for Applications | Department...  

Broader source: Energy.gov (indexed) [DOE]

Climate Action Champions Request for Applications Climate Action Champions Request for Applications October 27, 2014 5:00PM EDT Climate Action Champions On Oct. 1, 2014, the Obama...

139

An Attack on RSA Using LSBs of Multiples of the Prime Factors  

E-Print Network [OSTI]

An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

Nitaj, Abderrahmane

140

Delta Faucet: Data Request (2010-SW-1603)  

Broader source: Energy.gov [DOE]

DOE requested test data from Delta Faucet Corporation for Delta Faucet's showerhead model "In2ition 75582".

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Request for donations 1. Donation project  

E-Print Network [OSTI]

Request for donations 1. Donation project Cheiron School 2013 2. Activity to be supported (1. Donation procedures See

Kazama, Hokto

142

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

143

New Item is requested directly by Physician  

E-Print Network [OSTI]

New Item is requested directly by Physician and communicated to Materials Management via email New Item is requested via Special Needs Report and communicated to Materials Management via email New Item is requested via Vendor Rep on behalf of Physician and is communicated to Materials Management via email

Oliver, Douglas L.

144

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

145

After-gate attack on a quantum cryptosystem  

E-Print Network [OSTI]

We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

Carlos Wiechers; Lars Lydersen; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

2010-09-14T23:59:59.000Z

146

Time-shift attack in practical quantum cryptosystems  

E-Print Network [OSTI]

Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in principle, could acquire full information on the final key without introducing any error. Finally, we discuss some counter measures against our and earlier attacks.

Bing Qi; Chi-Hang Fred Fung; Hoi-Kwong Lo; Xiongfeng Ma

2006-05-11T23:59:59.000Z

147

Active Attacks Against Modulation-based Radiometric Identification  

E-Print Network [OSTI]

) may become compromised via physical attacks. In light of these difficulties, researchers have started Science Technical Report 09-02 Matthew Edman and B¨ulent Yener Rensselaer Polytechnic Institute Department

Bystroff, Chris

148

On the Complexity of Matsui's Attack Pascal Junod  

E-Print Network [OSTI]

On the Complexity of Matsui's Attack Pascal Junod Security and Cryptography Laboratory Swiss at random and where depends on the key value. Given some plaintext bits Pi1 , . . . , Pir , ciphertext bits

149

Real-world Polymorphic Attack Detection Michalis Polychronakis,1  

E-Print Network [OSTI]

proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

Markatos, Evangelos P.

150

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network [OSTI]

attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one...

Liu, Shan

2013-02-11T23:59:59.000Z

151

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

152

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

153

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?  

E-Print Network [OSTI]

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

Paris-Sud XI, Université de

154

Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes  

E-Print Network [OSTI]

Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

Paris-Sud XI, Université de

155

New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b  

E-Print Network [OSTI]

New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b University of Illinois analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector

Moulin, Pierre

156

Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller  

E-Print Network [OSTI]

Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature-based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

Miller, Barton P.

157

Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack  

E-Print Network [OSTI]

Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

158

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H during the Distributed Denial-oJService (DDoS) attack. By allocating bandwidths separately for TCP.9% of the attack trafic while legitimate traflc showed nearly identical performance as in the non-attacked

Chao, Jonathan

159

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment  

E-Print Network [OSTI]

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

Eustice, Ryan

160

TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks  

E-Print Network [OSTI]

TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks Jakob Eriksson attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization

Krishnamurthy, Srikanth

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A New Attack on RSA with Two or Three Decryption Exponents  

E-Print Network [OSTI]

A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

Nitaj, Abderrahmane

162

Robust Codes for Fault Attack Resistant Cryptographic Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin  

E-Print Network [OSTI]

Robust Codes for Fault Attack Resistant Cryptographic Hardware Konrad J. Kulikowski, Mark G algorithms are vulner- able to fault analysis attacks. To detect these attacks we propose an architec- ture by an attacker. Architectures based on these codes have fewer undetectable er- rors than linear codes

Karpovsky, Mark

163

Analyzing the Security in the GSM Radio Network using Attack Jungles  

E-Print Network [OSTI]

Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker

Abdulla, Parosh Aziz

164

A Single-Key Attack on 6-Round KASUMI Teruo Saito1  

E-Print Network [OSTI]

A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

165

Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller  

E-Print Network [OSTI]

Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature­based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

Liblit, Ben

166

Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.  

E-Print Network [OSTI]

Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure to perform advanced attacks. We have experimentally validated the proposed method by attacking a DES

Paris-Sud XI, Université de

167

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes  

E-Print Network [OSTI]

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

Odlyzko, Andrew M.

168

Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament  

E-Print Network [OSTI]

Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance

169

Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1  

E-Print Network [OSTI]

Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

Zhang, Jian

170

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve  

E-Print Network [OSTI]

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy- sis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms

Paris-Sud XI, Université de

171

Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament  

E-Print Network [OSTI]

Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance anal- ysis to information- theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives

Paris-Sud XI, Université de

172

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic  

E-Print Network [OSTI]

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce

Wang, Wenye

173

Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli  

E-Print Network [OSTI]

of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on di#erent cryptosystems. Recently, the principle of combined attacks#erent fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

174

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

Jay Yang, Shanchieh

175

Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli  

E-Print Network [OSTI]

of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on different cryptosystems. Recently, the principle of combined attacks different fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

176

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

177

ABATEMENT REQUEST FORM \\ \\ Drayton\\ Data\\ Graduate Office\\ Forms\\ F. Assistantship Forms\\ F.4 Abatement Request Form  

E-Print Network [OSTI]

ABATEMENT REQUEST FORM (GSO-F4) Rev. 13-14 \\ \\ Drayton\\ Data\\ Graduate Office\\ Forms\\ F. Assistantship Forms\\ F.4 Abatement Request Form 1. CWID Degree or Certificate Program Residency Status 2. Last): Requested Enrollment Hours for Term: Note: The Abatement award is subject to the availability of funds

Kasman, Alex

178

Research Start-up Request Form Please use this form for all start-up requests.  

E-Print Network [OSTI]

Research Start-up Request Form Please use this form for all start-up requests. All requests must: Department: College: Date of Offer: Start Date: Year 1 Year 2 Year 3 Fiscal Year: Equipment: Amount of Start-up of Start-up Provided by Dept. or College Year 1 Year 2 Year 3 Amount: Planned Use: EVP/Provost Signature

Thomas, Andrew

179

Energy Department Requests Proposals for Advanced Scientific...  

Energy Savers [EERE]

27, 2005 - 4:55pm Addthis WASHINGTON, DC - The Department of Energy's Office of Science and the National Nuclear Security Administration (NNSA) have issued a joint Request...

180

Alarm Code Request Office of Physical Security  

E-Print Network [OSTI]

Alarm Code Request Office of Physical Security 101 Campus Operations Bowling Green State University Bowling Green, Ohio 43403 (419) 3727661 lockalarm@bgsu.edu By signing this authorization

Moore, Paul A.

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Analysis of inservice inspection relief requests  

SciTech Connect (OSTI)

Nuclear Regulatory Commission (NRC) regulations require inspection (ISI) of boiling or pressurized water-cooled nuclear power plants be performed in accordance with a referenced edition and addenda of Section XI, ``Rules for Inservice Inspection of Nuclear Power Plant components,`` of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. The regulations permit licensees to request relief from the NRC from specific ASME Code requirements that are determined to be impractical for the specific licensee. The NRC evaluates these requests and may grant such relief, but the NRC may also impose alternative or augmented inspections to assure structural reliability. The purpose,of this task was to evaluate the basis for ISI nondestructive examination (NDE) relief requests and to evaluate the effect of proposed ASME Code changes that would reduce the need for such requests or provide for more complete information in relief requests. This report contains the results of an analysis of an ISI relief request data base that has been expanded to include 1195 ISI relief requests versus the 296 relief requests covered in the first report in April 1987, EGG-SD-7430. Also relief requests were added to the data base which came from both first and second 10-year inspection intervals for several facilities. This provided the means to analyze the effect of recently approved ASME Code cases and updated Code requirements, some of which have been published as a result of earlier work on this task.

Aldrich, D.A.; Cook, J.F.

1989-08-01T23:59:59.000Z

182

REQUEST FOR TRAVEL AUTHORIZATION Document ID #  

E-Print Network [OSTI]

REQUEST FOR TRAVEL AUTHORIZATION Document ID # Name: UTEID: Travel Dates: Begin: End: Destination," please allow one month for processssing. Helpful Information: Navigant (Travel Management) (512

Texas at Austin, University of

183

Gray Matter Is Targeted in First-Attack Multiple Sclerosis  

SciTech Connect (OSTI)

The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

2013-09-10T23:59:59.000Z

184

Resilience of Social Networks Under Different Attack Strategies  

E-Print Network [OSTI]

Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small world-scale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesti...

Latif, Mohammad Ayub; Zaidi, Faraz

2014-01-01T23:59:59.000Z

185

Response to several FOIA requests - Renewable Energy. Demand...  

Office of Environmental Management (EM)

Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA...

186

Requests for Proposal- Carlsbad Field Office and NNSA National...  

Office of Environmental Management (EM)

Requests for Proposal- Carlsbad Field Office and NNSA National Security Complex Requests for Proposal- Carlsbad Field Office and NNSA National Security Complex January 13, 2015 -...

187

Comments on Request For Information regarding Reducing Regulatory...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register Vol. 76, No. 23 Thursday, February 3, 2011 Notices). Comments on Request...

