Powered by Deep Web Technologies
Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-151: Bugzilla Cross-Site Request Forgery Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

51: Bugzilla Cross-Site Request Forgery Vulnerability 51: Bugzilla Cross-Site Request Forgery Vulnerability U-151: Bugzilla Cross-Site Request Forgery Vulnerability April 19, 2012 - 8:15am Addthis PROBLEM: A vulnerability has been reported in Bugzilla, which can be exploited by malicious people to conduct cross-site request forgery attacks. PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. reference LINKS: Vendor Advisory Secunia Advisory 48835 CVE-2012-0465 CVE-2012-0466 IMPACT ASSESSMENT: Medium Discussion: When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout policy allowing a possible brute-force discovery of a valid user password. An attacker can get access to some bug information using the victim's

2

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Broader source: Energy.gov (indexed) [DOE]

8: Cisco Wireless Lan Controller Cross-Site Request Forgery 8: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability December 17, 2012 - 1:00am Addthis PROBLEM: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN Controller. REFERENCE LINKS: SecurityTracker Alert ID: 1027886 Secunia Advisory SA51546 CVE-2012-5991 CVE-2012-5992 CVE-2012-6007 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the

3

U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

4

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

5

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

6

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

7

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

8

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

9

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

10

FSAAWG, ROME 2011 1 Synthetic Voice Forgery in the Forensic Context: a  

E-Print Network [OSTI]

FSAAWG, ROME 2011 1 Synthetic Voice Forgery in the Forensic Context: a short tutorial Guillaume Paristech, dép. TSI 37-39 rue Dareau 75014 PARIS Abstract--Technical voice forgery in the forensic area has, the forensic context is quite different since the human ear might be able to detect a synthetic voice, thus

Paris-Sud XI, Université de

11

The So-Called Velasco Map: A Case of Forgery?  

E-Print Network [OSTI]

Coordinates Series A, No. 5 The So-Called ?Velasco Map?: A Case of Forgery? Persistent URL for citation: http://purl.oclc.org/coordinates/a5.pdf Date of Publication: 02/14/06 Revised: David Y. Allen David Y. Allen (e-mail: dyallen2@aol... and Southeastern Canada at the end of the first decade of the seventeenth century.[1] Page 2 Figure 1. The Velasco Map. Source: Stokes, Iconography of Manhattan Island. High resolution image available at http://www.she-philosopher.com/gallery/1610mapC1...

Allen, David Y.

2006-02-14T23:59:59.000Z

12

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC  

E-Print Network [OSTI]

, the distin- guisher on Alred construction is also applicable to the MACs based on CBC and CFB encryption mode

13

Commentary to "The So-Called Velasco Map: A Case of Forgery?"  

E-Print Network [OSTI]

Coordinates Series B, No.5 Commentary to "The So- Called Velasco Map: A Case of Forgery?" Persistent URL for citation: http://purl.oclc.org/coordinates/b5.pdf Date of Publication: 02/14/06 Revised: Kirsten A. Seaver Kirsten A. Seaver (seaver@stanford....edu) is an independent researcher and author. Her most recent book is Maps, Myths, and Men: The Story of the Vinland Map (Stanford University Press, 2004). Abstract This article discusses David Y. Allen, "The So-Called Velasco Map: A Case of Forgery...

Seaver, Kirsten A.

2006-02-14T23:59:59.000Z

14

A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis  

Science Journals Connector (OSTI)

In this paper, we present a passive approach for effective detection and localization of region-level forgery from video sequences possibly with camera motion. As most digital image/video capture devices do not have modules for embedding watermark or ... Keywords: Exemplar-based texture synthesis, Passive video forgery detection, Region-level inpainting, Spatio-temporal slice analysis, Temporal copy-and-paste

Cheng-Shian Lin, Jyh-Jong Tsay

2014-06-01T23:59:59.000Z

15

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

16

Defending networked resources against floods of unwelcome requests  

E-Print Network [OSTI]

The Internet is afflicted by "unwelcome requests'" defined broadly as spurious claims on scarce resources. For example, the CPU and other resources at a server are targets of denial-of-service (DOS) attacks. Another example ...

Walfish, Michael Howard

2008-01-01T23:59:59.000Z

17

Research deciphers HIV attack plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights...

18

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

19

Efficient template attacks  

E-Print Network [OSTI]

joint MD , d joint LINEAR. 6 Evaluation of Methods We evaluated the efficiency of many template-attack variants on a real hard- ware platform, comparing all the compression methods from Table 110 and all 9 MATLAB, single core CPU with 3794 MIPS. 10 We... implementing template attacks. Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts at: http://www.cl.cam.ac.uk/research/security/datasets/grizzly/ Acknowledgement: Omar Choudary is a...

Choudary, Omar; Kuhn, Markus G.

2014-01-01T23:59:59.000Z

20

Funeral Leave Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FUNERAL LEAVE REQUEST (Supplement to Annual or Sick Leave Request) Employee's Name (Please Print) Date Request Submitted: Name of deceased family member: Relationship: Place of death:

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Seven Deadliest Wireless Technologies Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, ...

Brad Haines

2010-03-01T23:59:59.000Z

22

Seven Deadliest Unified Communications Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified ...

Dan York

2010-06-01T23:59:59.000Z

23

Information Request  

Broader source: Energy.gov (indexed) [DOE]

November 25, 2008 November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel Management and Disposal Act" submitted to Congress March 6, 2007 3. State-by-State Maps that outline each state's electricity generation mix, commercial spent nuclear fuel inventories, and payments into the Nuclear Waste Fund The additional information on the history of the use of engineered barriers will be

24

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

25

Personal Information Request Request for Personal Information  

E-Print Network [OSTI]

Personal Information Request Request for Personal Information Request for Correction of Personal Information Personal information on this form is collected under Newfoundland and Labrador's Access to Information and Protection of Privacy (ATIPP) Act and will be used to respond to a request for, or correction

deYoung, Brad

26

Information Request | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Request Information Request Information Request, November 25, 2008, Testimony, RWAdditionalInformation.pdf Information Request More Documents & Publications The Report To The...

27

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMUs are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

28

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

29

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

30

ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire  

E-Print Network [OSTI]

ENERGY EXCEPTION REQUEST Energy Exception Request Questionnaire rev AA.01 2013/04/02 GUIDELINES which exceed the normal schedule by completing this Energy Exception Request and submitting it to the Office of Energy Management. Energy Management will prepare a cost analysis and return

Rock, Chris

31

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

32

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

33

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

34

REQUESTS FOR RETIREMENT ESTIMATE  

Broader source: Energy.gov (indexed) [DOE]

REQUEST FOR RETIREMENT ANNUITY ESTIMATE REQUEST FOR RETIREMENT ANNUITY ESTIMATE Instructions: Please read and answer the following questions thoroughly to include checking all applicable boxes. Unanswered questions may delay processing. Print and Fax back your request form to 202.586.6395 or drop request to GM-169. The request will be assigned to your servicing retirement specialist. They will confirm receipt of your request. SECTION A Request Submitted _____________________ ______________________ ________________________ _____________________ Name (last, first, middle) Last four SSN Date of Birth ___________________________ _________________________ __________________________ Organization Office Telephone Number Fax Number

35

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

36

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

37

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

38

FOIA Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

You are here: DOEID Home > FOIA > FOIA Request Form You are here: DOEID Home > FOIA > FOIA Request Form U.S. Department of Energy Idaho (DOE-ID) Operations Office Electronic FOIA Request Form* To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. For individuals making a request for personal records under FOIA or the Privacy Act, please fill out the Privacy Act Request Form ( This link opens an 14 kb size Adobe Acrobat File 15 kb), print out the form and have your identity validated by having the form notarized and send the form to DOE-Idaho Privacy Officer, 1955 Freemont Avenue, Mail Stop 1203, Idaho Falls, ID 83405. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form.

39

An Attack on Centrifugal Costs  

E-Print Network [OSTI]

AN ATTACK ON CENTRIFUGAL COSTS j P. ~,t~~c1ier Mwra~ I Mons'anto ' Alvin, 'ie~as I ABSTRACT Energy conservation in small and medium horse power industrial centrifugal power users has re ceived very little attention to date. Monsanto...

Murray, P. F.

40

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Modeling attacks on physical unclonable functions  

E-Print Network [OSTI]

We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm ...

Ulrich, Ruhrmair

42

Request For Records Disposition | Department of Energy  

Office of Environmental Management (EM)

Request For Records Disposition Request For Records Disposition Southeastern Power Administration (SEPA) Request For Records Disposition More Documents & Publications Audit...

43

Visitor Hanford Computer Access Request - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Email Email Page |...

44

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

45

WIPP - Frequently Requested Records  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FOIA Quick Links FOIA Home Page What is a FOIA? How to Submit A FOIA Request Cost of a FOIA Request Electronic FOIA Request Form FOIA Annual Reports FOIA Public Reading Facilities/Electronic Reading Facilities FOIA Requester Service Centers and FOIA Public Liaisons FOIA Reading Room FOIA Requests Received and Estimated Completion Dates FOIA Requests Received by the Carlsbad Field Office since 2009 5 U.S.C. § 552 10 CFR 1004 Fiscal Year FOIA Annual Reports for DOE Carlsbad Field Office FOIA 2009 Fiscal Year Annual Report FOIA 2008 Fiscal Year Annual Report FOIA 2007 Fiscal Year Annual Report FOIA 2006 Fiscal Year Annual Report FOIA 2005 Fiscal Year Annual Report FOIA 2004 Fiscal Year Annual Report FOIA 2003 Fiscal Year Annual Report FOIA 2002 Fiscal Year Annual Report

46

Retirement Plaque Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Retirement Plaque Request Form Retirement Plaque Request Form Fill out a separate form for each plaque requested. Allow two weeks for delivery. If you have any questions, please call Rudy Bartolo, Retirement Plaque Coordinator at ext. 5558. FORM MUST BE SUBMITTED (mailed or faxed) in order for work to commence. Return form to Retirement Plaque Coordinator, Mailstop 77R0125, or fax 4993. Please Print Clearly Requester's Name:_______________________________ Extension:_______________ Mail Stop: ________________ Today's date:__________________ With Frame _____ Without Frame_____ Date Needed: ________________________ Full name as it is to appear on plaque:_________________________________________ Number of years employed at Lab:______________ Beginning and ending dates of employment: ____________________________________

47

FY 2007 Congressional Request  

Office of Environmental Management (EM)

FY 2006 Appropriation FY 2007 Request Laboratory Table 70 Naval Petroleum and Oil Shale Reserves Naval Petroleum and Oil Shale Reserves Naval Petroleum and Oil Shale...

48

FY 2012 FOIA Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Comments: Records sent. Ex 4. CLOSED FOIA Request BPA Letter BPA Documents 2012-00676 BPA Substation Design related to direct stroke lightning shieldking of substations...

49

FY 2011 FOIA Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

11292010 Date Due: 12282010 Date Completed: 142011 FOIA Request BPA Letter BPA Documents 2011-00304 Bald Mountain substation, EFSEC Drach, Thomas Date Received: 11...

50

FY 2010 FOIA Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0-FOIA-Requests Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives Finance &...

51

Travel Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lodging Lodging Transportation SNAP COLLABORATION MEETING JUNE 1 - 3, 2006 TRAVEL FUNDING REQUEST FORM If you require Travel funding support from LBNL to attend the SNAP Collaboration Meeting, please fill out the travel request form below and click on the "SEND" button. As an alternative, you can simply email the requested information on the form to snap@lbl.gov Deadline: Please submit your request NLT Wednesday, May 10, 2006. Disclaimer: Please note that the submission of this request does not automatically constitute funding approval. 1. First Name Last Name 2. Has this travel funding support been pre-approved by the SNAP management? Yes No 3. If answer to #2 is "Yes": a) Approval by whom? b) What was the maximum reimbursement amount from SNAP?

52

Frequently Requested Documents  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Frequently Requested Documents Frequently Requested Documents Frequently Requested Documents This is an index of frequently requested documents provided by the Department of Energy Idaho Operations Office. You must use the Adobe Acrobat file reader to read the files. If you do not have the reader you can download it free from http://get.adobe.com/reader/. FOIA Requests Received by DOE-ID in 2013 (pdf) April - ID-2013-00854 AMWTP - Charcoal filter breakdown in PAPRs - 600 KB Adobe Acrobat Icon Employee Concern - 135 KB Adobe Acrobat Icon All Hands Feedback - 63 KB Adobe Acrobat Icon AMWTP Employee Concern Ltr 1 - 70 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 43 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 69 KB Adobe Acrobat Icon

53

Disk Quota Increase Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disk Disk Quota Increase Disk Quota Increase Request NERSC will consider reasonable requests for changes in disk space and inode limits. Please submit a request through the "Request Forms" section at the NERSC help portal. If you select "Hopper scratch directory" from the "File System" menu below, the quota value requested applies to the combined contents of $SCRATCH and $SCRATCH2. Please ask for the least amount of resources you need, since the sum of disk space and inodes allocated to users already exceeds system capacity. In other words, system resources would be exhausted before all users could use their existing quotas. You can find out the current quotas and usage of disk space and inodes for your home and scratch file systems with the myquota command. You can find

54

DOE FOIA Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Administration FOIA Request Form Administration FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: (Required) Organization: Address: (Required) Phone: FAX: Email: Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that you provide, the better the opportunity there is to determine if the

55

Practical Attacks on Proximity Identification Systems  

E-Print Network [OSTI]

DEFCON ­ eavesdropped RFID at 20 m Confusion ?? RFID type Definition of distances Experimental setup skimming) Relay Attacks Practical Attacks on Proximity Identification Systems ­ p. #12;"Proximity from distance dE Further considerations dRT , Reader Token communication dTR, Token Reader

Hancke, Gerhard

56

FOIA Request - June 2008  

Broader source: Energy.gov (indexed) [DOE]

02, 2008 2:33 PM 02, 2008 2:33 PM FOIA-Central DOE Headquarters FOIA Request Name:~el L. Krista~ Organization: Chaper 228, NTEU Address: NATIONAL TREASURY EMPLOYEES UNION Chapter 228 P.O. Box 2283 Germantown, MD 20874 Phone: 3019037143 FAX: 3019031758 Email: joel.kristal@em.doe.gov Record Description: RE: The~partmeiliof Energy's failure to comply with the Federal Code of Regulations 5 U.S.C. 7114(b) (4) The 7114 information request provides information relevant and necessary to rep ent Bargaining Unit Employees. This request is made under the Freedom of Information Act by Chapter 228 of the National Treasury Employees Union. We request the following information from January 1, 1998 to the June 1, 2008 for DOE Headquarters Union Chapters (i.e., Germantown and Forrestal) and every DOE site which has

57

FOIA Request - January 2008  

Broader source: Energy.gov (indexed) [DOE]

Tuesday, January 01, 2008 7:11 PM Tuesday, January 01, 2008 7:11 PM FOrA-Central DOE Headquarters FOIA Request Name: §~ Clements ] Organization: Friends of the Earth Address: 2736 Blossom Street Columbia, SC 29205 Phone: FAX: Email: 1 Record Description: January 1, 2008 Freedom of Information Officer U.S. Department of Energy Washington, DC 20585 RE: FOIA Request on DOE's Waste Solidification Building at SRS To Whom it May Concern - This is a request being made on behalf of the non-profit public-interest organization Friends of the Earth (FOE) under the Freedom of Information Act (FOIA), as amended. This request is being made under new revisions to the Freedom of.Information Act, recently passed by Congress and signed into law by President Bush in December 2007. If new regulations have not yet been finalized by the Department of Energy (DOE) to comply

58

Request For Records Disposition | Department of Energy  

Office of Environmental Management (EM)

Request For Records Disposition Request For Records Disposition Spent Nuclear Fuels Request For Records Disposition More Documents & Publications The Report To The President And...