188

Fuel Cell Technologies Program FY 2013 Budget Request Rollout...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Program FY 2013 Budget Request Rollout to Stakeholders Fuel Cell Technologies Program FY 2013 Budget Request Rollout to Stakeholders Presentation by Sunita Satyapal at the FY 2013...

189

Response to several FOIA requests - Renewable Energy. | Department...  

Energy Savers [EERE]

Chapter 2 Energy Impacts, nepdg82518500.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests -...

190

EERE FY 2015 Budget Request Webinar -- Renewable Power | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Renewable Power EERE FY 2015 Budget Request Webinar -- Renewable Power EERE FY 2015 Budget Request Webinar, featuring Steve Chalk, Deputy Assistant Secretary for Renewable Power,...

191

EERE FY 2015 Budget Request Webinar -- Energy Efficiency | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Energy Efficiency EERE FY 2015 Budget Request Webinar -- Energy Efficiency EERE FY 2015 Budget Request Webinar, featuring Kathleen Hogan, Deputy Assistant Secretary for Energy...

192

FOIA Frequently Requested Documents: DE-EE0002884 Recovery Act...  

Energy Savers [EERE]

FOIA Frequently Requested Documents: DE-EE0002884 Recovery Act - Integrated Algal Biorefinery (IABR) FOIA Frequently Requested Documents: DE-EE0002884 Recovery Act - Integrated...

193

Department of Energy Issues Requests for Applications for Nuclear...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Department of Energy Issues Requests for Applications for Nuclear-Related Science and Engineering Scholarships and Fellowships Department of Energy Issues Requests for Applications...

194

Request for Information on Permitting of Transmission Lines:...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines:...

195

Request for Information: GSA Seeks Innovative Building Technologies...  

Office of Environmental Management (EM)

September 26, 2014 - 10:50am Addthis This request for information is closed. GSA's Green Proving Ground has opened its 2015 Request for Information (RFI) seeking information...

196

BETO Announces Request for Information on Landscape Design for...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

BETO Announces Request for Information on Landscape Design for Sustainable Bioenergy Systems BETO Announces Request for Information on Landscape Design for Sustainable Bioenergy...

197

The FY 2008 Budget Request - Twenty in Ten: Strengthening America...  

Office of Environmental Management (EM)

8 Budget Request - Twenty in Ten: Strengthening America's Energy Security The FY 2008 Budget Request - Twenty in Ten: Strengthening America's Energy Security DOE's Office of Energy...

198

Commercial Buildings: Asset Scoring Efforts and Request for Informatio...  

Energy Savers [EERE]

Buildings: Asset Scoring Efforts and Request for Information: February 2013 webinar Commercial Buildings: Asset Scoring Efforts and Request for Information: February 2013 webinar...

199

DOE Issues Request for Proposals for Hanford Site Occupational...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Issues Request for Proposals for Hanford Site Occupational Medical Services DOE Issues Request for Proposals for Hanford Site Occupational Medical Services November 14, 2011 -...

200

AMO Issues Request for Information on Clean Energy Manufacturing...  

Energy Savers [EERE]

Request for Information on Clean Energy Manufacturing Topics, Including Fuel Cell and Hydrogen Applications AMO Issues Request for Information on Clean Energy Manufacturing Topics,...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout...  

Energy Savers [EERE]

FY 2014 Budget Request Rollout to Stakeholders Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout to Stakeholders Presentation slides from the Hydrogen and Fuel...

202

New Request for Information on Strategy to Advance the Marine...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

New Request for Information on Strategy to Advance the Marine and Hydrokinetic Energy Industry New Request for Information on Strategy to Advance the Marine and Hydrokinetic Energy...

203

Request for Information Regarding the Testing of Marine and Hydrokinet...  

Energy Savers [EERE]

Request for Information Regarding the Testing of Marine and Hydrokinetic Systems Request for Information Regarding the Testing of Marine and Hydrokinetic Systems January 14, 2015 -...

204

PIA - Savannah River Nuclear Solutions Badge Request and Site...  

Office of Environmental Management (EM)

Solutions Badge Request and Site Personnel Roster Systems PIA - Savannah River Nuclear Solutions Badge Request and Site Personnel Roster Systems PIA - Savannah River Nuclear...

205

COMMENTS OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST...  

Energy Savers [EERE]

OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST FOR INFORMATION REGARDING SMART GRID POLICY COMMENTS OF THE MICHIGAN PUBLIC SERVICE COMMISSION STAFF TO REQUEST FOR...

206

US Nuclear Regulatory Commission Input to DOE Request for Information...  

Energy Savers [EERE]

US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart...

207

Response to Request for Information titled "Addressing Policy...  

Energy Savers [EERE]

to Request for Information titled "Addressing Policy and Logistical Challenges to Smart Grid Implementation" Response to Request for Information titled "Addressing Policy and...

208

DEEP Summer Academy 2015 Request for Proposals  

E-Print Network [OSTI]

DEEP Summer Academy 2015 Request for Proposals Deadline: November 30th 2014 Primary Contact: DEEP Request for Proposals: DEEP Summer Academy 2015 About the Engineering Outreach Office The Engineering Office, visit: http://outreach.engineering.utoronto.ca/aboutus.htm Overview of DEEP Summer Academy

Prodi, Aleksandar

209

Action Requested: THE UNIVERSITY OF MICHIGAN  

E-Print Network [OSTI]

Subject: Action Requested: THE UNIVERSITY OF MICHIGAN REGENTS COMMUNICATION ACTION REQUEST schools and Michigan middle or junior high schools and matriculation at the University within 28 months President for Academic Affairs July 2013 Attachment #12;UNIVERSITY OF MICHIGAN GUIDELINES FOR QUALIFYING

Kamat, Vineet R.

210

SALARY STIPEND REQUEST FOR CSUEU EMPLOYEES  

E-Print Network [OSTI]

SALARY STIPEND REQUEST FOR CSUEU EMPLOYEES HUMAN RESOURCES Workforce Planning | One Washington Administrator--Submit completed request to Workforce Planning in Human Resources, 0046. Article 20 for Eligibility Sr. Workforce Planning Analyst Signature Phone: Date: HR: 07/01/08 #12;

Eirinaki, Magdalini

211

Replacement Diploma Request University of Massachusetts Lowell  

E-Print Network [OSTI]

Replacement Diploma Request Mail to: University of Massachusetts Lowell Office of the Registrar 883. * Please use a separate form for each diploma request. * All replacement diplomas are University of Massachusetts Lowell diplomas. Replacement diplomas with the name of any predecessor institution

Massachusetts at Lowell, University of

212

Replacement Diploma Request University of Massachusetts Lowell  

E-Print Network [OSTI]

Replacement Diploma Request Mail to: University of Massachusetts Lowell Office of the Registrar 220. * Please use a separate form for each diploma request. * All replacement diplomas are University of Massachusetts Lowell diplomas. Replacement diplomas with the name of any predecessor institution

Massachusetts at Lowell, University of

213

Shop Request - 88-Inch Cyclotron  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNewsMaterialsX-rayOur StaffShop Request

214

Request Log Closedl Date Yes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report Of6 FOIA -

215

Request for Privacy Act Records  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORVEnergy Request For Report

216

FOIA-Request February 2009  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResourcesFLASH2011-11-OPAM FLASH2011-11-OPAMDepartment of Energy FOIA Requests

217

FOIA-Requests_January 2009  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResourcesFLASH2011-11-OPAM FLASH2011-11-OPAMDepartment of Energy FOIA Requests

218

ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W.  

E-Print Network [OSTI]

ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W, FRANCE ABSTRACT In this paper, we present a novel attack named colorization attack. This attack of such an attack and thus to take it into account for the future color-hiding watermarking schemes. Index Terms

Paris-Sud XI, Université de

219

Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks  

E-Print Network [OSTI]

Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks M.H.R. Khouzani, Saswati Sarkar Abstract Large scale proliferation of wireless technologies are dependent on developing reliable to the spread of self-replicating malicious codes known as malware. The malware can be used to initiate

Sarkar, Saswati

220

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures  

E-Print Network [OSTI]

range of sparsely located mobile nodes (e.g., disaster-response networks), and limited energy resources, DTNs are used for scientific, military, and industrial applications that place high demands against spoofing attacks in DTNs. To the best of our knowledge, we are the first to propose

Caesar, Matthew

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Attack Detection and Identification in Cyber-Physical Systems  

E-Print Network [OSTI]

Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D¨orfler, Florian D¨orfler, and Francesco Bullo are with the Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, {fabiopas,dorfler,bullo}@engineering.ucsb.edu. #12;appropriate

Bullo, Francesco

222

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

223

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

224

Selective Jamming Attacks in Wireless Networks Alejandro Proa~no  

E-Print Network [OSTI]

for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15-one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming

Lazos, Loukas

225

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

226

Offline Dictionary Attack on Password Authentication Schemes using Smart Cards  

E-Print Network [OSTI]

decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility

227

A Network Game with Attackers and a Defender Marios Mavronicolas  

E-Print Network [OSTI]

International Symposium on Algorithms and Computation, X. Deng and D. Du eds., pp. 288­297, Vol. 3827, Lecture distribution to choose a node of the network to damage. Opponent to the attackers is a protector entity called the discovery of loopholes in the security mechanisms of the Internet; the latter are also known as defenses

Mavronicolas, Marios

228

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

that rest on the Strong PUF's unpredictability and physical unclonability. Our method is less relevant these problems, but they all rest on the concept of a secret binary key: It is assumed that the Ulrich R API-attacks and viruses, can lead to key exposure and full security breaks. The fact that the devices

229

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

230

Defending Synchrophasor Data Networks Against Traffic Analysis Attacks  

E-Print Network [OSTI]

- tem. PMU data serves to facilitate a number of applications while enhancing others, such as real generation and distribution system, monitoring and manipulation of PMU data are particularly attractive of the PMU data measurement and collection network against a class of passive attacks and develops defense

Sikdar, Biplab

231

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

232

A Deception Framework for Survivability Against Next Generation Cyber Attacks  

E-Print Network [OSTI]

to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

Upadhyaya, Shambhu

233

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

234

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT  

E-Print Network [OSTI]

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

Noel, Steven

235

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

236

Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations  

E-Print Network [OSTI]

early-warning detection of attack signals from terroristtowards detecting terrorist attack precursors. We ?nd thatof impending terrorist attacks. (Such potential practical

Drozdova, Katya; Samoilov, Michael

2010-01-01T23:59:59.000Z

237

Ethnicity and gender in the face of a terrorist attack: A national longitudinal study of immediate responses and outcomes two years after September 11  

E-Print Network [OSTI]

reactions to terrorist attacks: Findings from the national11, 2001, terrorist attacks. New England Journal ofthe 9/11/01 terrorist attacks. Journal of Adolescent Health,

Chu, T Q; Seery, M D; Ence, W A; Holman, E A; Silver, Roxane Cohen

2006-01-01T23:59:59.000Z

238

Millersville University Request for Exception to Graduation Requirements  

E-Print Network [OSTI]

your degree audit (DARS) and show precisely how the requested exception would change your DARS. Submit

Hardy, Christopher R.

239

CECS Space Request Form Version: August 8, 2012  

E-Print Network [OSTI]

CECS Space Request Form Version: August 8, 2012 COLLEGE OF ENGINEERING AND COMPUTER SCIENCE SPACE COMMITTEE Unit submitting space request (please check one): CECE EECS-CS EECS-ECE IEMS MAE MSE This request for space in ENGR/ENG2/HEC is a (please check one): New request (must be submitted no later than 2 weeks

Wu, Shin-Tson

240

On the robustness of network infrastructures to disasters and physical attacks  

E-Print Network [OSTI]

Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

Neumayer, Sebastian James

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

T-702: Apache web servers that allows a DOS attack | Department...  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has...

242

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

243

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

244

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

245

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

246

Robustness of two-way quantum communication protocols against Trojan horse attack  

E-Print Network [OSTI]

We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

2005-08-23T23:59:59.000Z

247

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

248

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

249

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

250

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

251

The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses  

E-Print Network [OSTI]

The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

Saxena, Nitesh

252

Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems  

E-Print Network [OSTI]

1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

Curtmola, Reza

253

Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space  

E-Print Network [OSTI]

users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and their transmission power is low. These properties introduce great challenges on PUE detection and existing meth- ods]. However, all of them focus on the attackers that emulate stationary primary users (TV towers

California at Davis, University of

254

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

255

False Data Injection Attacks with Incomplete Information Against Smart Power Grids  

E-Print Network [OSTI]

False Data Injection Attacks with Incomplete Information Against Smart Power Grids Md. Ashfaqur introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring Injection Attack, Smart Grid Security, Incomplete Information, Transmission Line Admittance Uncer- tainty

Mohsenian-Rad, Hamed

256

Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number  

E-Print Network [OSTI]

Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This paper presents a contact- less

Paris-Sud XI, Université de

257

A Formal Method for Attack Modeling and Seyit Ahmet C amtepe and Bulent Yener  

E-Print Network [OSTI]

1 A Formal Method for Attack Modeling and Detection Seyit Ahmet C¸ amtepe and B¨ulent Yener,yener}@cs.rpi.edu TR-06-01 Abstract This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach [1] to capture (i

Bystroff, Chris

258

Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack  

E-Print Network [OSTI]

Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack W. Matthew will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well-informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service

Henderson, Shane

259

An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing  

E-Print Network [OSTI]

An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University's security? We propose to use the measure of a system's attack surface as an indication of the system, prior work has shown that a system's attack surface measurement serves as a reliable proxy for security

Wing, Jeannette M.

260

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace-zero group can always be transferred methods than by attacking it directly via generic methods. The speed-up one obtains corresponds

Diem, Claus

262

Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems  

E-Print Network [OSTI]

Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems attacks has not been intensively ad- dressed yet. In particular, there have not been any analyses for real the attack bandwidth which is necessary for a significant impact on RSerPool-based services. This analysis

Dreibholz, Thomas

263

On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack  

E-Print Network [OSTI]

On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

264

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack calculus methods than by attacking it directly via generic methods. The speed-up one obtains

Diem, Claus

265

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

266

Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem  

E-Print Network [OSTI]

Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem F. Hess Technical succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude that they are not likely to yield further

Hess, Florian

267

Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera  

E-Print Network [OSTI]

Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera beetle (Dryocoetes confusus Swaine) predominately attacked trees from the three to four largest diameter classes at each site. However, the mean diameter of attacked trees was significantly different among sites

Lindgren, Staffan

268

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key  

E-Print Network [OSTI]

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

Myasnikov, Aleksey

269

Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts Semantic Networks  

E-Print Network [OSTI]

Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts networks from Distributed Denial of Service (DDoS) attacks has become a critical issue that must be tackled, the overwhelming volume of alerts makes it difficult for security administrators to analyze and extract the attack

Ansari, Nirwan

270

Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth  

E-Print Network [OSTI]

Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth- jack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can--by supplying of code of her choosing. In this paper, we propose to protect code from this common form of attack using

Plotkin, Joshua B.

271

A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar  

E-Print Network [OSTI]

A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar Jeannette M software [18]. In this paper, we propose to use a software system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We

Wing, Jeannette M.

272

Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa Sushil Jajodia  

E-Print Network [OSTI]

Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective techniques for visualizing such attack graphs

Noel, Steven

273

On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller  

E-Print Network [OSTI]

On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller University of Wisconsin, Madison Computer Sciences Department {shai,jha,bart}@cs.wisc.edu Abstract An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances

Liblit, Ben

274

Discovering Novel Attack Strategies from INFOSEC Xinzhou Qin and Wenke Lee  

E-Print Network [OSTI]

Discovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College. Correlating security alerts and discovering attack strategies are impor- tant and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from

Lee, Wenke

275

Attack on Private Signature Keys of the OpenPGP format, PGPTM  

E-Print Network [OSTI]

- 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

276

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace­zero group can always be transferred methods than by attacking it directly via generic methods. The speed­up one obtains corresponds

Diem, Claus

277

CAT A Practical SDL Based Attack Attribution Toolkit for 3G Networks  

E-Print Network [OSTI]

CAT ­ A Practical SDL Based Attack Attribution Toolkit for 3G Networks Kameswari Kotapati Peng Liu University University Park, PA 16802 Abstract-- This paper presents the Cross Infrastructure Attack telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global

Yener, Aylin

278

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1 Polytechnic University, Brooklyn, NY 11201 ABSTRACT Protection from Distributed Denial-of-Service attacks has been of a great interest recently and substantial progress has been made for preventing some attack

Merat, Francis L.

279

On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services  

E-Print Network [OSTI]

On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services Yajuan Tang, Xiapu Luo,csrchang}@comp.polyu.edu.hk, qing.hui@ttu.edu Abstract--Low-rate Denial of Quality (DoQ) attacks, by send- ing intermittent bursts generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results

Chang, Rocky Kow-Chuen

280

Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack  

E-Print Network [OSTI]

Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack Abstract In the event of a catastrophic bio-terror attack, major urban centers need to effi- ciently distribute large of a hypothetical anthrax attack in Los Angeles County. Keywords: Capacitated facility location, distance

Dessouky, Maged

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms  

E-Print Network [OSTI]

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

Lee, Ruby B.

282

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu  

E-Print Network [OSTI]

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

Ning, Peng

283

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack  

E-Print Network [OSTI]

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

Chen, Sheng-Wei

284

Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun  

E-Print Network [OSTI]

Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

Sun, Yan Lindsay

285

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

the measurements of meters at physically protected locations such as substations, such attacks can introduce13 False Data Injection Attacks against State Estimation in Electric Power Grids YAO LIU and PENG also defeat malicious measurements injected by attackers. In this article, we expose an unknown

Reiter, Michael

286

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

the measurements of meters at physically protected locations such as substations, such attacks can introduceFalse Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu and Peng Ning also defeat malicious measurements injected by attackers. In this paper, we expose an unknown

Ning, Peng

287

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

288

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

Kundur, Deepa

289

Dynamic Load Altering Attacks in Smart Grid Sajjad Amini, Hamed Mohsenian-Rad, and Fabio Pasqualetti  

E-Print Network [OSTI]

response and demand side management programs. It attempts to control and change certain unsecured is on attacks against demand re- sponse (DR) and demand side management (DSM) programs. DR programs are used}@ece.ucr.edu and fabiopas@engr.ucr.edu Abstract--A load altering attack (LAA) is a cyber-physical attack against demand

Mohsenian-Rad, Hamed

290

A 2nd-Preimage Attack on AURORA-512 NTT Information Sharing Platform Laboratories, NTT Corporation  

E-Print Network [OSTI]

A 2nd-Preimage Attack on AURORA-512 Yu Sasaki NTT Information Sharing Platform Laboratories, NTT. In this note, we present a 2nd-preimage attack on AURORA- 512, which is one of the candidates for SHA-3. Our is approximately 2290 AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2512

291

WA_00_025_PRAXAIR_INC_Waiver_Request.pdf | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

25PRAXAIRINCWaiverRequest.pdf WA00025PRAXAIRINCWaiverRequest.pdf WA00025PRAXAIRINCWaiverRequest.pdf More Documents & Publications WA00001PRAXAIRINCWaiverofDo...