59

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

60

Injection Technologies for Fault Attacks on Microprocessors  

Science Journals Connector (OSTI)

The fault injection technique we will analyze in detail in Sect.16.3, is the constant under-powering of a computing device. By running the chip with a depleted power supply, the attacker is able to insert transi...

Alessandro Barenghi; Guido M. Bertoni; Luca Breveglieri

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

62

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

63

BPA-2012-00940-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- Phase 2 COntract 28333 Release 19 Bidding Document Source Document Requested: Contracting officers request for offer including Geotechnical Reportreference supplemental...

64

FOIA Request - August 2008  

Broader source: Energy.gov (indexed) [DOE]

Name:~semary L~ Name:~semary L~ Organization: Input Address: FOIA-Central@hq.doe.gov Tuesday, August 05,200810:18 AM FOIA-Central DOE Headquarters FOJA Request 11720 Plaza America 12th FL Reston, VA 20190 Phone: 703-707-3500 FAX: 703-707-6201 Email: rlaw@input.com Record Description: 11720 Plaza America Drive, 12th Floor Reston, VA 20190 Tel: (703) 707-3500 Fax: (703) 707-6201 www.input.com Freedom of Information Act (FOIA) ID# 9401 Dear FOIA Officer, AUG 0 5 2008 OZ- Under the Freedom of Information Act, 5 U.S.C. § 552, as amended, I am requesting clearly releasable portions of the documents regarding all contracts awarded under~tract # DEAC0494AL85001 the STRATEGICALLY HARDENED FACILITY DEFEAT (SHFD) requirement, awarded to Sandia Nationai Laboratory. Specifically, I am requesting copies of the following

65

Compute Reservation Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Queue Look Queue Wait Times Hopper Queues and Policies Edison Queues and Policies Carver Queues and Policies Dirac Queues and Policies Compute Reservation Request Form Job Logs & Analytics Training & Tutorials Software Accounts & Allocations Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home » For Users » Queues and Scheduling » Compute Reservation Request Form Compute Reservation Request Form

66

FOIA Request - September 2008  

Broader source: Energy.gov (indexed) [DOE]

September 01, 2008 9:29 PM September 01, 2008 9:29 PM FOIA-Central DOE Headquarters FOIA Request Name~illiam Trimbli) Organization: individual Address: Phone: FAX: Email : Record Description: S£ P0 2 20 0 86{ I request a copy of each of the/Contracts between uc~go Argonne, LLC and Pontarelli Group Charter, Inc., of Chicago,~L, that were signed or renewed in fiscal year 20~ Preferred Form or Format: Type of Requester (if provided) : An individual seeking information for personal use and not for commercial use. Fees and Fee Waivers: I agree to pay up to a specified amount for fees. Enter amount $ 75 Waiver or Reduction of Fees Factors (if provided): Expedited Processing: Specific Justification for Expedited Processing: 1 Morris. Alexander From: FOIA-Central@hq.doe.gov

67

FOIA Request - February 2008  

Broader source: Energy.gov (indexed) [DOE]

Morris. Alexander Morris. Alexander From: Sent: To: Subject: FOIA-Central@hq.doe.gov Friday, February 01, 2008 11 :50 AM FOIA-Central DOE Headquarters FOIA Request Name:lf~te Win~/senior Writer and Investigative Reporter Organization: Cybercast News Service Address: 325 S. Patrick Street Alexandria, VA 22314 Tel: 703-302-8352 E-Mail: pwinn@mediaresearch.org Phone: 7033028352 FAX: Email: pwinn@mediaresearch.org Record Description: RE: Freedom of Information Act Request Dear Sir or Madam I am a senior writer and investigative reporter for Cybercast News Service researching a news story for CNSNews.com. Pursuant to the Freedom of Information Act (5 U.S.C. Section 552), I request that the U.S. Department of Energy produce~ll correspondence, memoranda, documents, reports~ records,

68

EERE FY 2016 Budget Request  

Office of Energy Efficiency and Renewable Energy (EERE)

EERE FY 2016 Budget Request, from the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy.

69

SWS Variance Request  

Broader source: Energy.gov [DOE]

As Grantees update and revise their field standards to align with the SWS, they may discover certain specifications that cannot be implemented precisely as described in the relevant SWS. In such cases, Grantees may request a variance from the relevant SWS.

70

User_ApproveTrainingRequest  

Broader source: Energy.gov (indexed) [DOE]

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

71

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Broader source: Energy.gov (indexed) [DOE]

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information...

72

NEUP Student Travel Request Form | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Student Travel Request Form NEUP Student Travel Request Form NEUP Fellowship Travel Request Form Student Travel Request Form.pdf More Documents & Publications Investing in the next...

73

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Request for Records Disposition Authority REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications Request For Records Disposition Authority Request For Records...

74

When Utility Bills Attack! | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

75

Zero-knowledge against quantum attacks  

E-Print Network [OSTI]

This paper proves that several interactive proof systems are zero-knowledge against quantum attacks. This includes a few well-known classical zero-knowledge proof systems as well as quantum interactive proof systems for the complexity class HVQSZK, which comprises all problems having "honest verifier" quantum statistical zero-knowledge proofs. It is also proved that zero-knowledge proofs for every language in NP exist that are secure against quantum attacks, assuming the existence of quantum computationally concealing commitment schemes. Previously no non-trivial proof systems were known to be zero-knowledge against quantum attacks, except in restricted settings such as the honest-verifier and common reference string models. This paper therefore establishes for the first time that true zero-knowledge is indeed possible in the presence of quantum information and computation.

John Watrous

2005-11-03T23:59:59.000Z

76

Responding to chemical attack. Final report  

SciTech Connect (OSTI)

In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

Bagley, R.W.

1991-02-11T23:59:59.000Z

77

FOIA Request - May 2008  

Broader source: Energy.gov (indexed) [DOE]

Kate S. Keane Kate S. Keane PIICINB: (202) 434·1641 EMAIL: KSKcane@perkinscoic.com April 28, 2008 VIA U.S. MAIL Kevin Hagerty Director, FOINP A Division, ME-73 Department of Energy 1000 Independence Ave., SW Washington, DC 20585 Re: Freedom of Information Act Request Dear Mr. Hagerty: perki~ Coie 607 Fourteenth Street N.W. Washington, D.C. 20005-2003 PHONE: 202.628.6600 FAX: 202.4341690 www.perkinscoie.com I am writing to request records, regardless of format, medium, or physical characteristics, and including electronic records and information, audiotapes, videotapes and photographs, pursuant to the Freedom ofInformation Act ("FOIA"), 5 U.S.C. §§ 552, et seg. Specifically, I am requestin~y record~(including correspondence)~lated to former Governor Mark

78

FOIA Request - November 2008  

Broader source: Energy.gov (indexed) [DOE]

FOIA-Central@hq.doe.gov FOIA-Central@hq.doe.gov Sent: To: Thursday, October 02,200810:40 AM FOIA-Central Subject: DOE Headquarters FOIA Request NameC:;ddie IVins~ Organization: AREVA NP Address: 3315 Old Forest Road, P.O. Box 10935 Lynchburg, VA 24506-0935 Phone: 434-832-3781 FAX: 434-382-3781 Email: eddie.ivins@areva.com Record Description: (Phase I of the applications for "Federal reference Number: DE-FOA-0000006.j Loan Guarantees for Nuclear Power Facitlies" Please provide the applications for NRG at the South Texas Project, Georgia Power for Vogtle and Dominion for North Anna. Preferred Form or Format: Electronic PDF Type of Requester (if provided): Affiliated with a private corporation and seeking information for the use in the company's business.

79

FOIA Request - July 2008  

Broader source: Energy.gov (indexed) [DOE]

30, 2008 5:23 PM 30, 2008 5:23 PM FOIA-Central DOE Headquarters FOIA Request Name: MrS~ajitha uppal~ Organization: FedSources, Inc. Address: 8400 Westpark Dr, 4th floor, McLean, VA 22102 Phone: 703-610-8745 FAX: Email: uppallir@fedsources.com Record Description: - JUt 01 20080/ Please provide all clearly releasable copy of any~tract awarded from solicitation # DERPOI06EE110261including statement of work. This is related to TECHNICAL ENGINEERING ANALYTICAL AND~NAGEMENT SUPPORT SERVICES program. The CO Benjamin Lardizabal can be reached at (202) 287-1479 or benjamin.lardizabal@hq.doe.gov. Preferred Form or Format: Electronic Format Type of Requester (if provided): Affiliated with a private corporation and seeking information for the use in the company's

80

FOIA Request - April 2008  

Broader source: Energy.gov (indexed) [DOE]

NTEU NTEU The National Treasury Employees Union Abel Lopez FOIA Officer Department of the Energy 1000 Independence Avenue, SW Washington, DC 20585 RE: FOIA Request Dear· Sir or Madam:· March 21, 2008 Pursuant to the Freedom of Information Act, 5 U.S.C. §§ 552, et ~, the National Treasury Employees Union (NTEU) cf equests that the Department of the Energy provide it with a ist of all current positions (with series numbers) in the bargaining unit represented by NTEU whose position sensitivity is nonsensitive or low risk~ By this request, NTEU is seeking to identify all positions in the bargaining unit whose incumbents (or appointees or applicants for that position) have to complete the SF 85 as part of their background investigation. The list should simply

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Response to Request  

Broader source: Energy.gov (indexed) [DOE]

Booz Allen Hamilton Response to Booz Allen Hamilton Response to Department of Energy Request for Information Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Department of Energy August 9, 2010 1 Booz Allen Hamilton Introduction Booz Allen Hamilton (Booz Allen) has had an enduring relationship with the Department of Energy (DOE) for more than two decades. We are pleased to be responding to the DOE's Request for Information (RFI), Implementing the National Broadband Plan by Studying the Communcations Requirements of Electric Utilities to Inform Federal Smart Grid Policy, with our perspectives on the use of broadband communications technology to meet emerging Smart Grid requirements. In its RFI,

82

FOIA Request - December 2008  

Broader source: Energy.gov (indexed) [DOE]

Saturday, November 29. 2008 1 :24 PM Saturday, November 29. 2008 1 :24 PM FOIA-Central DOE Headquarters FOIA Request Name~eila Thompso~ Organization: G4i Consulting, Inc. Address: 46169 Westlake Drive, Suite 120, Sterling, VA 20165 Phone; 703-433-5460 FAX: 877.286.9645 Email: sthompson@govg4i.com Record Description: DEC 01 2008 Nationwide Professional Skills Training Program ~esolicitation #DE-SOL-00001~Please accept this as a formal FOIA request for Informa~ on the prior incumbents' contracts/solicitation. Please send the incumbents' proposals and the government's Section B pricing table and tabulation across all bidders in the last procurement for these services. Thank you for your assistance. Nationwide Professional Skills Training Program -

83

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

84

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

85

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

86

Fire Protection Account Request Form  

Broader source: Energy.gov (indexed) [DOE]

Fire Protection System Account Request Form Fire Protection System Account Request Form To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to hssUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your

87

FY 2015 Budget Request Webinar  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

based on actual integrated biorefinery project plant performance data. eere.energy.gov 19 Bioenergy Technologies - FY 2015 Budget Request (Dollars in Thousands) FY 2013 Current FY...

88

The FY 2005 Budget Request  

Office of Energy Efficiency and Renewable Energy (EERE)

This presentation provides an overview of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy's FY 2005 budget request to Congress.

89

The FY 2006 Budget Request  

Office of Energy Efficiency and Renewable Energy (EERE)

This presentation provides an overview of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy's FY 2005 budget request to Congress.

90

BPA-2015-00018-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in the commercial interest of the requester." If my request for a waiver or reduction in fees is denied, I agree to pay up to (enter amount) to process my request....

91

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

92

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

93

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer ...

Ruhrmair, Ulrich

94

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

operation Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and...