292

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

293

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

294

STATEMENT OF CONSIDERATIONS REQUEST BY BONEYWELL INTERNATIONAL...  

Broader source: Energy.gov (indexed) [DOE]

of the Waiver Petition in view of the objectives and considerations set forth in 10 CFR 784, all of which have been considered, it is recommended that the requested waiver be...

295

Furman University Cell Phone Allowance Request Form  

E-Print Network [OSTI]

Furman University Cell Phone Allowance Request Form Date Payment: $___________ All cell phone allowance payments are departmental responsibility and considered other compensation charged to object code ________. The cell phone allowance will start at the next

296

Double blinding-attack on entanglement-based quantum key distribution protocols  

E-Print Network [OSTI]

We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

2011-06-14T23:59:59.000Z

297

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect (OSTI)

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

298

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design  

E-Print Network [OSTI]

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

Pasqualetti, Fabio; Bullo, Francesco

2012-01-01T23:59:59.000Z

299

Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol  

E-Print Network [OSTI]

In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

Toyohiro Tsurumaru

2006-12-25T23:59:59.000Z

300

2013 Reinvention Fund Request for Proposals 1 2013 Reinvention Fund: Request for Proposals  

E-Print Network [OSTI]

2013 Reinvention Fund Request for Proposals 1 2013 Reinvention Fund: Request for Proposals Building a Living Laboratory for Sustainability at Penn State Reinvention Fund Projects Pre-Proposals Due: October 21, 2013 Full Proposals Due: December 20, 2013 Student Sustainability Innovation Projects Pre

Maranas, Costas

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator  

E-Print Network [OSTI]

A particularly successful detector blinding attack has been recently demonstrated on various quantum key distribution (QKD) systems, performing for the first time an undetectable and complete recovery of the key. In this paper two original contributions are given to understanding and prevention of this attack.

Mario Stip?evi?

2014-07-10T23:59:59.000Z

302

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

303

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

304

546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack?  

E-Print Network [OSTI]

546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack? Amey Shevtekar and Nirwan Ansari, Fellow, IEEE Abstract--We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various

Ansari, Nirwan

305

Building America Technology-to-Market Roadmaps - Request for...  

Energy Savers [EERE]

Building America Technology-to-Market Roadmaps - Request for Information Building America Technology-to-Market Roadmaps - Request for Information April 3, 2015 - 4:22pm Addthis The...

306

Recommendation 227: Recommendation to EM on Request for Sufficient...  

Office of Environmental Management (EM)

Request for Sufficient Funding to Meet Cleanup Needs The EM SSAB Chairs believe the EM budget request is insufficient to meet cleanup obligations and DOE needs to honor agreements...

307

Request for Proposals in Organic & Sustainability Systems Research, Teaching & Outreach  

E-Print Network [OSTI]

Request for Proposals in Organic & Sustainability Systems Research, Teaching & Outreach Proposal at Cornell's College of Agriculture and Life Sciences (CALS) requests proposals for innovative research, teaching and extension/outreach projects involving organics and sustainability in farm and food systems

Pawlowski, Wojtek

308

MATERIALS MANAGEMENT OFFICE SUPPLY REQUEST FORM -MM-4  

E-Print Network [OSTI]

MATERIALS MANAGEMENT OFFICE SUPPLY REQUEST FORM - MM-4 REQUESTER'S NAME: DEPARTMENT: TTILE: MAIL. Include the justification with this form when faxing or mailing to Materials Management. Fax 679: ________________ University Director of Materials Management: _________________________________________________________ Date

Oliver, Douglas L.

309

DOE Issues Draft Request for Proposals for Services at Carlsbad...  

Office of Environmental Management (EM)

DOE Issues Draft Request for Proposals for Services at Carlsbad New Mexico DOE Issues Draft Request for Proposals for Services at Carlsbad New Mexico December 22, 2014 - 12:00pm...

310

SDSU RESEARCH FOUNDATION FELLOWSHIP/SCHOLARSHIP DISBURSEMENT REQUEST  

E-Print Network [OSTI]

AND RESIDENT ALIENS. DO NOT USE THIS FORM FOR PAYMENTS TO NONRESIDENT ALIENS. Date of Request: From: Period

Ponce, V. Miguel

311

BIA Request for Proposals for Climate Adaptation Grants for Tribes  

Broader source: Energy.gov [DOE]

Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

312

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

313

Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks  

E-Print Network [OSTI]

We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

Ruj, Sushmita

2015-01-01T23:59:59.000Z

314

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network [OSTI]

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

315

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

316

Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks  

E-Print Network [OSTI]

were killed and more than 1,200 were injured by deadly terrorist attacks on commuter trains and stations in Madrid. These attacks had an enormous impact on the citizens of Spain, as well as the entire international community. The Madrid bombings... in its ?War on Terror? may carry additional costs. One unanticipated effect of these attacks was the victory of the Socialists over the ruling Partido Popular party in Spain in the next election. More importantly, this occurrence led to a sharp...

Warhol, Matthew Grant

2011-02-22T23:59:59.000Z

317

Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution  

E-Print Network [OSTI]

We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

Chil-Min Kim; Yun Jin Choi; Young-Jai Park

2006-03-02T23:59:59.000Z

318

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

319

A new attack on RSA and CRT-RSA Abderrahmane Nitaj  

E-Print Network [OSTI]

A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

Nitaj, Abderrahmane

320

PeopleSoft (ERP) Finance Access Request Form User Guide  

E-Print Network [OSTI]

PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

de Lijser, Peter

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Banner Database Clone Request Form ETSU Office of Information Technology  

E-Print Network [OSTI]

Banner Database Clone Request Form ETSU Office of Information Technology 424 Roy S. Nicks Hall, Box Instance: Clone Destination Instance: PROD TSTH TSTH TEST TEST Requested Banner database clone dates: [ clone on/after date ] [ clone required by date ] Banner database clone special requests

Karsai, Istvan

322

Space Request /Assignment Process University of Nebraska -Lincoln  

E-Print Network [OSTI]

Space Request /Assignment Process University of Nebraska - Lincoln Approved by Chancellor 08/15/2005 Department / Unit Completes IRP Web-based request form Department "triggers" a change to space through, different, and/or additional space Notices sent from IRP to initiating d t t d ffi Does Request Alter Space

Farritor, Shane

323

MODEL REQUEST FOR PROPOSALS TO PROVIDE ENERGY AND OTHER  

E-Print Network [OSTI]

MODEL REQUEST FOR PROPOSALS TO PROVIDE ENERGY AND OTHER ATTRIBUTES FROM AN OFFSHORE WIND POWER Gallagher for their comments and suggestions. #12;2 Model Request for Proposals to Provide Energy and other..............................................................................................................14 #12;3 Model Request for Proposals to Provide Energy and other Attributes from an Offshore Wind

Firestone, Jeremy

324

Diploma Replacement Request FOR REGISTRAR'S OFFICE USE ONLY  

E-Print Network [OSTI]

Diploma Replacement Request FOR REGISTRAR'S OFFICE USE ONLY Updated: 08/26/09 Use this form to request a replacement or additional diploma. · The name on your diploma must be the same the Registrar's Office, Registration and Records Division prior to requesting your replacement diploma

Feschotte, Cedric

325

E-Print Network 3.0 - angioedema hae attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is associated with Angioedema. ACE inhibitors... also be prescribed to patients after a heart attack or to patients with certain kind of kidney problems... inhibitors. Class a...

326

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

327

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

328

Breaking into a computer : attack techniques and tools used by cyber-criminals  

SciTech Connect (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2010-06-24T23:59:59.000Z

329

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

330

E-Print Network 3.0 - attack wastewater utilities Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

wastewater utilities Search Powered by Explorit Topic List Advanced Search Sample search results for: attack wastewater utilities Page: << < 1 2 3 4 5 > >> 1 Treated domestic...

331

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

332

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

333

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

334

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

335

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

336

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

337

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

338

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

339

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

340

Request for Information on Photovoltaic Module Recycling  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy SunShot Initiative requests feedback from industry, academia, research laboratories, government agencies, and other stakeholders on issues related to photovoltaic (PV) module recycling technology. SunShot intends to understand the current state of recycling technology and the areas of research that could lead to impactful recycling technologies to support the developing PV industry. The intent of this request for information is to generate discussion related to planning for the end of life of photovoltaic modules and to create a list of high impact research topics in photovoltaics recycling.

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

SUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request access to any personal  

E-Print Network [OSTI]

access to any personal data that the University is holding about them. This is known as a `Subject Access Request' (SAR). This information explains the process for obtaining your personal data. The Process AllSUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request

Mumby, Peter J.

342

REQUEST FOR EMPLOYEE TERMINATION CLEARANCE SUPERVISOR'S RESPONSIBILITY  

E-Print Network [OSTI]

REQUEST FOR EMPLOYEE TERMINATION CLEARANCE PROCESS SUPERVISOR'S RESPONSIBILITY: Before an employeeClearance@caltech.edu. The following departments will be notified prior to the employee's termination date: Athenaeum Bursar Telecommunications Travel Audit The following departments will be notified after the employee's termination date

Faraon, Andrei

343

PROJECT REQUEST FORM PROJECT HOLDER INFORMATION  

E-Print Network [OSTI]

PROJECT REQUEST FORM Last Name: Email: PROJECT HOLDER INFORMATION UCID:Last Name: Email: Institute if different than Project Holder) First Name: Project Short Name: (50 characters max) (for eFIN view only) Project Title: PROJECT INFORMATION Start Date (MM/DD/YYYY): End Date (MM/DD/YYYY): For Questions or HELP

de Leon, Alex R.

344

AIR CONDITIONER REQUEST EXTREME MEDICAL CIRCUMSTANCES  

E-Print Network [OSTI]

AIR CONDITIONER REQUEST DUE TO EXTREME MEDICAL CIRCUMSTANCES TO BE COMPLETED BY ATTENDING Moderate Significant Is the use of an air conditioner desirable Yes No OR essential Yes No to the management of allergy? Is the use of an air conditioner

345

Approval Request- VPP- April 13, 1994  

Broader source: Energy.gov [DOE]

The Office of Safety and Quality Assurance (EH-30) is requesting approval for DOE membership in the VPPPA. Attached is the Secretary's authorization of the DOE Voluntary Protection Program (DOE-VPP). The DOE-VPP is designed to formally recognize those contractors which have demonstrated excellence in their health and safety programs.

346

Michigan State University 201112 Appropriation Request  

E-Print Network [OSTI]

Michigan State University 201112 Appropriation Request Michigan State University (MSU) ranks) because its alumni earn high-end salaries, Michigan State University's economic impact of approximately $4.1 billion is essential to Michigan's current and future growth. The three University Research Corridor (URC

347

COLLEGE OF ARCHITECTURE REQUEST FOR MINOR IN  

E-Print Network [OSTI]

COLLEGE OF ARCHITECTURE REQUEST FOR MINOR IN URBAN & REGIONAL PLANNING NAME OR URSC 461 Housing and Community Urban Issues 3 Choose one URSC 460 OR URSC 471 Sustainable Communities department, with signature approval from the department of Landscape Architecture and Urban Planning

Behmer, Spencer T.

348

Privacy Impact Assessment Chandra Digest Request  

E-Print Network [OSTI]

Privacy Impact Assessment Chandra Digest Request I. System Identification 1. IT System Name: Chandra EPO Digest (http://chandra.harvard.edu/chronicle/news_priv.html) 2. IT System Sponsor: Van Mc digest. 4. With whom the information will be shared. #12;Only the providers of the material (certain CXC

Mathis, Wayne N.

349

REQUEST FOR CHANGE OF RECORD Name Change  

E-Print Network [OSTI]

(ex. from variation to legal name) or Add Middle Name/Initial ­ Copy of birth certificate, or valid U. Documentation Required for Date of Birth Changes: Copy of birth certificate, or valid U.S. passportREQUEST FOR CHANGE OF RECORD Name Change Social Security Number Change Date of Birth Change

350

International Internship Program Request for Proposals  

E-Print Network [OSTI]

International Internship Program Request for Proposals Group Program Summer 2015 Deadline to submit Proposals: August 1, 2014 The International Internship Program is the result of a gift from Lee Iacocca be defined as a practicum, research, or internship. It should be noncredit-bearing. There should

Napier, Terrence

351

REPLACEMENT DIPLOMA REQUEST FORM Dear Alumni  

E-Print Network [OSTI]

REPLACEMENT DIPLOMA REQUEST FORM Dear Alumni: It is our understanding that you need to replace your original diploma. We are glad to help you attain a replacement diploma. The items listed below are required replacement diploma. Please feel free to contact the LGBT Center at 617-627-3770 if you have questions

Dennett, Daniel

352

Islamists claim deadly attack on UN building in Nigeria 26 August 2011  

E-Print Network [OSTI]

in a decade. A radical Muslim sect blamed for a series of attacks in the country claimed responsibility the targeting of the U.N. at an open meeting on U.N. peacekeeping. U.S. President Barack Obama called the attack on which the U.N. was founded _ dignity, freedom, security, and peace," Obama said in a statement. "An

353

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

Düntsch, Ivo

354

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks  

E-Print Network [OSTI]

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

Lui, John C.S.

355

Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space  

E-Print Network [OSTI]

users in white space: TV towers and wireless microphones. Existing work on PUE attack detection focused on the first category. However, for the latter category, primary users are mobile and their transmission power on the attackers that emulate stationary primary users (TV towers). They are based on the fact that the locations

California at Davis, University of

356

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

357

Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design  

E-Print Network [OSTI]

Pasqualetti Florian D¨orfler Francesco Bullo Center for Control, Dynamical systems and Computation University, FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

Hu, Fei

358

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

359

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

360

Phase-remapping attack in practical quantum-key-distribution systems  

SciTech Connect (OSTI)

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

2007-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Source Location Privacy against Laptop-Class Attacks in Sensor Networks  

E-Print Network [OSTI]

it is then possible for them to interfere with the phenomena being sensed or even mount physical attacks on the mon- sages sent periodically to hide real event reports. The global and greedy solutions improve the naive towards a base station to report this event. Note that an attacker can easily detect the transmission

Liu, Donggang

362

A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL  

E-Print Network [OSTI]

A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL Gregory V. Bard.bard@ieee.org Keywords: Blockwise Adaptive, Chosen Plaintext Attack (CPA), Secure Sockets Layer (SSL), Transport Layer). Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL

363

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

364

A Generalization of the Rainbow Band Separation Attack and its Applications to  

E-Print Network [OSTI]

Recovery Attack, Rainbow, Enhanced STS, Enhanced TTS, MFE, Diophantine Equations, MQQ-Enc, MQQ-Sig 1-trivial generaliza- tion of the well known Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt '99) minimizing the length of the signatures. By now the Rainbow Band Separation attack is the best key recovery

365

Impact Analysis of Transient Stability Due to Cyber Attack on FACTS Devices  

E-Print Network [OSTI]

and distribution systems [2]. There- fore, cyber security is becoming an important R&D concern for smart grid. Many attack, cyber security, smart grids, SVC, STATCOM, FACTS, transient stability, voltage support device I are not designed to be adequately protected from cyber attack, these applications introduce numerous cyber security

Kundur, Deepa

366

THE ANALYSYS OF INFORMATION IMPACTS IN COORDINATING DEFENCE AGAINST MALICIOUS ATTACKS FOR INTERCONNECTED  

E-Print Network [OSTI]

FOR INTERCONNECTED POWER SYSTEMS Ettore Bompard George Gross Roberto Napoli Fei Xue Politecnico di Torino University) in an interconnected power system to counteract such attacks has become an important problem. This paper presents to the interconnected system operators on the outcomes of the decision making process under attack. A 34-buses test

Gross, George

367

Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines  

E-Print Network [OSTI]

concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

Shilton, Alistair

368

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

369

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

370

RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON  

E-Print Network [OSTI]

RISK MANAGEMENT AND RISK ANALYSIS- BASED DECISION TOOLS FOR ATTACKS ON ELECTRIC POWER Simonoff, J.usc.edu/create Report #04-004DRAFT #12;Risk Management and Risk Analysis-Based Decision Tools for Attacks on Electric for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles

Wang, Hai

371

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

Kundur, Deepa

372

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

373

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

Bencsáth, Boldizsár

374

Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design  

E-Print Network [OSTI]

Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant descriptor system with unknown inputs. Our attack model generalizes the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental limitations of both static and dynamic procedures for attack detection and identification. Additionally, we design provably-correct (dynamic) detection and identification procedures based on tools from geometric control theory. Finally, we illustrate the effectiveness of our method through a comparison with existing (static) detection algorithms, and through a numerical study.

Pasqualetti, Fabio; Bullo, Francesco

2011-01-01T23:59:59.000Z

375

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-12-19T23:59:59.000Z

376

FY 1996 Congressional budget request: Budget highlights  

SciTech Connect (OSTI)

The FY 1996 budget presentation is organized by the Department`s major business lines. An accompanying chart displays the request for new budget authority. The report compares the budget request for FY 1996 with the appropriated FY 1995 funding levels displayed on a comparable basis. The FY 1996 budget represents the first year of a five year plan in which the Department will reduce its spending by $15.8 billion in budget authority and by $14.1 billion in outlays. FY 1996 is a transition year as the Department embarks on its multiyear effort to do more with less. The Budget Highlights are presented by business line; however, the fifth business line, Economic Productivity, which is described in the Policy Overview section, cuts across multiple organizational missions, funding levels and activities and is therefore included in the discussion of the other four business lines.

Not Available

1995-02-01T23:59:59.000Z

377

Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol  

SciTech Connect (OSTI)

In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

2007-06-15T23:59:59.000Z

378

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

SciTech Connect (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

379

Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and  

E-Print Network [OSTI]

Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus

380

4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack of Hydrogen  

E-Print Network [OSTI]

4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack by oxidative damage of the DNA backbone but instead is the result of nucleophilic attack by peroxide. A singleSaccharomyces cerevisae, whichactivatesthephosphodiester for attack by thediffusible smallnucleophile. While Flp

Tullius, Thomas D.