95

Fatal Chimpanzee Attack in Loango National Park, Gabon  

E-Print Network [OSTI]

Fatal Chimpanzee Attack in Loango National Park, Gabon Christophe Boesch & Josephine Head & Nikki a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found or habituation. Keywords chimpanzees . fatal attack . gabon . intergroup conflict Introduction Chimpanzee social

96

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

97

2014 NERSC allocation requests due September 22  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC allocation requests due September 22 2014 NERSC allocation requests due September 22 August 13, 2013 by Francesca Verdier (0 Comments) NERSC's allocation submission system is...

98

Hanford Speakers Bureau Request Form - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the Hanford Speakers Bureau at 509.376.3419. REQUESTER CONTACT INFORMATION Contact Name * PhoneCell * Address * City * Zip Code * Email Address * SPEAKER REQUEST INFORMATION...

99

BPA-2012-00793-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

at 12:43 pm on Tuesday February 21. My new request is for BPA's boilerplate hydroelectric power purchase agreement. Preferred format: PDF Type of Requester: Scholarly...

100

BPA-2013-00017-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

brian.morris@harris.com Sent: Monday, October 01, 2012 6:05 AM To: FOIA Subject: FOIA Request The following is a New FOIA request: *** Name: Brian...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

102

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

103

The FY 2005 Budget Request  

Broader source: Energy.gov (indexed) [DOE]

5 Budget Request 5 Budget Request Building on a Record of Success February 2, 2004 David Garman Assistant Secretary Office of Energy Efficiency and Renewable Energy Building on a Record of Success Meeting Presidential Priorities Citizen Centered Affordable Energy Energy Security Climate Change Building on a Record of Success FY 2005 Budget Request * Supports Presidential commitment to strengthen energy security and enhance energy choices for all Americans while protecting the environment * Maintains FY 2004 request levels in budget constrained year * Builds upon and sustains a record of success * Research & Development (R&D) * Deployment * Management Building on a Record of Success Still EERE's Request Is ^ Priority Driven 1. Dramatically reduce or even end dependence on foreign oil

104

DOE Headquarters FOIA Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Oak Ridge Office FOIA Request Form Oak Ridge Office FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: (Required) Organization: Address: (Required) Phone: FAX: Email: Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that you provide, the better the opportunity there is to determine if the

105

The FY 2006 Budget Request  

Broader source: Energy.gov (indexed) [DOE]

6 Budget Request 6 Budget Request David Garman Assistant Secretary Office of Energy Efficiency and Renewable Energy February 7, 2005 FY 2006 Budget Request * Supports Presidential commitment to strengthen energy security and enhance energy choices for all Americans while protecting the environment * Builds upon and sustains a record of success ƒ Research & Development (R&D) ƒ Deployment ƒ Management * Continues trend of budget requests in the $1.2 billion range 2 Budget Request is Priority Driven 1. Dramatically reduce or even end dependence on foreign oil 2. Reduce the burden of energy prices on the disadvantaged 3. Increase the viability and deployment of renewable energy technologies 4. Increase the reliability and efficiency of electricity generation and use

106

ARM - Baseline Change Request Guidelines  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DocumentsBaseline Change Request Guidelines DocumentsBaseline Change Request Guidelines Page Contents Introduction Submit a BCR BCR Process Flowchart Baseline Change Request Guidelines Introduction Baseline Change Requests (BCR) are used by the ARM Infrastructure as a process to provide configuration control and for formally requesting and documenting changes within the ARM Infrastructure. Configuration Control: BCRs are required for changes to instruments, data systems, data processes, datastreams, measurement methods, and facilities. They help ensure that all aspects of the ARM Infrastructure are consulted prior to implementing changes. Seemingly minor changes can have significant repercussions throughout the Facility and therefore, NO change to an operational instrument, computer, facility, or other system can or will be

107

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

108

Request Data.PDF  

Broader source: Energy.gov (indexed) [DOE]

Hudson-Reed Limited Hudson-Reed Limited ) ) ) ) ) Case Number: 2010-CW- 1403 REQUEST FOR DATA Date issued: March 2, 2010 On September 1, 2009, the Department of Energy (DOE or the Department) received a complaint regarding Hudson Reed "shower tower" model number AS333. The complaint alleges that testing of this model demonstrated that the showerhead exceeds the Federal maximum water flow rate requirement. DOE' s regulations for enforcement, contained in 10 CFR § 430.70, state that DOE may conduct enforcement testing of a covered product upon receiving information in writing that a particular covered product may not be in compliance with the applicable performance standard. The first step of this procedure is for the Department to examine the manufacturer's test data.

109

EERE FY 2015 Budget Request  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technologies eere.energy.gov 7 FY 2015 EERE Budget Request - 2.317B Vehicles, 359M Bioenergy, 253M Fuel Cells, 93M Advanced Manufacturing, 305M Buildings, 212M...

110

Response to several FOIA requests - Renewable Energy. | Department...  

Office of Environmental Management (EM)

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy....

111

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

RS-Weapons X-Rays REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS DISPOSITION AUTHORITY...

112

Response to several FOIA requests - Renewable Energy. | Department...  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, ENERGY RESOURCES and CONSERVATION Response to several FOIA requests -...

113

Response to several FOIA requests - Renewable Energy | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, nepdg20012250.pdf....

114

Request For Records Disposition Authority | Department of Energy  

Office of Environmental Management (EM)

Request For Records Disposition Authority Request For Records Disposition Authority National Archives Pacific Southwest Region Request For Records Disposition Authority More...

115

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Office of Environmental Management (EM)

Pacific Northwest Lab: Richland Operations Office REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY Request For...

116

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

117

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia

2014-01-01T23:59:59.000Z

118

Signs of a Heart Attack - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletter & Updates > Safety Meeting Toolkits > Signs of a Heart Attack Newsletter & Updates Health News & InsideOut Newsletter Pandemic Preparedness Diabetes Ergonomic Awareness...

119

SSRL Computer & Networking Support Requests  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Help Request Help Request To use this form - Please enter your contact information below and select a category for your request. Also, provide a brief description of your request. When purchasing items, please include an account number. Priority*: Normal Urgent Requestor: (Name of person to contact for this request) Email: Phone: Support Required: I don't know Computer Support Network Support Printer Support Select Type of Request I don't know Details of your request: Property Control #: PC# Account number (as needed): * Normal priority requests will be attended to within the next two business days at the most. Urgent requests will receive attention as soon as possible. Submit Clear Fields SSRL Computing SSRL Home SLAC Home Stanford University Last Updated: 06 JUN 2007

120

Current Annualized Request  

Broader source: Energy.gov (indexed) [DOE]

Organization Organization FY 2012 FY 2013 FY 2014 Current Annualized Request CR $ % National Security Weapons Activities* 7,214,834 7,557,342 7,868,409 +311,067 +4.1% Defense Nuclear Nonproliferation 2,300,950 2,409,930 2,140,142 -160,808 -7.0% Naval Reactors 1,080,000 1,086,610 1,246,134 +166,134 +15.4% Office of the Administrator 410,000 412,509 397,784 -12,216 -3.0% Total, National Nuclear Security Administration 11,005,784 11,466,391 11,652,469 +304,177 +2.8% Energy and Environment Energy Efficiency and Renewable Energy 1,780,548 1,820,713 2,775,700 +995,152 +55.9% Electricity Delivery and Energy Reliability 136,178 139,954 169,015 +32,837 +24.1% Fossil Energy 554,806 714,033 637,975 +83,169 +15.0% Nuclear Energy 853,816 863,996 735,460 -118,356 -13.9% Race to the Top for Energy Efficiency and Grid Modernization

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

STUDENT RECREATION CENTER FACILITY REQUEST Group Name: ____________________________ Today's Date: __________  

E-Print Network [OSTI]

STUDENT RECREATION CENTER FACILITY REQUEST � Group Name: ____________________________ Today's Date:____________________ Time of Event: Start ______ Finish ______ � Facility Requested: o Lockridge Arena ____ Recreational Gym. _______________________________________________________________________________________________________ ________________________________________________________________________________________________________ By requesting the Colorado School of Mines Student Recreation Center, I acknowledge that the requested activity

122

Request Log Closedl Date Yes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 FOIA 6 FOIA - Request Log Closedl Date Yes 01 127106 Yes 02/23/06 Yes 04/05/06 Yes 04/03/06 Yes 04/03/06 Yes 05/22/06 Yes 35/30/06 - No. - 00 1 - 002 - 003 - 004 005 006 - 307 - Dated 01 125106 0211 6106 03/29/06 03/31 106 14/03/06 1511 8/06 )5/22/06 Date Rec'd 0 I I2 5/06 02/23/06 03130/06 0313 1 106 04/03/06 05/22/06 05/22/06 HQ or Dir. Direct Transfer from HQ Direct Trans from HQ Direct Direct Transfer 'rom HQ Subject Requesting a list of all your Procurement card holders Requesting copies of any and all Freedom of Information Act (FOIA) requests submitted to the Department of Energy (DOE) by Donna Wright, the Bradenton Herald, or any other individual that requested documentation or information pertaining to the Loral American Beryllium Corporation (also known as the

123

Attacking Systems ecurity vulnerabilities related to buffer overruns  

E-Print Network [OSTI]

Attacking Systems S ecurity vulnerabilities related to buffer overruns account for the largest exploits that take ad- vantage of the vulnerability to attack a system. The traditional approach and even security profession- als seemingly assume that all buffer overrun exploits operate in a similar

Sekar, R.

124

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

125

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

126

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

127

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks  

E-Print Network [OSTI]

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J by an implementation of the relay attack that has been tested on live systems. Once designers appreciate the risk to the smartcard standard, based on a distance bounding protocol, which provides adequate resistance to the relay

Xu, Wenyuan

128

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

129

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

130

On the algebraic attack against summation type keystream generators  

Science Journals Connector (OSTI)

The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.

Md. Iftekhar Salam; Hoon-Jae Lee

2012-01-01T23:59:59.000Z

131

BPA?2012?00479?FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

December 28, 2011 4:26 PM To: FOIA Subject: FOIA Request The following is a New FOIA request: Name: Richard van Dijk Organization: Another Way BPA Address Phone: No FAX number...

132

FY 2016 Congressional Budget Request for OE  

Broader source: Energy.gov [DOE]

FY 2016 Budget in Brief and detailed Congressional Budget Request for OE. The FY 2016 request reflects the Administrations priority on modernizing the electric grid and boosting the resilience of infrastructure.

133

BPA-2011-00946-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Power Administration P. O. Box 3621-DK-7 Portland, OR 97208-3621 Re: FOIA Request - Contracting Officers Dear Ms. Brannon: This is a request under the Freedom of Information Act...

134

FY 2016 Budget Request Now Available  

Broader source: Energy.gov [DOE]

The Office of Electricity Delivery and Energy Reliabilitys FY 2016 Budget Request is now available. The FY 2016 request reflects the Administrations priority on modernizing the electric grid and boosting the resilience of infrastructure.

135

BPA-2012-00860-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

scottc.johnson@us.abb.com Sent: Tuesday, March 06, 2012 5:09 PM To: FOIA ;si & JVE) B Subject: FOIA Request OIA ()F1 ICE L'JiiS UVIE: The following is a New FOIA request: ** * **...

136

BPA-2012-00862-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

scott.c.johnson@us.abb.com Sent: Tuesday, March 06, 2012 4:54 PM To: FOIA Subject: FOIA Request The following is a New FOIA request: Name: Scott C. Johnson Organization: ABB Inc....

137

BPA-2012-00551-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sent: Tuesday, January 10, 2012 11:40 AM To: FOIA Subject: Re: BPA FOIA request Hello, I have not received this info requested and the time allowed has expired. Please...

138

BPA-2012-01631-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Request: 1) Source Code for Electromagnetic Transients Program (EMTP) 2) EMTP Rule Book Preferred format: CD-ROM Type of Requester: Business I Agree to pay all applicable fees 71...

139

BPA-2010-02000-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Electric I am writing this to request photocopies of Chet's Electric certified payroll records pursuant to ORS 279.354 regarding BPA Aircraft Hanger in Redmond, OR. I am requesting...

140

BPA-2012-01716-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

aude@law.stanford.edu LOG 7J Description of Request: I hereby request copies of all records containing information about the amount of eminent domain or condemnation proceedings...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

BPA-2012-01592-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Portland, OR 97208 04 Re: Freedom of Information Act Request- North Steens 230-kV Transmission Line Project Dear Ms. Munro: This is a request under the Freedom of Information Act...

142

SIO Request for Information Page 1 5/21/2013 Request for Information  

E-Print Network [OSTI]

SIO Request for Information Page 1 5/21/2013 Request for Information The mission of the UW to gather information from groups or individuals interested in using the services of the office. Requests for Information for use of the UW-Madison Shanghai Innovation Office SIO Request for Information Page 2 5

Wisconsin at Madison, University of

143

Information Request Yucca Mountain Site  

Broader source: Energy.gov (indexed) [DOE]

, 2008 , 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested last week regarding use of engineered barriers. Please let me know if you need additional information or have any questions. A,4- -/0 7 The Suitability of the Yucca Mountain Site and the Issue of Natural Barriers as the Principal Barriers for Demonstrating Safety This paper addresses two issues that are frequently raised concerning the suitability of the Yucca Mountain site for development as a repository. The first issue is that the Yucca Mountain site is technically unsound and that an engineered barrier system is required because the site is not capable of protecting public health and safety. The second issue is

144

NNSA FY14 BUDGET REQUEST  

National Nuclear Security Administration (NNSA)

FY14 BUDGET REQUEST FY14 BUDGET REQUEST We're keeping the American people safe. President Obama has laid out the most ambitious view of nuclear security in decades. Our nonproliferation, counterterrorism, and modern-day nuclear deterrent programs keep the American people safe every day. The President remains committed to a safe, secure, and reliable nuclear deterrent, and his FY14 budget provides $7.9 billion for NNSA's weapons activities. o Our Life Extension Programs (LEPs) are moving forward to ensure the aging American nuclear weapons deterrent remains safe, secure, and effective. $1 billion is requested in FY14 to directly support these programs. The W76-1 LEP, now in Phase 6.6 full

145

FY2012 EERE Congressional Budget Request  

Office of Energy Efficiency and Renewable Energy (EERE)

Fiscal Year 2012 budget request from the Department of Energys Office of Energy Efficiency and Renewable Energy

146

Request for donations 1. Donation project  

E-Print Network [OSTI]

Request for donations 1. Donation project Cheiron School 2013 2. Activity to be supported (1. Donation procedures See

Kazama, Hokto

147

Delta Faucet: Data Request (2010-SW-1603)  

Broader source: Energy.gov [DOE]

DOE requested test data from Delta Faucet Corporation for Delta Faucet's showerhead model "In2ition 75582".

148

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

149

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

150

PoisonAmplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. ...

Jialong Zhang; Chao Yang; Zhaoyan Xu; Guofei Gu

2012-09-01T23:59:59.000Z

151

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

152

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

153

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

154

E-Print Network 3.0 - attacks influence driving Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

155

E-Print Network 3.0 - attacks draft resolution Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(and our attacks) to four real-world PRNGs. We close Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 8 Cryptanalytic Attacks on...

156

Complex Attack Analysis and Safeguard Selection: a Cost-Oriented Approach.  

E-Print Network [OSTI]

??When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vulnerability. Rather, they achieve their goals by composing attacks and (more)

TANG, SUK WAH CRISTINA

2009-01-01T23:59:59.000Z

157

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware...

Jialong Zhang; Chao Yang; Zhaoyan Xu

2012-01-01T23:59:59.000Z

158

DUF6 Final EIS Document Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EIS Request Form EIS Request Form Final EIS Document Request Form Use the form below to order copies of the DUF6 Conversion Facility Final EISs and Records of Decision. Step 3 Select the EIS that you want to receive. Select one of the three options below. My request applies to the Paducah Conversion Facility EIS My request applies to the Portsmouth Conversion Facility EIS My request applies to both the Paducah and the Portsmouth Conversion Facility EISs Step 1 Request EIS copies. Choose one or more of the following: Mail me a compact disc (CD-ROM) of the Final EIS and Record of Decision. Mail me a printed copy of the Final EIS and Record of Decision. Step 2 Enter your personal information. You must submit your full name and complete address including zip code to receive postal mail. You must provide an email address if you want to receive email notifications.

159

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack the key deriva- tion of IPsec

Paris-Sud XI, Université de

160

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec the confidentiality of other Internet standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack

Fouque, Pierre-Alain

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Fatal Chimpanzee Attack in Loango National Park, Gabon  

Science Journals Connector (OSTI)

In some populations, chimpanzees engage in lethal aggression within and between social units. We report a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found a...

Christophe Boesch; Josephine Head; Nikki Tagg

2007-10-01T23:59:59.000Z

162

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

163

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

164

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

165

Modeling attacker-defender interactions in information networks.  

SciTech Connect (OSTI)

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

Collins, Michael Joseph

2010-09-01T23:59:59.000Z

166

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

167

FY 2007 Congressional Budget Request  

Broader source: Energy.gov (indexed) [DOE]

state tables state tables preliminary Department of Energy FY 2007 Congressional Budget Request February 2006 Printed with soy ink on recycled paper Office of Chief Financial Officer state tables preliminary The numbers depicted in this document represent the gross level of DOE budget authority for the years displayed. The figures include both the discretionary and mandatory funding in the budget. They do not consider revenues/receipts, uses of prior year balances, deferrals, rescissions, or other adjustments appropriated as offsets to the DOE appropriations by the Congress. State Index Page Number FY 2007 Congressional Budget 1/31/2006 Department Of Energy (Dollars In Thousands) 12:09:13PM Page 1 of 2 FY 2005 Appropriation FY 2006 Appropriation FY 2007 Request State Table 1 1 $32,439

168

University of Connecticut, Office of the Registrar, Transcript Request Form Transcript Request Form -University of Connecticut  

E-Print Network [OSTI]

University of Connecticut, Office of the Registrar, Transcript Request Form Transcript Request Form - University of Connecticut Office of the Registrar, Unit 4077T, Storrs, CT 06269-4077T Forms of Connecticut under other names, please indicate them here

Lozano-Robledo, Alvaro

169

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1, we have built a simulation model using OPNET simulation package, where the attack agents create as in the non-attacked condition. Keywords: Network Security, Denial-of-Service Attack, TCP Flooding, Router

Merat, Francis L.

170

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

171

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars  

E-Print Network [OSTI]

to certain types of relay attacks 1 . Our attack allowed to open and start the car while the true distanceRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris.francillon, boris.danev, srdjan.capkun}@inf.ethz.ch Abstract We demonstrate relay attacks on Passive Keyless Entry

172

Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems  

SciTech Connect (OSTI)

Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

Bri Rolston

2005-09-01T23:59:59.000Z

173

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

174

WIPP - How to submit a FOIA request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

How to submit a Freedom of Information Act (FOIA) request FOIA requests to the U.S. Department of Energy Carlsbad Field Office (CBFO) may be submitted by request form, letter, fax, or e-mail. You may contact CBFO at the following address: George W. Hellstrom Freedom of Information Act/Privacy Act Public Liaison U.S. Department of Energy Carlsbad Field Office P.O. Box 3090 4021 National Parks Highway Carlsbad, New Mexico 88221-3090 foialiaison@ FOIA requests may be mailed or faxed to (505) 234-7025, e-mailed to the Freedom of Information Act /Privacy Act Public Liaison, or submitted electronically using the FOIA Request form. Clearly mark the envelope, fax, or e-mail "Freedom of Information Act request." Describe the records you are requesting as completely and accurately as possible, and provide your name, address, and telephone number. A telephone call between the requester and the FOIA contact person may be necessary to clarify a request and expedite processing time.

175

BPA-2011-01513-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

indicating any and all projects worked on by Scott Richard Rolf, Senior Policy Advisor. z- As used in this request, "projects" means any negotiations, contracts, or other...

176

PIA - Human Resources - Personal Information Change Request ...  

Office of Environmental Management (EM)

Request - Idaho National Engineering Laboratory More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

177

BPA?2012?00477?FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the proposed substation at Troutdale including the interconnection between the existing BPA substation to accommodate the proposed I-5 line Date range for this request from...

178

BPA-2012-00676-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

University Professor Address: Phone: FAX: Email: Description of Request: Copy of BPA Substation Design Standards - specifically the chapter (or the part) related to...

179

Request for Information (RFI): Advanced Manufacturing Office...  

Broader source: Energy.gov (indexed) [DOE]

Advanced Manufacturing Office (AMO) Software Tools Request for Information (RFI): Advanced Manufacturing Office (AMO) Software Tools July 25, 2014 - 1:00pm Addthis Funding: This...

180

Request For Information Regarding Categorical Exclusions: Guidelines...  

Broader source: Energy.gov (indexed) [DOE]

Exclusions: Guidelines Request For Information Regarding Categorical Exclusions: Guidelines The U.S. Department of Energy (DOE) intends to update its National Environmental Policy...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

BPA-2012-01173-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enterprise Program Director. OCB requests complete copies of the original ARAMARK food service contract including all exhibits and all renewals thereof connected to the...

182

BPA-2010-02087-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Description of Request: I would like to retrieve historical, hourly generation from hydroelectric facilities which operate in BPA's footprint. This data is made available on BPA's...

183

Energy Department Requests Proposals for Advanced Scientific...  

Energy Savers [EERE]

27, 2005 - 4:55pm Addthis WASHINGTON, DC - The Department of Energy's Office of Science and the National Nuclear Security Administration (NNSA) have issued a joint Request...

184

BPA-2012-00805-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3- 1 et seq ("FOIA"), I request electronic copies of Department of the LOG g Energy contracting documents. Specifically: i) 11 Justifications for Other Than Full and Open...

185

Request an Inspection of User Electrical Equipment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Request for an Electrical Equipment Inspection All APS User electronic and electrical equipment must be inspected before use in an experiment. Please ask your beamline to make...

186

Fiscal Year 2013 Budget Request Briefing  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

- Courtesy of Enel Green Power - North America Fiscal Year 2013 Budget Request Briefing March 13, 2012 Change photo Glass Buttes, OR (DOE) Energy Efficiency & Renewable Energy...

187

BPA-2011-00698-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7202145856 FAX: 3039886409 Email: bmcbee@bentekenergy.com Description of Request: Hello, I am seeking data associated with hourly imports and exports of electricity to and...

188

NREL: Business Opportunities - Current Solicitations/Request...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The National Renewable Energy Laboratory (NREL), which is managed and operated by the Alliance for Sustainable Energy, LLC, frequently posts Requests for Proposals (RFP). Please...

189

BPA-2011-01724-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Bonneville's actions on species listed under the Endangered Species Act and wetlands. I request a waiver or reduction of fees because the discolsure is "likely to...

190

Browning: Email in Response to Smart Grid Request for Information...  

Broader source: Energy.gov (indexed) [DOE]

Browning: Email in Response to Smart Grid Request for Information Browning: Email in Response to Smart Grid Request for Information Email from Stephen Browning explaing the two...

191

Response to several FOIA requests - Renewable Energy. | Department...  

Office of Environmental Management (EM)

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. SCHEDULE FOR CHIEF OF STAFF Wednesday, July 11, 2001...

192

Fuel Cell Technologies Program FY 2013 Budget Request Rollout...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

FY 2013 Budget Request Rollout Washington, DC FUEL CELL TECHNOLOGIES PROGRAM FY 2013 Budget Request Rollout to Stakeholders Sunita Satyapal U.S. Department of Energy Fuel Cell...

193

FY 2014 Environmental Management Budget Request to Congress ...  

Office of Environmental Management (EM)

4 Environmental Management Budget Request to Congress FY 2014 Environmental Management Budget Request to Congress Department of Energy - Environmental Management FY 2014...

194

FY 2014 Budget Request Summary Table | Department of Energy  

Office of Environmental Management (EM)

Summary Table FY 2014 Budget Request Summary Table Summary Table by Appropriations Summary Table by Organization More Documents & Publications FY 2014 Budget Request Statistical...

195

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Nuclear Power Plant Docket Records REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications PIA - Savannah River Remediation Accreditation Boundary (SRR AB) REQUEST...

196

Video Tutorial for Submitting a 2014 ERCAP Request available  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Video Tutorial for Submitting a 2014 ERCAP Request available Video Tutorial for Submitting a 2014 ERCAP Request available September 17, 2013 (0 Comments) Rushing to meet the...

197

Highlights of the FY 2015 Congressional Budget Request for OE...  

Broader source: Energy.gov (indexed) [DOE]

Budget Request for OE Highlights of the FY 2015 Congressional Budget Request for OE OE drives electric grid modernization and resiliency in the energy infrastructure through...

198

Request for Information: Federal Government Power Purchase Agreements...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues Request for Information: Federal Government Power Purchase Agreements (PPA) Issues Document...

199

Request for Information NBP RFI: Data Access | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight...

200

Request for Information (RFI): Clean Energy Manufacturing Topics...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information (RFI): Clean Energy Manufacturing Topics Suitable for a Manufacturing Innovation Institute Request for Information (RFI): Clean Energy Manufacturing Topics...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Request for Information - Implementing the National Broadband...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy DOE Request for Information...

202

Re: Request for Information on Regulatory Burden of DOE Regulations...  

Energy Savers [EERE]

Request for Information on Regulatory Burden of DOE Regulations Re: Request for Information on Regulatory Burden of DOE Regulations Comments from Edison Electric Institute on DOE's...

203

Response to several FOIA requests - Renewable Energy. Demand...  

Energy Savers [EERE]

Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. nepdg251500.pdf....

204

Response to several FOIA requests - Renewable Energy. | Department...  

Office of Environmental Management (EM)

Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Excess Capacity from LADWP Control Area (LADWP, Glendale,...

205

Response to several FOIA requests - Renewable Energy | Department...  

Energy Savers [EERE]

Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, World Oil Price, 1970-2020 (1999 dollars per barrel) Response to...

206

Response to several FOIA requests - Renewable Energy. | Department...  

Energy Savers [EERE]

Chapter 2 Energy Impacts, nepdg82518500.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests -...

207

Response to several FOIA requests - Renewable Energy. | Department...  

Broader source: Energy.gov (indexed) [DOE]

Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. National Energy Policy, coal is an important energy resource,...

208

Department of Energy Issues Requests for Applications for Nuclear...  

Energy Savers [EERE]

Issues Requests for Applications for Nuclear-Related Science and Engineering Scholarships and Fellowships Department of Energy Issues Requests for Applications for Nuclear-Related...

209

Golden Reading Room: FOIA Requester Service Centers and Public...  

Office of Environmental Management (EM)

FOIA Requester Service Centers and Public Liaisons Golden Reading Room: FOIA Requester Service Centers and Public Liaisons U.S. Department of Energy http:energy.govmanagement...

210

Highlights of the FY 2013 Congressional Budget Request for OE...  

Office of Environmental Management (EM)

for OE Highlights of the FY 2013 Congressional Budget Request for OE The Office of Electricity Delivery and Energy Reliability's FY 2013 budget request continues the commitment...

211

Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout...  

Broader source: Energy.gov (indexed) [DOE]

Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout to Stakeholders Hydrogen and Fuel Cell Technologies FY 2014 Budget Request Rollout to Stakeholders Presentation...

212

Office of Nuclear Energy Fiscal Year 2014 Budget Request | Department...  

Office of Environmental Management (EM)

Office of Nuclear Energy Fiscal Year 2014 Budget Request Office of Nuclear Energy Fiscal Year 2014 Budget Request The Office of Nuclear Energy (NE) supports the diverse civilian...