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer and Thomas Hellman Morton*  

E-Print Network [OSTI]

Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer alkoxycarbenium ions in solution, which then attack allylsilanes (X ) CH2,Y ) CH3),3 followed by departure ethers via internal attack by oxygen.4 In other instances (cf. the Mukaiyama aldol condensation,5 where X

Morton, Thomas Hellman

382

New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre  

E-Print Network [OSTI]

New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown the need for secure scan implementations. These attacks assume a single scan chain. However

Paris-Sud XI, Université de

383

A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-for-Testability Structures  

E-Print Network [OSTI]

A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-based attack on hardware implementations of Elliptic Curve Cryptosystems (ECC). Several up-to-date Design aspects of the proposed scan-based attack are described, namely timing and leakage analysis that allows

Paris-Sud XI, Université de

384

A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs and Ingrid Verbauwhede1,2  

E-Print Network [OSTI]

A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs Kris Tiri1 and Ingrid Verbauwhede1 VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library

Paris-Sud XI, Université de

385

Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree  

E-Print Network [OSTI]

Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields, we analyze the Gaudry-Hess-Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm with these parameters; and (ii) the GHS attack is more e?cient for solving the ECDLP in E(F 2 N ) than for solving

Teske, Edlyn

386

State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures  

E-Print Network [OSTI]

, USA Abstract--Implementations of cryptographic primitives are vulnerable to physical attacks. While and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarizes known physical attacks and counter- measures on Elliptic Curve

Schaumont, Patrick

387

Distributed Parallel Particle Advection using Work Requesting  

SciTech Connect (OSTI)

Particle advection is an important vector field visualization technique that is difficult to apply to very large data sets in a distributed setting due to scalability limitations in existing algorithms. In this paper, we report on several experiments using work requesting dynamic scheduling which achieves balanced work distribution on arbitrary problems with minimal communication overhead. We present a corresponding prototype implementation, provide and analyze benchmark results, and compare our results to an existing algorithm.

Muller, Cornelius; Camp, David; Hentschel, Bernd; Garth, Christoph

2013-09-30T23:59:59.000Z

388

Request for Qualifications for Sacramento Landfill  

Broader source: Energy.gov [DOE]

This Request for Qualifications (RFQ) solicits experienced companies to design, permit, finance, build, and operate a solar photovoltaic farm (SPV Farm) on the City of Sacramentos 28th Street Landfill. Respondents to this RFQ must demonstrate experience and capacity to design, permit, finance, build, and operate a SPV Farm that generates electricity that can be sold for electrical use through a power-purchase agreement. Submittals must be prepared and delivered in accordance with the requirements set forth in this document.

389

Requests for Information | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: AlternativeEnvironment,Institutes and LaunchesRelatedEnergy Request ForDepartment ofA

390

FY 2013 Budget Request for the Office of Energy Efficiency and...  

Energy Savers [EERE]

3 Budget Request for the Office of Energy Efficiency and Renewable Energy FY 2013 Budget Request for the Office of Energy Efficiency and Renewable Energy The budget request for FY...

391

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network [OSTI]

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

392

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network [OSTI]

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

393

DOE's Idaho National Lab Issues Request for Proposals for Engineering...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of Energy's Idaho National Laboratory today issued a Request for Proposals (RFP) for engineering services in support of development of NGNP. This RFP is for pre-conceptual...

394

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Air Products and Chemicals, Inc. (Air Products) has requested an advance waiver of...

395

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

AGCP-HQ P.0607 * * STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER ITS SUBCONTRACT UNDER DOE COOPERATIVE...

396

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Praxair, Inc. (Praxair) has requested an advance waiver of domestic and foreign patent rights...

397

STATEMENT OF CONSIDERATIONS REQUEST BY DELPHI AUTOMOTIVE SYSTEMS...  

Broader source: Energy.gov (indexed) [DOE]

waiver petition and in subsequent discussions with DOE Patent Counsel, Delphi Automotive Systems, L.L.C (Delphi) has requested an advance waiver of domestic and foreign...

398

Adjunct Faculty Data Request College of Health and Human Services  

E-Print Network [OSTI]

Adjunct Faculty Data Request College of Health and Human Services Bowling Green State University at Bowling Green State University are required to provide the following information. Appointments

Moore, Paul A.

399

Energy Department Issues Draft Request For Proposal for Nuclear...  

Energy Savers [EERE]

information on the DRFP is available at: https:www.emcbc.doe.govSEBNRCdraftrfppage.php. DOE has requested that all comments, questions, suggested changes, and feedback should...

400

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

National Nuclear Security Administration (NNSA)

Check the type of records you are requesting: Medical Personnel Records X-Ray Reports Radiation Exposure Report Occupational and Industrial Records Other If "other" is checked,...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

DOE Issues Request for Proposals Seeking a Contractor to Manage...  

Broader source: Energy.gov (indexed) [DOE]

Princeton Plasma Physics Laboratory DOE Issues Request for Proposals Seeking a Contractor to Manage and Operate its Princeton Plasma Physics Laboratory July 3, 2008 - 2:15pm...

402

STATEMENT OF CONSIDERATIONS REQUEST BY INVENTOR FOR THE WAIVER...  

Broader source: Energy.gov (indexed) [DOE]

will allow the tool pressure housing to be encapsulated from external well bore fluids. SNL, in writing, supports the Inventor's request for title of this invention. A...

403

DOE Issues Final Request for Proposal for Oak Ridge Transuranic...  

Office of Environmental Management (EM)

Oak Ridge Transuranic Waste Processing Center Services DOE Issues Final Request for Proposal for Oak Ridge Transuranic Waste Processing Center Services October 14, 2014 - 2:16pm...

404

Felix Storch: Data Request/Warning (2010-SCE-0111)  

Broader source: Energy.gov [DOE]

DOE requested test data from Felix Storch for several models of refrigerators and freezers and issued a warning of inconsistent information provided in Felix Storch's certification reports.

405

2015 INL TECH BASED ECONOMIC DEVELOPMENT DONATION REQUEST FORM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INL TECH BASED ECONOMIC DEVELOPMENT DONATION REQUEST FORM Regional Economic Development, Entrepreneurship, Technology-Based Economic Development & Innovation Return form to...

406

Microsoft Word - Request to Invoke Dispute Resolution Related...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mr. James Bearzi Hazardous Waste Bureau New Mexico Environment Department 2905 E. Rodeo Park Drive, Bldg. 1 Santa Fe, NM 87502 Subject: Request to Invoke Dispute Resolution...

407

Request for Information on Improving Performance of Federal Permitting...  

Broader source: Energy.gov (indexed) [DOE]

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

408

FY 2012 Budget Request Advanced Research Projects Agency - Energy...  

Energy Savers [EERE]

Budget Request Patricia A. Hoffman, Assistant Secretary February 13, 2012 Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy...

409

FY 2012 Budget Request Advanced Research Projects Agency - Energy...  

Energy Savers [EERE]

April 10, 2013 FY 2014 Budget Request Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy Reliability 2 The Importance of a Modern Grid...

410

FY 2012 Budget Request Advanced Research Projects Agency - Energy  

Energy Savers [EERE]

March 4, 2014 FY 2015 Budget Request Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy Reliability 2 The Importance of a Modern Grid...

411

DOE Issues Request for Information on Biological Hydrogen Production...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Fuel Cell Technologies Office has issued a request for information (RFI) seeking feedback from interested stakeholders regarding biological hydrogen production research and...

412

Request For Records Disposition Authority-Nuclear Weapons | Department...  

Broader source: Energy.gov (indexed) [DOE]

Authority-Nuclear Weapons Request For Records Disposition Authority-Nuclear Weapons This document identifies the nuclear weapon records generated by the Department of Energy's...

413

Response to several FOIA requests- Renewable Energy pages 4001- 4250  

Broader source: Energy.gov [DOE]

Response to several FOIA requests - Renewable Energy. nepdg_4001_4250.pdf R.eport Statement/Recommendation Background Pros/Cons discussion

414

Request for Proposal for Testing and Inspection Services RFP...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 National Renewable Energy Laboratory Managed and Operated by the Alliance for Sustainable Energy, LLC Request for Proposals Number RHB-4-42432 "Service Agreement for Testing and...

415

EERE FY 2015 Budget Request Webinar -- Transportation | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Webinar -- Transportation EERE FY 2015 Budget Request Webinar, featuring Reuben Sarkar, Deputy Assistant Secretary for Transportation, Office of Energy Efficiency and...

416

Financial Institution Request for Proposals and Selection Process  

Broader source: Energy.gov [DOE]

A state or local government typically conducts a competitive procurement procedure to award loan loss reserve (LLR) funds to a financial institution partner. The request for proposals (RFP)...

417

Climate Action Champions Request for Applications Informational Webinar  

Office of Energy Efficiency and Renewable Energy (EERE)

This Webinar will provide prospective Applicants with an overview of the Climate Actions Champions Request for Applications, the application process and respond to questions posed by attendees.

418

Request for Rehearing and Request for Interim Clarification by David K.  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department of EnergyReportingRequest|Request forPaylor,

419

Florida Power and Light Comments on Smart Grid Request For Information...  

Broader source: Energy.gov (indexed) [DOE]

Florida Power and Light Comments on Smart Grid Request For Information (RFI): Addressing Policy & Logistical Challenges. Florida Power and Light Comments on Smart Grid Request For...

420

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design  

E-Print Network [OSTI]

the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental]. The development of security This material is based in part upon work supported by NSF grants IIS- 0904501 and CPS

Bullo, Francesco

422

Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

Won-Ho Kye; M. S. Kim

2006-02-24T23:59:59.000Z

423

An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol  

E-Print Network [OSTI]

This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

Osamu Hirota; Kaoru Kurosawa

2006-04-06T23:59:59.000Z

424

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

425

DEFENDING AGAINST PHYSICAL DESTRUCTION ATTACKS ON WIRELESS SENSOR Chi Zhang, Yanchao Zhang, Yuguang Fang  

E-Print Network [OSTI]

with stealth by moving across the ROI. Physical attacks are inevitable threats in WSNs: they are relatively, and should be an inseparable complementarity of the report about the observed events in the ROI. Secondly

Zhang, Yanchao

426

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network [OSTI]

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

427

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network...

Ramanathan, Anu

2002-01-01T23:59:59.000Z

428

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

429

Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks  

SciTech Connect (OSTI)

Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

2011-11-15T23:59:59.000Z

430

Beamsplitting attack to the revised KKKP protocol and a possible solution  

E-Print Network [OSTI]

We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

2006-03-15T23:59:59.000Z

431

Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system  

E-Print Network [OSTI]

We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

Li Yang; Bing Zhu

2013-05-24T23:59:59.000Z

432

Efficiency of attack strategies on complex model and real-world networks  

E-Print Network [OSTI]

We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

Bellingeri, Michele; Vincenzi, Simone

2013-01-01T23:59:59.000Z

433

Office use only Data Protection Act -Personal Information Request Form  

E-Print Network [OSTI]

Office use only Data Protection Act - Personal Information Request Form (Subject Access Request for them to obtain more detailed information in order to locate the correct personal data. I understand-mail us at legal-compliance@kcl.ac.uk. We are not a public department and so cannot accept personal

Applebaum, David

434

Single Payment Vendor Number Request Page 1 of 1  

E-Print Network [OSTI]

Single Payment Vendor Number Request UM 1676 Page 1 of 1 Please Type or Print Clearly MUST BE COMPLETED BY THE CLUSTER DIRECTOR This is a one-time request for a cluster-specific single vendor payment payments to human subjects or refunds of deposits or as directed by Disbursement Services. This vendor

Weiblen, George D

435

T:\\PTSData\\ParkingRequest\\Disabled Permit Disabled Student Services  

E-Print Network [OSTI]

T:\\PTSData\\ParkingRequest\\Disabled Permit Disabled Student Services Temporary Disabled Person Parking Permit Request Form Parking & Transportation Services (657) 278-3082 / Fax (657) 278-4533 Temporary Disabled Person permits will be issued after completion of Section II by Disabled Student Services

de Lijser, Peter

436

Summer Student Job post A Request No of Student: 2  

E-Print Network [OSTI]

1 Summer Student Job post A Request No of Student: 2 Location: Tainan Qualification for Summer. Analytical technician: Use analytical equipment to measure optical properties of films (PVD) 3. Other hands B Request No of Student: 2 Location: Taichung Qualification for Summer Student Education Master

Lin, Jason Yi-Bing

437

Request an Inspection of User Electrical Equipment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories » Removing nuclearReportingJ. BennettTO REQUEST

438

NREL: State and Local Governments - Request Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn F. Geisz, Ph.D.SolarRequest Assistance Subscribe to

439

Request For Records Disposition | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department of EnergyReportingRequest For

440

Request For Records Disposition | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department of EnergyReportingRequest ForSpent Nuclear

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude' |Requests | National Nuclear Security Administration

442

FOIA-INCOMING Request March 2009  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResourcesFLASH2011-11-OPAM FLASH2011-11-OPAMDepartment of Energy FOIA Requests

443

Hybrid Automatic Repeat Request Scheme With Turbo Codes  

E-Print Network [OSTI]

A novel hybrid automatic repeat request system based on turbo codes, called turbo HARQ system, is proposed. The iterative turbo decoding procedure is exploited to request retransmission of not decodable blocks without the necessity of an outer error--detecting code. It is shown that the turbo HARQ scheme with code rate R c = 1=2 and interleaver length 1024 significantly outperforms the classical turbo coding scheme --- especially for low SNR --- without essential loss in throughput. 1 INTRODUCTION Automatic repeat request (ARQ) protocols are well--known methods to achieve high reliability in digital transmission schemes. The information is protected by an error--detecting block code. If the decoder detects an erroneous transmitted block, retransmission of this block is requested via a feedback channel which is assumed to be error--free throughout this paper. Additionally, the request is assumed to be repeated until the decoder detects error--free transmission. The great advantage of s...

Jozef Hamorsky; Udo Wachsmann; Johannes B. Huber; Anton Cizmar

444

NON-UNIVERSITY FUNDING A non-University funding request is defined as any funds requested from an organization, business,  

E-Print Network [OSTI]

NON-UNIVERSITY FUNDING A non-University funding request is defined as any funds requested from@clemson.edu. Procedures 1. Recognized student organizations seeking non-university funding of more than $1 reflects the proper funds. All University and state spending guidelines must be followed. The Annual Giving

Stuart, Steven J.

445

Submitting a Vendor Request 1. Click on `Vendor Request' in the Oracle E-Business Suite screen  

E-Print Network [OSTI]

Submitting a Vendor Request 1. Click on `Vendor Request' in the Oracle E-Business Suite screen 2. Search for the vendor to make sure they're not already in the system (remember to use the wildcard % symbol to make your search more thorough). 3. If the vendor you're trying to set up does not come up

446

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

447

898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 Most Active Band (MAB) Attack and Countermeasures in a  

E-Print Network [OSTI]

) Attack and Countermeasures in a Cognitive Radio Network Nansai Hu, Student Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Joseph Mitola, Fellow, IEEE Abstract--This paper investigates a type of attacks on a cognitive radio (CR) network, most active band (MAB) attack, where an attacker or a malicious CR node senses

Yang, Eui-Hyeok

449

Copy 1 Purchasing Copy 2 Residence Hall Director Request for Reimbursement  

E-Print Network [OSTI]

copy to the Purchasing Office. 3. The Purchasing Director will review the "Request for RequestCopy 1 ­ Purchasing Copy 2 ­ Residence Hall Director MU 6/94 Request for Reimbursement For Damages: _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ #12;Copy 1 ­ Purchasing Copy 2 ­ Residence Hall Director PROCEDURES FOR REQUESTING REIMBURSEMENT

Hardy, Christopher R.

450

Training Request Form Administration Training Services, Organizational Effectiveness/OHR 612-626-1373 ULearn  

E-Print Network [OSTI]

Training Request Form Administration Training Services, Organizational Effectiveness/OHR · 612-626-1373 ULearn www.umn.edu/ohr/trainingservices 5-17-12 A Training Request Forms are designed to obtain additional information from a learner when requesting training in ULearn. The Training Request Form

Minnesota, University of

451

31/08/2010 13:44A misguided attack on kin selection Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/  

E-Print Network [OSTI]

31/08/2010 13:44A misguided attack on kin selection « Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/ « I swear I was Egyptian! Relevant readings » A misguided attack on kin selection I don't know what's gotten into E. O. Wilson. He's certainly the world

Gardner, Andy

452

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

453

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols  

E-Print Network [OSTI]

Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

2011-04-20T23:59:59.000Z

454

Request for Mediation Intake Form | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L dDepartmentnews-flashesEnergyRequest ForRequest forRequest for

455

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

456

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

457

Deterministic quantum-public-key encryption: forward search attack and randomization  

E-Print Network [OSTI]

In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

Georgios M. Nikolopoulos; Lawrence M. Ioannou

2009-03-27T23:59:59.000Z

458

Machine Learning for Power System Disturbance and Cyber-attack Discrimination  

SciTech Connect (OSTI)

Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

Borges, Raymond Charles [ORNL; Beaver, Justin M [ORNL; Buckner, Mark A [ORNL; Morris, Thomas [Mississippi State University (MSU); Adhikari, Uttam [ORNL; Pan, Shengyi [Mississippi State University (MSU)

2014-01-01T23:59:59.000Z

459

Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches  

SciTech Connect (OSTI)

In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

460

Predicting the effect of climate change on wildfire behavior and initial attack success  

SciTech Connect (OSTI)

This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

2007-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect (OSTI)

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL] [ORNL

2012-01-01T23:59:59.000Z

462

FY 1997 congressional budget request: Budget highlights  

SciTech Connect (OSTI)

This is an overview of the 1997 budget request for the US DOE. The topics of the overview include a policy overview, the budget by business line, business lines by organization, crosswalk from business line to appropriation, summary by appropriation, energy supply research and development, uranium supply and enrichment activities, uranium enrichment decontamination and decommissioning fund, general science and research, weapons activities, defense environmental restoration and waste management, defense nuclear waste disposal, departmental administration, Office of the Inspector General, power marketing administrations, Federal Energy Regulatory commission, nuclear waste disposal fund, fossil energy research and development, naval petroleum and oil shale reserves, energy conservation, economic regulation, strategic petroleum reserve, energy information administration, clean coal technology and a Department of Energy Field Facilities map.

NONE

1996-03-01T23:59:59.000Z

463

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting  

E-Print Network [OSTI]

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting agency with information regarding tuition as unallowable must____________________________________________________________ Project Name __________________________________________________________________ Funding Agency

Taylor, Jerry

464

Detecting and Blocking Network Attacks at Ultra High Speeds  

SciTech Connect (OSTI)

Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

Paxson, Vern

2010-11-29T23:59:59.000Z

465

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

-- - , 1 .3 t fLU4 ' I 04 - -t - rt . .5 * * STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE...