213

Request for Information on Permitting of Transmission Lines:...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines:...

214

AMO Issues Request for Information on Clean Energy Manufacturing...  

Energy Savers [EERE]

Request for Information on Clean Energy Manufacturing Topics, Including Fuel Cell and Hydrogen Applications AMO Issues Request for Information on Clean Energy Manufacturing Topics,...

215

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Office of Environmental Management (EM)

DISPOSITION AUTHORITY More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY Request For Records Disposition Autnority Records Dispostion-Coal Distribution Data...

216

Request for Information: GSA Seeks Innovative Building Technologies...  

Office of Environmental Management (EM)

September 26, 2014 - 10:50am Addthis This request for information is closed. GSA's Green Proving Ground has opened its 2015 Request for Information (RFI) seeking information...

217

BETO Announces Request for Information on Landscape Design for...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

BETO Announces Request for Information on Landscape Design for Sustainable Bioenergy Systems BETO Announces Request for Information on Landscape Design for Sustainable Bioenergy...

218

REQUEST FOR SERVICES --- DOCUMENT RECEIPT No | Department of...  

Broader source: Energy.gov (indexed) [DOE]

FOR SERVICES --- DOCUMENT RECEIPT No Form is used by headquarters offices in the records transfer process to indicate receipt of requested records. REQUEST FOR SERVICES ---...

219

Request For Records Disposition Authority | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fossil Energy Equity Re-determination Records Request For Records Disposition Authority More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY Inspection Report:...

220

Fuel Cell Technologies Program FY 2013 Budget Request Rollout...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Program FY 2013 Budget Request Rollout to Stakeholders Fuel Cell Technologies Program FY 2013 Budget Request Rollout to Stakeholders Presentation by Sunita Satyapal at the FY 2013...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Response to several FOIA requests - Renewable Energy. | Department...  

Energy Savers [EERE]

ABRAHAM Sunday, May 20, 2001. nepdg42514500.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests -...

222

A fundamental threat to quantum cryptography: gravitational attacks  

E-Print Network [OSTI]

An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

R. Plaga

2006-03-26T23:59:59.000Z

223

SALARY STIPEND REQUEST FOR CSUEU EMPLOYEES  

E-Print Network [OSTI]

SALARY STIPEND REQUEST FOR CSUEU EMPLOYEES HUMAN RESOURCES Workforce Planning | One Washington Administrator--Submit completed request to Workforce Planning in Human Resources, 0046. Article 20 for Eligibility Sr. Workforce Planning Analyst Signature Phone: Date: HR: 07/01/08 #12;

Eirinaki, Magdalini

224

UW MEDICINE Referral Request UW Medicine  

E-Print Network [OSTI]

UW MEDICINE Referral Request PT.NO NAME DOB UW Medicine Harborview Medical Center ­ UW Medical MEDICINE REFERRAL REQUEST *U2394* *U2394* WHITE ­ MEDICAL RECORD UH2394 REV NOV 11 Thank you for referring. For information about making referrals and/or to complete this form online and print it out go to: http://uwmedicine.org/referrals

Borenstein, Elhanan

225

Poster Request Form Classroom Technology Services, ICIT  

E-Print Network [OSTI]

1 Poster Request Form Classroom Technology Services, ICIT Room Number: 333 Hunter North, Phone: 212-772-4943, Fax: 212-772-5626 Email: av_res@hunter.cuny.edu Poster requests must be submitted three (3) days: _________________________________________________ Phone Number: ________________________________________________ Number of Posters Needed

Qiu, Weigang

226

Information Governance Freedom of Information Request Form  

E-Print Network [OSTI]

Information Governance Freedom of Information Request Form foi@salford.ac.uk http://www.infogov.salford.ac.uk Details of the applicant Name: Address: Post code: Tel. No.: Email: Description of information requested Please provide a description of the information you would like to receive, please be as specific

Romano, Daniela

227

REQUEST FOR INFORMATION Student Information System  

E-Print Network [OSTI]

REQUEST FOR INFORMATION Student Information System This form is to be used by those requesting information from the Registrar's Office. Federal privacy regulations require strict monitoring of access to student information. PERSONS OR ORGANIZATIONS MUST DEMOSTRATE THAT THE INFORMATION IS NEEDED

Thaxton, Christopher S.

228

The NERSC Allocation Request Form (ERCAP)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NIM (NERSC Information Management portal) NIM (NERSC Information Management portal) Awarded projects Policies Data Analytics & Visualization Data Management Policies Science Gateways User Surveys NERSC Users Group User Announcements Help Operations for: Passwords & Off-Hours Status 1-800-66-NERSC, option 1 or 510-486-6821 Account Support https://nim.nersc.gov accounts@nersc.gov 1-800-66-NERSC, option 2 or 510-486-8612 Consulting http://help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 How to Submit a 2014 ERCAP Request Home » For Users » Accounts & Allocations » Allocations » Allocation Request Form (ERCAP) Show All | 1 2 3 4 5 ... 16 | Next » The NERSC Allocation Request Form (ERCAP) Requests to use NERSC resources are submitted annually via a web form known as the ERCAP (Energy Research Computing Allocations Process) Request Form.

229

Social media request | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

About Energy.gov » Web Policies » Social Media » Social media About Energy.gov » Web Policies » Social Media » Social media request Social media request Please fill out the information below in order to request access to a social media application or to have an existing account verified as an official Department of Energy presence. Please wait for a response from the Office of Digital Strategy before proceeding with establishing an account. Contact information First name * Last name * Title * Office * Email address * Phone number * Are you authorized to make this request or have you received the proper approvals to do so? * No, I'm not authorized Yes, I'm authorized Application Social media application(s) you want to utilize * Facebook LinkedIn Slideshare Socrata Twitter Instagram Storify Myspace SurveyMonkey Request a tool we don't currently offer

230

Requesting a Revision to PUB-3000  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requesting a Change to the ES&H Manual Requesting a Change to the ES&H Manual The following procedure describes the process for making changes to Berkeley Lab's ES&H Manual (PUB-3000). It identifies Responsible Authors who participate in the revision process. A request to revise the ES&H Manual may be initiated by any Berkeley Lab employee; however, all requests must be sent to the Responsible Author and approved by the ES&H Manual Manager, Mike Wisherop. If you wish to request a change to a PUB-3000 chapter, follow these steps: Contact the Responsible Author for the chapter in need of revision. Submit PUB-3000 revisions to the Responsible Author and the ES&H Manual Manager. Direct all questions or comments concerning ES&H Manual content to the ES&H Manual Manager.

231

Requesting a Digital ID | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Requesting a Digital ID Requesting a Digital ID Requesting a Digital ID Step One - Registering with MIS To request a DOE Digital Identity you must first register in DOE's Management Information System (MIS) by going to https://mis.doe.gov, selecting "Requesting Access" and following the onscreen instructions. Note: DOE Federal employees are already registered and do not need to complete this step, they may skip to step 2. During the registration process you will be required to search for, and select, a DOE sponsor. Your DOE sponsor is the DOE federal employee that is certifying that you have a recognized relationship with the Department and have a valid need for a DOE Digital Identity. For contractors this person is often your Contract Task Manager, Contracting Officer's Representatives

232

Frequently Requested Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Freedom of Information Act » Documents Freedom of Information Act » Documents » Frequently Requested Documents Frequently Requested Documents This is an index of frequently requested documents provided by the Department of Energy Headquarters and Field Organizations. Headquarters (HQ) DOE Corporate Overview - 2012 FOIA Requests Received by DOE HQ in 2008 FOIA Requests Received by DOE HQ in 2009 FOIA Responses Processed by DOE HQ in 2009 DOE Transition Documents - 2008 Modifications 001 thru 085 to DOE Contract #DEAC13-02GJ79491 DOE Contract #DEAC13-02GJ79491 Freedom of Information & Privacy Act Group - Enron Documents Sylvania Corporation, Hicksville, NY and Bayside, NY - Additional Sylvania Corporation, Hicksville, NY and Bayside, NY documents Secretary of Energy's Recusal Memorandum for the Secretary on the Determination to Grant a Limited

233

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

m m - REQUEST FOR RECORDS DISPOSITION AUTHORITY (See Instructions on reverse) GENERAL SERVICES ADMINISTRATION N A T I O N A L ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 1. F R O M ( A g e n c y o r e s t a b l i s h m e n t ) jepartment of Energy 2. MAJOR S U B D I V I S I O N Oak Ridse Operations Office 3. M I N O R S U B D I V I S I O N 4 . N A M E O F PERSON W I T H W H O M T O C O N F E R ( 5 . T E L E P H O N E E X T . L E A V E B L A N K - JOB N O . d/-d33P PO- ZJ - - - - p p D A T E R E C E I V E D p - NOTIFICATION TO AGENCY In accordance with the provisions of 44 U.S.C. 3303a the disposal request, including amendments, is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. If no records are proposed for disposal, the signature of the Archivist is not required. - DATE ARCHIVIST

234

Watermarking Attack: Security of WSS Techniques Francois Cayre1  

E-Print Network [OSTI]

carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal. This approach is certainly not the only one but secret disclosure is a very powerful hack: it gives the access of the communication channel at the lowest distortion price to hack content. The key idea of this security analysis

Boyer, Edmond

235

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

236

Energy Attacks and Defense Techniques for Wireless Systems  

E-Print Network [OSTI]

systems, where energy is the most critical constraint to life- time and reliability. We for the first time propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden Security Keywords Wireless security, hardware Trojan, leakage energy 1. INTRODUCTION Wireless communication

Potkonjak, Miodrag

237

Generalized watermarking attack based on watermark estimation and perceptual remodulation  

E-Print Network [OSTI]

on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise image statistics to perform the best watermark removal or damage. The proposed attack is based and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; b) watermark alteration

Genève, Université de

238

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

239

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

240

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Measuring Topological Robustness of Networks under Sustained Targeted Attacks  

Science Journals Connector (OSTI)

In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network ... Keywords: complex networks, robustness, social networks

Mahendra Piraveenan; Shahadat Uddin; Kon Shing Kenneth Chung

2012-08-01T23:59:59.000Z

242

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

243

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

that could deplete IMD resources (e.g., battery power) quickly. The RD attacks could reduce the lifetime are powered by a non-rechargeable battery and replacing the battery requires surgery. Re-charging an IMD from an external RF electromagnetic source causes thermal effects in the organs and thus is not recommended. Unlike

Wu, Jie

244

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

245

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

246

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

247

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

248

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91 - 1000 of 28,560 results. 91 - 1000 of 28,560 results. Rebate Model Ordinance for Siting of Wind-Energy Systems In 2009, the South Dakota Public Utilities Commission (PUC) created a [http://puc.sd.gov/commission/twg/WindEnergyOrdinance.pdf model ordinance] for siting wind-energy systems. This nine-page model... http://energy.gov/savings/model-ordinance-siting-wind-energy-systems Article T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. http://energy.gov/cio/articles/t-649-red-hat-network-satellite-server-request-validation-flaw-permits-cross-site

249

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

250

Microsoft Word - CR-AH Request Form.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cleanroom After-Hours Request Form Personal Contact Information Date Name Email Phone Project Number...

251

Loan Loss Reserve Request for ProposalsTemplate  

Broader source: Energy.gov [DOE]

Template to request for proposals for residential energy efficiency loan facilities. Author: Energy Finance Corp

252

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

LEAVE BLANK (NARA use only) LEAVE BLANK (NARA use only) JOB NUMBER To: NATIONAL ARCHIVES & RECORDS ADMINISTRATION 8601 ADELPHI ROAD, COLLEGE PARK, MD 20740-6001 Date Received 1. FROM (Agency or establishment) NOTIFICATION TO AGENCY In accordance with the provisions of 44 U.S.C 3303a, the disposition request, including amendments is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. 2. MAJOR SUB DIVISION 3. MINOR SUBDIVISION 4. NAME OF PERSON WITH WHOM TO CONFER 5. TELEPHONE DATE ARCHIVIST OF THE UNITED STATES 6. AGENCY CERTIFICATION I hereby certify that I am authorized to act for this agency in matters pertaining to the disposition of its records and that the records proposed for disposal on the attached______page(s) are not needed now for the business of this agency or will not be

253

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

instructions on reverse) instructions on reverse) L E A V E B L A N K JOB NO. #/-Y3Y-ff-L GENERAL SERVICES ADMINISTRATION NATIONAL ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 1. f R O M (Agency orertabluhment) lepartment of Energy 2. M N O R SUBDIVISION 3. M I N O R SUBDIVISION - . ,#q/FEF 4. NAME OF P ~ R S O N WITH WHOM TO CONFER 15. TELEPHONE EXT. 1 hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records; that the records proposed for disposal in this Request of page(s) are not now needed for the business of this .agency or will not be needed after the retention periods specified; and that written concurrence from the General Accounting Office, if required under the prov~sions of Title 8 of the GAO Manual for Guidance of Federal Agenctes, is

254

Information requested in Protocol No  

Broader source: Energy.gov (indexed) [DOE]

1, 2010 1, 2010 Smart Grid RFI U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Re: Smart Grid RFI: Addressing Policy and Logistical Challenges In response to the Department of Energy's (DOE) Request for Information regarding smart grid implementation listed in the September 17, 2010 Federal Register, the New York Independent System Operator, Inc. (NYISO) offers the attached white paper entitled "Envisioning a Smarter Grid for New York Consumers." This white paper, issued by the NYISO in September 2010, was filed at the New York Public Service Commission (NYPSC) in response to a call for comments in its Smart Grid Proceeding. 1 The NYISO would also like to bring to the DOE's attention a white paper prepared

255

Request for Proposal | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Request for Proposal | National Nuclear Security Administration Request for Proposal | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Request for Proposal Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

256

Request for Rehearing and Request for Interim Clarification by David K.  