466

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

DOE COOPERATIVE AGREEMENT NO. DE-FC36-94GO10004; W(A)-94-034; CH-0844 The Petitioner, Air Products and Chemicals, Inc. has requested a waiver of domestic and foreign patent...

467

STATEMENT OF CONSIDERATIONS REQUEST BY H2GEN INNOVATIONS, INC...  

Broader source: Energy.gov (indexed) [DOE]

DE-FC04-02AL67613, DOE WAIVER NO. W(A) 02-021. The Petitioner, H2Gen, a subcontractor to Air Products & Chemicals, Inc. (Air Products), has requested a waiver of all domestic and...

468

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

IPL DOE CH 630 252 2779 TO AGCP-HQ P.0204 * * STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER ITS SUBCONTRACT WITH THE GLASS...

469

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC., FOR AN...  

Broader source: Energy.gov (indexed) [DOE]

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC., FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-01NT41147;...

470

STATEMENT OF CONSIDERATION REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER SUBCONTRACT QZ001 UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-00NT40795; W(A)-00-025,...

471

WATEMENT OF CONSIDERAJNS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

WATEMENT OF CONSIDERAJNS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-00NT40756; W(A)-00-018,...

472

DOE Issues Request for Information on Fuel Cells for Continuous...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Fuel Cells for Continuous On-Board Recharging for Battery Electric Light-Duty Vehicles DOE Issues Request for Information on Fuel Cells for Continuous On-Board Recharging for...

473

STATEMENT OF CONSIDERATIONS REQUEST BY SIEMENS SOLAR INDUSTRIES...  

Broader source: Energy.gov (indexed) [DOE]

UNDER DOE CONTRACT NO. DE- AC36-83CH10093; W(A)-98-019; CH-0987 The Petitioner, Siemens Solar Industries (hereinafter "SSI"), has requested a waiver of domestic and foreign...

474

STATEMENT OF CONSIDERATIONS REQUEST BY DOW CORNING CORPORATION...  

Broader source: Energy.gov (indexed) [DOE]

the foregoing reasons, and in view ofthe objectives and considerations set forth in 10 CFR 784, all ofwhich have been considered, it is recommended that the requested waiver be...

475

REQUEST BY CATERPILLAR INC. FOR AN ADVANCE WAIVER OF DOMESTIC...  

Broader source: Energy.gov (indexed) [DOE]

of cost sharing by Caterpillar and the objectives and considerations set forth in 10 CFR 784.4, all of which have been considered, it is recommended that the requested waiver...

476

REQUEST BY UNITED TECHNOLOGIES CORPORATION, PRATT & WHITNEY MILITARY...  

Broader source: Energy.gov (indexed) [DOE]

of Petitioner products . In view of the objectives and considerations set forth in 10 CFR 784.4 , all of which have been considered , it is recommended that the requested waiver...

477

STATEMENT OF CONSIDERATIONS REQUEST BY DELPHI AUTOMOTIVE SYSTEMS...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR Part 784, all of which have been considered, it is recommended that the requested...

478

STATEMENT OF CONSIDERATIONS REQUEST BY PARKER HANNIFIN CORPORATION...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR Part 784, all of which have been considered, it is recommended that the requested...

479

STATEMENT OF CONSIDERATIONS REQUEST FOR ADVANCE WAIVER OF PATENT...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR 784, all of which have been considered, it is recommended that the requested waiver be...

480

STATEMENT OF CONSIDERATIONS REQUEST FOR ADVANCE WAIVER OF PATENT...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR 784, all of which have been conSidered, it is recommended that the requested waiver be...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

STATEMENT OF CONSIDERATIONS REQUEST BY INVENTOR FOR THE WAIVER...  

Broader source: Energy.gov (indexed) [DOE]

of the Waiver Petition and in view of the objectives and considerations set forth in 10 CFR 784, all of which have been considered, it is recommended that the requested waiver be...

482

STATEMENT OF CONSIDERATIONS REQUEST BY DR. F. JEFFREY MARTIN...  

Broader source: Energy.gov (indexed) [DOE]

of the Waiver Petition in view of the objectives and considerations set forth in 10 CFR 784, all of which have been considered, it is recommended that the requested waiver be...

483

STATEMENT OF CONSIDERATIONS REQUEST BY ABENGOA SOLAR INC. (ASI...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR 784, all of which have been considered, it is recommended that the requested waiver be...

484

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC GLOBAL...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR Part 784, all of which have been considered, it is recommended that the requested...

485

STATEMENT OF CONSIDERATIONS REQUEST BY INVENTOR ROSLYN HIGGINS...  

Broader source: Energy.gov (indexed) [DOE]

Petition for Waiver in view of the objectives and considerations as set forth in 10 CFR 784, it is recommended that the requested waiver be granted. :ell A. Pee:.: Patent...

486

STATEMENT OF CONSIDERATIONS REQUEST BY DRESSER WAUKESHA FOR AN...  

Broader source: Energy.gov (indexed) [DOE]

of the waiver petition and in view of the objectives and considerations set forth in 10 CFR Part 784, all of which have been considered, it is recommended that the requested...

487

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC GLOBAL...  

Broader source: Energy.gov (indexed) [DOE]

the waiver petition and in view of the objectives and considerati ons set fo rth in 10 CFR Part 784 , all of wh ich have been considered, it is recomme nded that the requested...

488

Department of Engineering Science REQUEST TO SCHEDULE DESIGN PROJECT PRESENTATION  

E-Print Network [OSTI]

Department of Engineering Science REQUEST TO SCHEDULE DESIGN PROJECT PRESENTATION Notes: 1. Before a student's design project presentation can be scheduled, the student must certify that the following steps. ----------------------------------------------------------------------------------------------------------- Student's name:_________________________________________________________ Design Project title

Ravikumar, B.

489

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate  

E-Print Network [OSTI]

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate Existing Consumer Behavioral research, evaluations and behavior change initiatives. The Northwest Energy Efficiency Alliance (NEEA interest groups and energy efficiency industry representatives that operate in the states of Idaho, Montana

490

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC COMPANY...  

Broader source: Energy.gov (indexed) [DOE]

REQUEST BY GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC36- 04G014223 ENTITLED "HI-WAY INITIATIVE IN NEW YORK";...

491

STATEMENT OF CONSIDERATIONS REQUEST BY PPG INDUSTRIES FOR AN...  

Broader source: Energy.gov (indexed) [DOE]

SUBCONTRACT QZOOl UNDER COOPERATIVE AGREEMENT DE-EE000167; W(A)-09-059 ; CH-1527 PPG lndustries requests an advance waiver of domestic and foreign patent rights for all subject...

492

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC COMPANY...  

Broader source: Energy.gov (indexed) [DOE]

REQUEST BY GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE- FC36-04GO14001 ENTITLED "DISTRIBUTED WIRELESS MULTI-SENSOR...

493

Best Practices for Developing and Implementing a Request for Proposal  

Broader source: Energy.gov [DOE]

This webinar will show attendees how to develop a request for proposal (RFP). It is held from 11 a.m. to 12:30 p.m. on July 29, 2015.

494

NC State Office of Information Technology PURCHASE REQUEST FORM  

E-Print Network [OSTI]

NC State Office of Information Technology PURCHASE REQUEST FORM Voucher #: Req #: PO#: Other: SHIP North Carolina State University Office of Information Technology Office of Information Technology Campus Quantity Product Description Unit Price Extended Price _______PLEASE RUSH Small Purchase Shipping

Liu, Paul

495

Microsoft Word - Final Class 2 Permit Modification Request TRUPACT...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PMR Permit Modification Request SLB2 standard large box 2 SWB standard waste box TDOP ten-drum overpack TRU transuranic WHB Waste Handling Building WIPP Waste Isolation Pilot...

496

STATEMENT OF CONSIDERATIONS REQUEST BY SIEMENS SOLAR INDUSTRIES...  

Broader source: Energy.gov (indexed) [DOE]

been considered, it is recommended that the requested waiver be granted. WAIVER ACTION - ABSTRACT W(A) -97-034 REUESTOR CONTRACT SCOPE OF WORK RATIONALE FOR DECISION DISPOSITION...

497

STATEMENT OF CONSIDERATIONS REQUEST BY DONNELLY CORPORATION FOR...  

Broader source: Energy.gov (indexed) [DOE]

the waived invention is suspended until approved in writing by the DOE. WAIVER ACTION - ABSTRACT W(A)-95-019; CH-0864 REQUESTER CONTRACT SCOPE OF WORK RATIONAL FOR DECISION...

498

Request to Fill for Support Staff Position Vacancy  

E-Print Network [OSTI]

Request to Fill for Support Staff Position Vacancy The position described below is: New [ ] Revised of positions to be filled _________ This position vacancy is externally funded [ ] Shift work or special by _____________________________________________ Date ________________________ Director, Budget Administration [ ] Vacancy Management approval required

Martin, Jeff

499

2004-05 Budget Request Presentation May 8, 2004  

E-Print Network [OSTI]

Financial Affairs 2004-05 Budget Request Presentation May 8, 2004 #12;1 Financial Affairs Mission Affairs Divisions Office of the Vice President University Budget Office Controller's Office & University Budget Director Processing and Records Employment Employee Relations Classification

Fernandez, Eduardo

500

New Request for Information (RFI) on Clean Energy Manufacturing...  

Broader source: Energy.gov (indexed) [DOE]

(RFI) on Clean Energy Manufacturing Topic Areas New Request for Information (RFI) on Clean Energy Manufacturing Topic Areas September 3, 2014 - 10:07am Addthis Save the Date -...