Broader source: Energy.gov (indexed) [DOE]

Rehearing and Request for Interim Clarification by Rehearing and Request for Interim Clarification by David K. Paylor, Director of the Virginia Department of Environmental Quality Request for Rehearing and Request for Interim Clarification by David K. Paylor, Director of the Virginia Department of Environmental Quality Docket No. EO-05-01: Pursuant to Federal Power Act § 313, David K. Paylor, Director of the Virginia Department of Environmental Quality, through his counsel Robert F. McDonnell, the Attorney General of Virginia, requests rehearing of Order No. 202-05-3 entered by the Secretary of Energy on December 20, 2005. Specifically, Director Paylor requests rehearing based on the following assignments of error: 1. The Secretary erred by holding that the FPA preempts the Clean Air Act and related state laws;

257

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

258

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......of dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...Support System for Nuclear Emergency Management...Hazard Release Risk Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

259

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...potentially security sensitive...System for Nuclear Emergency...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

260

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

262

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

263

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

264

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut f?ur Experimentelle

Diem, Claus

265

NSLS User Access | Requesting Beam Time  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

266

Furman University Cell Phone Allowance Request Form  

E-Print Network [OSTI]

Furman University Cell Phone Allowance Request Form Date Payment: $___________ All cell phone allowance payments are departmental responsibility and considered other compensation charged to object code ________. The cell phone allowance will start at the next

267

EERE FY 2015 Budget Request Webinar-- Transportation  

Office of Energy Efficiency and Renewable Energy (EERE)

EERE FY 2015 Budget Request Webinar, featuring Reuben Sarkar, Deputy Assistant Secretary for Transportation, Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy, as presented on Thursday, April 3, 2014.

268

BPA-2012-01483-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Organization: TFOY --- RETIRED Address: Phone: No FAX number provided Email: CE1VED BY BPA FOLA OFFICE THIS DATE: DUE DATE: I 7 Description of Request: emails sent & recieved...

269

BPA-2011-00443-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Description of Request: in 2009 I went through the application process to become a substation operator. i was interviewed and subsequently not selected. i plan to re apply next...

270

Machining and Technical Services Service Request Form  

E-Print Network [OSTI]

Machining and Technical Services Service Request Form Clemson University - College of Engineering $35 $60 $55 $90 $52.50 $82.50 Total Labor EDM Hours Outside Hours Outside EDM Hours Priority -

Duchowski, Andrew T.

271

Machining and Technical Services Service Request Form  

E-Print Network [OSTI]

Machining and Technical Services Service Request Form 2010-2011 Clemson University - College: Hours Price per hour Amount $35 $60 $55 $90 $52.50 $82.50 Total Labor EDM Hours Outside Hours Outside EDM Hours Priority -

Duchowski, Andrew T.

272

BPA-2012-01700-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

P.O. Box 3621 Portland, Oregon 97208 SUBJECT: FOIA Request Dear Ms. Winn: RECEIVED BY BPA IOtA OFFICE TillS DATE: f, j DUE DATE: LOG Pursuant to the Freedom of Information...

273

BPA-2001-00401-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sent: Wednesday, December 22, 2010 1:47 PM To: Atterbury,Laura M - DK-7 Subject: Fwd: BPA FOIA request --- Forwarded message --- From: Date:...

274

BPA-2012-003364-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Dec.2011 Memo To:W.C.Madsen,Wildlife Mgr.BPA Subject:Freedom of Information Act Request(FOIA) From:Rob Kavanaugh Lt42' Thanks for your response and letter dated Oct.31.2011 ref the...

275

BPA-2012-01311-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

writing on behalf of PTu to lodge a request with the Bonneville Power Administration (BPA), pursuant to the Freedom of Information Act (FOIA), 5 U.S.C. 552, and implementing...

276

BPA-2012-01784-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Zornes Organization: none Address: Phone: No FAX number provided Email: RECEIVED BY BPA FO A OFFICE TIM DATE: DUE DATE: V. LOGE Description of Request: I am making this...

277

BPA-2011-00300-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 Atterbury,Laura M - DK-7 From: on behalf of FOIA Subject: FW: FOIA Request From: ben.johnson@btjd.com mailto:ben.johnson@btjd.com) Sent: Monday, November 22, 2010 1:20 PM To:...

278

BPA-2012-01869-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OFF WE THIS DATE: oj DUE DATE: Ib)q Ji;i LOG 2O- Di1P Description of Request: Hello, I would like to know how many GS9 or above archaeologists (0193) work for you agency....

279

BPA-2011-01515-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BP FOA OFF E TUS DATE: 'f o?S a7 DUE DA E LOG Description of Request: Any and all records related in any way to Mud Lake andor Circle C Rock Products located at NW 334th...

280

BPA-2012-01880-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

No FAX number provided Email: jshwartz@uoregon.edu Description of Request: I seek all records associated with "RTO West" and "Grid West." I am only interested in records from the...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

BPA-2011-00930-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

No FAX number provided Email: I: Ot; S Description of Request: I live adjacent to a PBA transmission line right of way and you have an easement on my property. On 4-6, I beleive...

282

BPA-2011-00987-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Request: I would like the dates of all the times the Castle Rock - Lexington line have been cleared or trimmed by BPA brushtree trimming crews for the past 20 years....

283

BPA-2012-00507 FOIA request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in the process of updating its information related to the investment of the 500 kv transmission line systems in Montana. Pursuant to the Freedom of Information Act, we request the...

284

Governments' and Terrorists' Defense and Attack in a T-Period Game  

Science Journals Connector (OSTI)

We analyze how a government allocates its resources between attacking to downgrade a terrorist's resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government's asset and defending ... Keywords: conflict, contest success function, dynamics, game theory, multiple-period game, terror capacity, terrorism, threat

Kjell Hausken; Jun Zhuang

2011-03-01T23:59:59.000Z

285

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato  

E-Print Network [OSTI]

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

286

An attack on CFB mode encryption as used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to determine 16 bits of any block of plaintext with about 215 oracle ... Keywords: OpenPGP, chosen-ciphertext attacks, cipher-feedback mode, encryption

Serge Mister; Robert Zuccherato

2005-08-01T23:59:59.000Z

287

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

288

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering  

E-Print Network [OSTI]

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks without stuttering. The attack takes around O(285 ) CPU clocks with 278 keystream observations. Keywords

289

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

290

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

291

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

292

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ... Keywords: Attacker intent and strategy modeling, attack strategy inference, game theory

Peng Liu; Wanyu Zang; Meng Yu

2005-02-01T23:59:59.000Z

293

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

294

WA_00_025_PRAXAIR_INC_Waiver_Request.pdf | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

25PRAXAIRINCWaiverRequest.pdf WA00025PRAXAIRINCWaiverRequest.pdf WA00025PRAXAIRINCWaiverRequest.pdf More Documents & Publications WA00001PRAXAIRINCWaiverofDo...

295

Ice slurry technology can save heart attack victims, surgery patients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

296

Argonne applied mathematicians use INCITE awards to attack energy problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

297

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

298

Secondary Prevention after Ischemic Stroke or Transient Ischemic Attack  

Science Journals Connector (OSTI)

...-pressure lowering depend on the particular class of antihypertensive drugs or simply on the antihypertensive effect of all such drugs remains controversial, although most of the evidence appears to support the latter. The PROGRESS trial showed a greater reduction in the risk of stroke and other vascular... This article reviews recommended strategies to reduce the risk of a subsequent stroke in patients with a history of transient ischemic attack (TIA) or stroke.

Davis S.M.; Donnan G.A.

2012-05-17T23:59:59.000Z

299

Factors contributing to resistance of cotton to pink bollworm attack  

E-Print Network [OSTI]

cage used in the anti?biosis s t u d y . . . . . . . . . . . . . . . . 5 ? 0 Appendix II. Figure 1* Pink bollworm emergence data, College Station, Texas ,19f?6-195>8. . 1^2 FACTORS CONTRIBUTING TO RESISTANCE OF COTTON TO PINK BOLLWORM ATTACK... hybrids resulting from crosses of aphid- resistant and susceptible cantaloupes were resistant and that the F2 progeny were three-fourths resistant and one- fourth susceptible* This typical Mendellan ratio indicates that resistance was due to a single...

Williams, Robert Kenneth

2013-10-04T23:59:59.000Z

300

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

ARM - Engineering Change Request & Engineering Change Order Guidelines  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Change Request & Change Request & Engineering Change Order Guidelines Page Contents: Guideline for Starting a Request for a New ARM Product, Capability, or Functionality Engineering Task Tracking Tool Tracking Capabilities Getting Closure, the Baseline Change Request Glossary Engineering Change Request & Engineering Change Order Guidelines Requesting Engineered Products and Services in ARM Guideline for Starting a Request for a New ARM Product, Capability, or Functionality The purpose of this guideline is to establish a method that members of the ARM Infrastructure team may use to submit requests for products and services from the ARM Engineering Group. The concept of "new product, capability, or functionality" refers to the idea that requests the ARM Infrastructure Team to make to the Engineering Group that will ultimately

302

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

~nstructions on reverse) ~nstructions on reverse) G E N E R A L SERVICES A D M I N I S T R A T I O N N A T I O N A L ARCHIVES A N D RECORDS SERVICE, WASHINGTON, D C 20408 1. F R O M (Agency or ertablishment) L E A V E B L A N K JOB NO. di-%3%-fF / C D A T E R E C E I V E D flzg)~? NOTIFICATION TO AGENCY n t n f F n e r a v - Sari Francisco Operations Office . 3. M I N O R S U B D I V I S I O N b ~ s ~ ~ 5 ? % 5 2 5 Lawrence Berkel ey Laboratory 4. N A M E O F PERSON W I T H W H O M T O CONFER IS. TELEPHONE EXT. I hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records; that the records proposed for disposal in this Request of 1 page(s) are not now needed for the business of this agency or will not be needed after the retention periods specified; and that written concurrence from the General Accounting Office, if required under the provisions of Title 8 of the GAO Manual for Guidance of Federal Agencies, is

303

REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

Instructions on reverse) Instructions on reverse) LEAVE BLANK - GENERAL SERVICES ADMINISTRATION NATIONAL ARCHIVES AND RECORDS SERVICE, WASHINGTON, DC 20408 I . F R O M (Agency or ertabluhmentJ D A T E RECEIVED NOTIF~CATION TO AGENCY Department of Energy 2. MAJ0.R S U B D I V I S I O N I 4 . N A M E O F PERSON W I T H W H O M T O CONFER 15. TELEPHONE E X T . \OATS l A R C H l V l S T O F T H E U N I T E D STATES In accordance with the provisions of 44 U.S.C. 3303 the dispoal request. including amendmentr, is approved . 3. M I N O R S U B D I V I S I O N except for items that may be marked "disposition not approved" or "withdrawn" in column 10. If no records are proposed for disposal, the signature of the Archivist is not required. I hereby certify that I am authorized to act for this agency in matters pertaining to the disposal of the agency's records;

304

2013 Reinvention Fund Request for Proposals 1 2013 Reinvention Fund: Request for Proposals  

E-Print Network [OSTI]

2013 Reinvention Fund Request for Proposals 1 2013 Reinvention Fund: Request for Proposals Building a Living Laboratory for Sustainability at Penn State Reinvention Fund Projects Pre-Proposals Due: October 21, 2013 Full Proposals Due: December 20, 2013 Student Sustainability Innovation Projects Pre

Maranas, Costas

305

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon  

E-Print Network [OSTI]

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon populations. Module 1 The Psychological Effects of Terror 1. Terror as a Strategy of Psychological Warfare against the Masses 2. Mental Health

Rhode Island, University of

306

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

307

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

308

FY 2014 Budget Request Now Available | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FY 2014 Budget Request Now Available FY 2014 Budget Request Now Available FY 2014 Budget Request Now Available April 10, 2013 - 5:20pm Addthis The Office of Electricity Delivery and Energy Reliability's (OE) FY 2014 budget request represents an increased investment in the continued commitment to help keep America's energy flowing, promote economic prosperity, and move the nation closer to a cleaner and more secure energy future. Highlights of OE's FY2014 budget request, and Assistant Secretary Patricia Hoffman's presentation on the budget request are also available online. For more information, click here. The entire FY 2014 budget request for the Department of Energy is also available online. For highlights of the Department's FY 2014 budget request, read the press release. Addthis Related Articles

309

Request for Proposals in Organic & Sustainability Systems Research, Teaching & Outreach  

E-Print Network [OSTI]

Request for Proposals in Organic & Sustainability Systems Research, Teaching & Outreach Proposal at Cornell's College of Agriculture and Life Sciences (CALS) requests proposals for innovative research, teaching and extension/outreach projects involving organics and sustainability in farm and food systems

Pawlowski, Wojtek

310

Recommendation 178: FY 2011 DOE Oak Ridge EM Budget Request ...  

Office of Environmental Management (EM)

78: FY 2011 DOE Oak Ridge EM Budget Request Recommendation 178: FY 2011 DOE Oak Ridge EM Budget Request At our April 8, 2009, meeting, the Oak Ridge Site Specific Advisory Board...

311

Recommendation 209 : FY 2014 DOE Oak Ridge EM Budget Request...  

Office of Environmental Management (EM)

9 : FY 2014 DOE Oak Ridge EM Budget Request Recommendation 209 : FY 2014 DOE Oak Ridge EM Budget Request At the April 11, 2012, meeting, the Oak Ridge Site Specific Advisory Board...

312

Recommendation 216: FY 2015 DOE Oak Ridge EM Budget Request ...  

Office of Environmental Management (EM)

6: FY 2015 DOE Oak Ridge EM Budget Request Recommendation 216: FY 2015 DOE Oak Ridge EM Budget Request At the May 8, 2013, meeting, the Oak Ridge Site Specific Advisory Board...

313

Recommendation 197: FY 2013 DOE Oak Ridge EM Budget Request ...  

Office of Environmental Management (EM)

7: FY 2013 DOE Oak Ridge EM Budget Request Recommendation 197: FY 2013 DOE Oak Ridge EM Budget Request At the May 26, 2011, meeting, the Oak Ridge Site Specific Advisory Board...

314

REQUEST FOR RECORDS DISPOSITION AUTHORITY | Department of Energy  

Office of Environmental Management (EM)

U. S. Atomic Energy Commision REQUEST FOR RECORDS DISPOSITION AUTHORITY More Documents & Publications REQUEST FOR RECORDS DISPOSITION AUTHORITY DOE-HDBK-1109-97 DOE-HDBK-1109-97...

315

Highlights of the FY 2011 Congressional Budget Request for OE...  

Office of Environmental Management (EM)

Highlights of the FY 2011 Congressional Budget Request for OE The FY 2011 Office of Electricity Delivery and Energy Reliability (OE) budget request is 185.9 million, 14.0...

316

Alternative Fuels Data Center: Request to Report Research on Second  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Request to Report Request to Report Research on Second Generation Biofuels to someone by E-mail Share Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Facebook Tweet about Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Twitter Bookmark Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Google Bookmark Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Delicious Rank Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on Digg Find More places to share Alternative Fuels Data Center: Request to Report Research on Second Generation Biofuels on AddThis.com... More in this section...

317

POCs for Emergency Requests of Oil from the SPR | Department...  

Energy Savers [EERE]

POCs for Emergency Requests of Oil from the SPR POCs for Emergency Requests of Oil from the SPR SPR personnel are available to answer any questions you might have. Please contact...

318

Requesting A Token | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A Token A Token Requesting A Token Step One - Registering with MIS To request a DOE Two-Factor Authentication Token you must first register in DOE's Management Information System (MIS) by going to https://mis.doe.gov/, selecting "Requesting Access" and following the onscreen instructions. Note: DOE Federal employees are already registered and do not need to complete this step, they may skip to step 2 During the registration process you will be required to search for, and select, a DOE sponsor. Your DOE sponsor is the DOE federal employee that is certifying that you have a recognized relationship with the Department and have a valid need for a DOE Two-Factor Authentication Token. For contractors this person is often your Contract Task Manager, Contracting

319

I REQUEST FOR RECORDS DISPOSITION AUTHORITY  

Broader source: Energy.gov (indexed) [DOE]

REQUEST FOR RECORDS DISPOSITION AUTHORITY REQUEST FOR RECORDS DISPOSITION AUTHORITY LEAVE BL ...A (NARA use only1 JOB NUMBER TO: NATIONAL ARCHIVES & RECORDS ADMINISTRATION In accordance with the provisions of 44 U.S.C. 3303a, the Office of the Chief Information Officer disposition request, including amendments, is approved except for items that may be marked "disposition not approved" or "withdrawn" in column 10. Records Management Division N1-434-02-2 Date received 860 1 ADELPHI ROAD COLLEGE PARK, MD 20740-600 1 1. FROM (Agency or establishment) Department of Energy , ( / I 4 30 -A&&& NOTIFICATION TO AGENCY 6. AGENCY CERTIFICATION I hereby certify that I am authorized to act for this agency in matters pertaining to the disposition of its records and that the

320

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

322

SDSU RESEARCH FOUNDATION FELLOWSHIP/SCHOLARSHIP DISBURSEMENT REQUEST  

E-Print Network [OSTI]

AND RESIDENT ALIENS. DO NOT USE THIS FORM FOR PAYMENTS TO NONRESIDENT ALIENS. Date of Request: From: Period

Ponce, V. Miguel

323

BIA Request for Proposals for Climate Adaptation Grants for Tribes  

Broader source: Energy.gov [DOE]

Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

324

FOIA Frequently Requested Documents: DE-EE0002884 Sapphire Energy  

Office of Energy Efficiency and Renewable Energy (EERE)

FOIA Frequently Requested Documents: DE-EE0002884 Sapphire Energy, GO-12-043 Redacted Sapphire FOIA.

325

Request for Information on Photovoltaic Module Recycling  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy SunShot Initiative requests feedback from industry, academia, research laboratories, government agencies, and other stakeholders on issues related to photovoltaic (PV) module recycling technology. SunShot intends to understand the current state of recycling technology and the areas of research that could lead to impactful recycling technologies to support the developing PV industry. The intent of this request for information is to generate discussion related to planning for the end of life of photovoltaic modules and to create a list of high impact research topics in photovoltaics recycling.

326

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

327

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, November 2013) In light Sciences and Dean, School of Medicine, will provide bridge funding as permitted by the merit of the request for such funds and funds available. A committee has been established to review the requests for bridge funding

Jiang, Huiqiang

328

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, August 2013*) In light Sciences and Dean, School of Medicine, will provide bridge funding as permitted by the merit of the request for such funds and funds available. A committee has been established to review the requests for bridge funding

Benos, Takis

329

College of Engineering Request for Institutional Waiver of Indirect Cost  

E-Print Network [OSTI]

PAF Number College of Engineering Request for Institutional Waiver of Indirect Cost Principal Investigator Sponsor Project Title Total Direct Costs Total Modified Direct Costs Full Indirect Costs Rate Full Indirect Costs Amount Total Project Costs (with Full IDC) Requested Indirect Costs Rate Requested Indirect

Kamat, Vineet R.

330

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

331

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

332

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

333

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

334

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

335

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table... are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table...

Ramanathan, Anu

2012-06-07T23:59:59.000Z

336

E-Print Network 3.0 - amyloid oxidative attack Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: amyloid oxidative attack Page: << < 1 2 3 4 5 > >> 1 Brain Research Reviews 43 (2003) 164178 www.elsevier.comlocatebrainresrev Summary: to...

337

Effect of Tricalcium Silicate Content on Expansion in Internal Sulfate Attack.  

E-Print Network [OSTI]

??The purpose of this study was to determine the cementitious parameters and placement temperature that impact internal sulfate attack in concrete. Concrete structures make up (more)

Whitfield, Troy T.

2006-01-01T23:59:59.000Z

338

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

339

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

340

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

342

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

343

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

344

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

345

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

346

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

347

REQUEST FOR APPROVAL OF OUTSIDE EMPLOYMENT  

Broader source: Energy.gov (indexed) [DOE]

APPROVAL OF OUTSIDE EMPLOYMENT APPROVAL OF OUTSIDE EMPLOYMENT TO: Name of supervisor Title and Routing Symbol and Deputy Assistant General Counsel for Standards of Conduct (GC-77) or Chief Counsel for Local Site FROM: Name and Title DATE: I request approval to engage in outside employment as described below: 1. Name of prospective employer 2.

348

REQUEST FOR CHANGE OF RECORD Name Change  

E-Print Network [OSTI]

(ex. from variation to legal name) or Add Middle Name/Initial ­ Copy of birth certificate, or valid U. Documentation Required for Date of Birth Changes: Copy of birth certificate, or valid U.S. passportREQUEST FOR CHANGE OF RECORD Name Change Social Security Number Change Date of Birth Change

349

Approval Request- VPP- April 13, 1994  

Broader source: Energy.gov [DOE]

The Office of Safety and Quality Assurance (EH-30) is requesting approval for DOE membership in the VPPPA. Attached is the Secretary's authorization of the DOE Voluntary Protection Program (DOE-VPP). The DOE-VPP is designed to formally recognize those contractors which have demonstrated excellence in their health and safety programs.

350

PROJECT REQUEST FORM PROJECT HOLDER INFORMATION  

E-Print Network [OSTI]

PROJECT REQUEST FORM Last Name: Email: PROJECT HOLDER INFORMATION UCID:Last Name: Email: Institute if different than Project Holder) First Name: Project Short Name: (50 characters max) (for eFIN view only) Project Title: PROJECT INFORMATION Start Date (MM/DD/YYYY): End Date (MM/DD/YYYY): For Questions or HELP

de Leon, Alex R.

351

Requested Amount: $7 million annually PROGRAM DESCRIPTION  

E-Print Network [OSTI]

Requested Amount: $7 million annually PROGRAM DESCRIPTION Goals are to increase the level of fire protection to the citizens of Texas and to decrease the level of losses (in lives and property) from wildfires, thereby enhancing the quality of life for Texans. The Texas Wildfire Protection Plan (TWPP

352

PAYMENT PLAN CHANGE REQUEST AND FINANCIAL STATEMENT  

E-Print Network [OSTI]

PAYMENT PLAN CHANGE REQUEST AND FINANCIAL STATEMENT Return this form to: Student Account Assistance University of Minnesota, Twin Cities 211 Science Teaching & Student Services 222 Pleasant St. SE Minneapolis-625-9578. The University of Minnesota is an equal opportunity employer and educator. This form is printed on paper made

Amin, S. Massoud

353

Maryland Global Initiatives Corporation Request to Modify  

E-Print Network [OSTI]

Maryland Global Initiatives Corporation Request to Modify Payment Authorization Agreement (PAA an existing PAA with this MGIC site: 2. The chartstring funding the existing PAA is: Project ID Owner Dept): Terminate the PAA as of (date): Change in scope of work for site (attach) Other change (describe) 4

Weber, David J.

354

BPA-2011-00358-FOIA Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

* S Atterbury,Laura M - DK -7 FFOIA EIVED BY BPA F rom: OFFICE TI1lS Sent: Monday, December 13, 2010 5:45 PM E:l 2- 4- . 10 To: FOIA DUE DATE: Subject: FOIA Request of * 13 - r,...

355

In the Matter of National Broadband Plan Request for Information:  

Broader source: Energy.gov (indexed) [DOE]

In the Matter of National Broadband Plan Request for Information: In the Matter of National Broadband Plan Request for Information: Communications Requirements In the Matter of National Broadband Plan Request for Information: Communications Requirements The American Public Power Association ("APPA") appreciates this opportunity to respond to the Department of Energy ("the Department" or "DOE") regarding its Request for Information ("RFI") on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy. In the Matter of National Broadband Plan Request for Information: Communications Requirements More Documents & Publications Communications Requirements of Smart Grid Technologies RE: NBP RFI: Communications Requirements

356

Fire Protection System Account Request Form | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fire Protection System Account Request Form Fire Protection System Account Request Form Fire Protection System Account Request Form December 2, 2010 Account request form used to obtain user credentials for the Fire Protection Database To obtain a user id and password to access the Fire Protection system, please complete the form, save the file and email it to HSSUserSupport@hq.doe.gov or print and fax it to 301-903-9823. We will provide a username and password to new account holders. Please allow several business days to process your account request. When your request is approved, you will be contacted with your account information. Fire Protection System Account Request Form More Documents & Publications CAIRS Registration Form Microsoft Word - PARS II User Acct Access Guide.rtf PARS Domain User Maintenance Function Support Team Guide (v

357

ARM - Engineering Work Request & Engineering Work Order Guidelines  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Work Request & Engineering Work Request & Engineering Work Order Guidelines Page Contents: Introduction Discussion of the ARM Climate Research Facility Engineering Process: The Engineering Change Request (ECR) and the Engineering Change Order (ECO) Operations and Engineering Task Consulting: The Engineering Work Request (EWR) and the Engineering Work Order (EWO) Relationship of the ECR/ECO and EWR/EWO to the Engineering Task Tracking Tool Relationship of the ECR/ECO and EWR/EWO to the Existing Configuration Control Process in the ARM Climate Research Facility(PIF/CAR, PRR, ORR, and BCR) Glossary Frequently Asked Questions (PDF, 173K) Engineering Work Request & Engineering Work Order Guidelines Process Guidelines for the Engineering Change Request/Engineering Change Order and Engineering Work Request/Engineering Work Order

358

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. to reduce energy prices and for the positions of the Coal-Based Generation Stakeholders group, I am pleased to enclose AAR briefing papers on the following three railroad priorities: repeal of the 4.3 cent per gallon "deficit reduction" diesel fuel tax, an acceptable resolution of the coal mine valley fill issue, and establishment of a locomotive fuel efficiency program within the Department of Energy. nepdg_2251_2500.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy. PoliResponse to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy.

359

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

360

Measurement of attacks and interferences with health care in conflict: validation of an incident reporting tool for attacks on and interferences with health care in eastern Burma  

Science Journals Connector (OSTI)

Attacks on health care in armed conflict and other civil disturbances, including those on health workers, health facilities, patients and health transports, represent a critical yet often overlooked violation ...

Rohini J Haar; Katherine HA Footer; Sonal Singh; Susan G Sherman

2014-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

An ab initio investigation into the SN2 reaction: Frontside attack versus backside attack in the reaction of F? with CH3F  

Science Journals Connector (OSTI)

The energy hypersurface for the attack of fluoride ion on methyl fluoride has been explored with ab initio LCAO-SCF calculations at a split-valence basis set level. Transition states for frontside and backside at...

H. Bernhard Schlegel; Kurt Mislow; Fernando Bernardi

1977-01-01T23:59:59.000Z

362

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

363

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

364

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

365

Digital image watermarking resistant to geometric and removal attacks in the wavelet transform domain  

E-Print Network [OSTI]

,2]. The watermark is embedded in the image additively, in the difficulty. g · Translation · Row and column removalDigital image watermarking resistant to geometric and removal attacks in the wavelet transform watermarking scheme resistant to various commonly used removal attacks. g p y watermark image will still

Qi, Xiaojun

366

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

Bencsáth, Boldizsár

367

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

368

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

369

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

Düntsch, Ivo

370

Framework for using grocery data for early detection of bio-terrorism attacks  

E-Print Network [OSTI]

Framework for using grocery data for early detection of bio-terrorism attacks #3; Anna Goldenberg 15213 anya@cmu.edu October 16, 2001 Abstract Early detection of epidemics and bio-terrorism attacks. The main goal of this project is to investigate the possibility of detecting epidemics and bio-terrorism

Goldenberg, Anna

371

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H, the TCP poriion of the bandwidth can be protected. In simulation study, thefilter successfily blocked 99 SYN flooding may be blocked on the server side [1][2][6], the link bandwidth exhaustion attack must

Chao, Jonathan

372

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

373

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

374

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad ... Keywords: attack prediction, computer security, game theory

Peng Liu; Wanyu Zang

2003-10-01T23:59:59.000Z

375

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

376

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-08-03T23:59:59.000Z

377

SLAC Dosimeter / ID Request Form A  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 SLAC Dosimeter / ID Request Form A (For applicants who have completed SLAC Environment, Safety, and Health Training) Sections 1-5 completed by applicant. Section 1: Contact Information Last name: First name: MI: Male Female Birth year (yyyy): Job title: Contact information/mailing address: City: State: Zip code: Country: Dept/Group: Phone number: Mail stop: Users or non-SLAC employees only: List employer, company, or university : Section 2: Identification Badge Request I am applying for my first SLAC identification badge; I have successfully completed the following ES&H training (indicate all that apply): SON SOC EOESH GERT RWT I RWT II

378

PARS II Change Request (CR) Form  

Broader source: Energy.gov (indexed) [DOE]

Title: Phone #: Office/Symbol: Email: CHANGE TYPE: Defect: New Requirement: PRIORITY: PARS II Change Request Form (APR 2011) PARS II Change Request (CR) Form 1 = Prevents the accomplishment of an essential PARS-II capability 3 = Adversely affects the accomplishment of an essential PARS-II capability, but a work-around solution is known 4 = Results in User / Operator inconvenience or annoyance, but does not affect an essential PARS-II capability 5 = Any other effect 1) Detailed description of problem/need. (If possible, provide project #(s) you are working with). PROBLEM/CHANGE DESCRIPTION: 2) Where in system defect is seen or where new functionality is required (i.e., which screen, which report). Screenshots (as separate attachments) are helpful.

379

Distributed Parallel Particle Advection using Work Requesting  

SciTech Connect (OSTI)

Particle advection is an important vector field visualization technique that is difficult to apply to very large data sets in a distributed setting due to scalability limitations in existing algorithms. In this paper, we report on several experiments using work requesting dynamic scheduling which achieves balanced work distribution on arbitrary problems with minimal communication overhead. We present a corresponding prototype implementation, provide and analyze benchmark results, and compare our results to an existing algorithm.

Muller, Cornelius; Camp, David; Hentschel, Bernd; Garth, Christoph

2013-09-30T23:59:59.000Z

380

Request for Qualifications for Sacramento Landfill  

Broader source: Energy.gov [DOE]

This Request for Qualifications (RFQ) solicits experienced companies to design, permit, finance, build, and operate a solar photovoltaic farm (SPV Farm) on the City of Sacramentos 28th Street Landfill. Respondents to this RFQ must demonstrate experience and capacity to design, permit, finance, build, and operate a SPV Farm that generates electricity that can be sold for electrical use through a power-purchase agreement. Submittals must be prepared and delivered in accordance with the requirements set forth in this document.

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Request for Information - Operations and Maintenance (O & M) Support  

Broader source: Energy.gov (indexed) [DOE]

Request for Information - Operations and Maintenance (O & M) Request for Information - Operations and Maintenance (O & M) Support Services for the iManage Request for Information - Operations and Maintenance (O & M) Support Services for the iManage Request for Information (THIS IS NOT A NOTICE OF SOLICITATION ISSUANCE) This is a Special Notice that includes a Request for Information (RFI) to receive comments regarding the attached draft Performance Work Statement (PWS), notice regarding an upcoming Industry Day, and notice regarding one-on-one conferences. This Special Notice is issued solely for information and planning purposes - it does not constitute a Request for Proposal (RFP) or a promise to issue an RFP in the future. This RFI does not commit the Government to contract for any supply or service

382

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, epdg_13501_13750.pdf Mr. BARTON. Right.1639 Mr. GARMAN. You know, it varies widely. I can give you 1640 a very kind of gross median savings. 1641 Mr. BARTON. Well, my understanding is the industry 1642 estimates that the cost of an air conditioner"will increase 1643 by $407, 16.9 percent increase at 12 SEER, and $712 or a 29.5 1644 percent increase at a 13 SEER. So the difference is nearly 1645 double between the 12 and 13, just in the cost of the air 1646 conditioner. Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy

383

DOE to Hold Public Information Meetings on Requested Permit Modifications  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requested Permit Modifications Requested Permit Modifications CARLSBAD, N.M., March 15, 2001 -- The public is invited to comment on requested modifications to the Hazardous Waste Facility Permit for the Waste Isolation Pilot Plant (WIPP). Submittal of the proposed modification request to the New Mexico Environment Department (NMED) by the U.S. Department of Energy (DOE) begins a formal review process that includes a 60-day public comment period and public information meetings. In its submittal, DOE requests five permit changes to modify conditions at the facility. The proposed modifications conform to industry standards for the handling of hazardous materials and would continue to protect the safety of the facility, its employees, and the public. The first two requested changes would eliminate redundant and obsolete training

384

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Energy Efficiency Policy Recommendations for the New Administration and Congress. American Council for an Energy-Efficient Economy February, 2001. nepdg_1_250.pdf Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy AARP, National Consumer Law Center, and Public Citizen Comments to:DEPARTMENT OF ENERGY Smart Grid RFI: Addressing Policy and Logistical Challenges AARP Reply Comments to Department of Energy Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy

385

Waste Isolation Pilot Plant Electronic FOIA Request Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Request (FOIA) Request (FOIA) Waste Isolation Pilot Plant Electronic FOIA Request Form To make an Electronic FOIA request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Name: Organization: Address: Phone: FAX: Email: Reasonable Describe Records Describe the specific record(s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are not retained permanently, the more information that

386

NNSA FY 2013 Budget Request | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FY 2013 Budget Request | National Nuclear Security Administration FY 2013 Budget Request | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > NNSA FY 2013 Budget Request NNSA FY 2013 Budget Request NNSA FY 2013 Budget Request FY 2013 Budget Request Seeks $11.5 Billion to Achieve President Obama's Nuclear Security Objectives, Shape Future of Nuclear Security

387

Request For Records Disposition Authority: Strategic Petroleum Reserve  

Broader source: Energy.gov (indexed) [DOE]

Request For Records Disposition Authority: Strategic Petroleum Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office Paper case files pertaining to environmental permit applications, permits and related correspondence as well as NEPA correspondence within of the Strategic Petroleum Reserve Project Management Office (SPRPMO) Request For Records Disposition Authority: Strategic Petroleum Reserve Project Management Office More Documents & Publications 2012 Annual Planning Summary for Fossil Energy, National Energy Technology Laboratory, RMOTC, and Strategic Petroleum Reserve Field Office CX-002673: Categorical Exclusion Determination CX-009794: Categorical Exclusion Determination

388

DOE Issues Final Request for Proposal for Portsmouth Gaseous...  

Energy Savers [EERE]

The U.S. Department of Energy today issued a Final Request for Proposal (RFP), for the continued performance of infrastructure support services at the Portsmouth Gaseous Diffusion...

389

Request For Records Disposition Authority-Nuclear Weapons | Department...  

Broader source: Energy.gov (indexed) [DOE]

For Records Disposition Authority-Nuclear Weapons This document identifies the nuclear weapon records generated by the Department of Energy's (DOE) Nuclear Weapons Complex Request...

390

DOE Issues Final Request for Proposal for Oak Ridge Transuranic...  

Office of Environmental Management (EM)

Oak Ridge Transuranic Waste Processing Center Services DOE Issues Final Request for Proposal for Oak Ridge Transuranic Waste Processing Center Services October 14, 2014 - 2:16pm...

391

The Energy Department's Fiscal Year 2015 Budget Request | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Year 2015 Budget Request Addthis Speakers Secretary Ernest Moniz Duration 48:21 Topic Energy Efficiency Energy Sources Energy Usage National Security + Safety Science & Innovation...

392

Request For Records Disposition Autnority | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Autnority Request For Records Disposition Autnority Published Posters. Posters depicting Department of Energy facilities, research projects, security awareness themes, and related...

393

DOE's Idaho National Lab Issues Request for Proposals for Engineering...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of Energy's Idaho National Laboratory today issued a Request for Proposals (RFP) for engineering services in support of development of NGNP. This RFP is for pre-conceptual...

394

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Air Products and Chemicals, Inc. (Air Products) has requested an advance waiver of...

395

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

AGCP-HQ P.0607 * * STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER ITS SUBCONTRACT UNDER DOE COOPERATIVE...

396

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Praxair, Inc. (Praxair) has requested an advance waiver of domestic and foreign patent rights...

397

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Broader source: Energy.gov (indexed) [DOE]

Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid:...

398

Re~ Request for Information NBP RFI: Data Access | Department...  

Broader source: Energy.gov (indexed) [DOE]

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

399

FY15 OE Budget Request Presentation by Patricia Hoffman | Department...  

Energy Savers [EERE]

of the Office of Electricity Delivery & Energy Reliability FY 2014 Budget Request. OE drives electric grid modernization and resiliency in the energy infrastructure through...

400

Request for Information Regarding a Proposed Funding Opportunity...  

Broader source: Energy.gov (indexed) [DOE]

1:05am Addthis The purpose of this Request for Information (RFI) is to solicit feedback from industry, academia, research laboratories, government agencies, and other stakeholders...

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Request for Information (RFI): Specific Clean Energy Manufacturing...  

Broader source: Energy.gov (indexed) [DOE]

Focus Areas Suitable for a Manufacturing Innovation Institute Request for Information (RFI): Specific Clean Energy Manufacturing Focus Areas Suitable for a Manufacturing...

402

Request for Information Regarding a Proposed Funding Opportunity...  

Broader source: Energy.gov (indexed) [DOE]

2:00am Addthis The purpose of this Request for Information (RFI) is to solicit feedback from industry, academia, research laboratories, government agencies, and other stakeholders...

403

Department of Energy Issues Requests for Applications for Nuclear...  

Office of Environmental Management (EM)

for Nuclear Science and Engineering Scholarships and Fellowships Department of Energy Issues Requests for Applications for Nuclear Science and Engineering Scholarships and...

404

Energy Department Issues Draft Request For Proposal for Nuclear...  

Energy Savers [EERE]

information on the DRFP is available at: https:www.emcbc.doe.govSEBNRCdraftrfppage.php. DOE has requested that all comments, questions, suggested changes, and feedback should...

405

Program FY 2013 Budget Request Presentation Now Available  

Broader source: Energy.gov [DOE]

Today, Doug Hollett, Program Manager for the U.S. Department of Energy's Geothermal Technologies Program, hosted a webinar on the Program's fiscal year 2013 budget request.

406

Felix Storch: Data Request/Warning (2010-SCE-0111)  

Broader source: Energy.gov [DOE]

DOE requested test data from Felix Storch for several models of refrigerators and freezers and issued a warning of inconsistent information provided in Felix Storch's certification reports.

407

2015 INL TECH BASED ECONOMIC DEVELOPMENT DONATION REQUEST FORM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INL TECH BASED ECONOMIC DEVELOPMENT DONATION REQUEST FORM Regional Economic Development, Entrepreneurship, Technology-Based Economic Development & Innovation Return form to...

408

Request for Information on Improving Performance of Federal Permitting...  

Broader source: Energy.gov (indexed) [DOE]

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

409

FY 2012 Budget Request Advanced Research Projects Agency - Energy...  

Energy Savers [EERE]

Budget Request Patricia A. Hoffman, Assistant Secretary February 13, 2012 Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy...

410

FY 2012 Budget Request Advanced Research Projects Agency - Energy...  

Energy Savers [EERE]

April 10, 2013 FY 2014 Budget Request Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy Reliability 2 The Importance of a Modern Grid...

411

FY 2012 Budget Request Advanced Research Projects Agency - Energy  

Energy Savers [EERE]

March 4, 2014 FY 2015 Budget Request Office of Electricity Delivery and Energy Reliability Office of Electricity Delivery and Energy Reliability 2 The Importance of a Modern Grid...

412

DOE Publishes Request for Information for Ceiling Fans | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Fans Energy Conservation Standards DOE Publishes Final Rule for the Request for Exclusion of 100 Watt R20 Short Incandescent Reflector Lamps from Energy Conservation Standards...

413

Statement on FY14 Budget Request Before the Senate Committee...  

National Nuclear Security Administration (NNSA)

In addition, the budget request supports progress on achieving ignition, or thermonuclear burn in the laboratory, in accordance with the Path Forward report supplied to...

414

Request For Records Disposition Authority | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Records Schedule Contractor Checks Request For Records Disposition Authority More Documents & Publications DOE-STD-4001-2000 DOE Records Disposition Schedule Changes Audit Letter...

415

Response to several FOIA requests- Renewable Energy pages 4001- 4250  

Broader source: Energy.gov [DOE]

Response to several FOIA requests - Renewable Energy. nepdg_4001_4250.pdf R.eport Statement/Recommendation Background Pros/Cons discussion

416

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Broader source: Energy.gov (indexed) [DOE]

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

417

Request for Proposal for Testing and Inspection Services RFP...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 National Renewable Energy Laboratory Managed and Operated by the Alliance for Sustainable Energy, LLC Request for Proposals Number RHB-4-42432 "Service Agreement for Testing and...

418

Financial Institution Request for Proposals and Selection Process  

Broader source: Energy.gov [DOE]

A state or local government typically conducts a competitive procurement procedure to award loan loss reserve (LLR) funds to a financial institution partner. The request for proposals (RFP)...

419

Climate Action Champions Request for Applications Informational Webinar  

Office of Energy Efficiency and Renewable Energy (EERE)

This Webinar will provide prospective Applicants with an overview of the Climate Actions Champions Request for Applications, the application process and respond to questions posed by attendees.

420

Federal Energy Management Program (FEMP) Technical Assistance Request Portal User Guide  

Broader source: Energy.gov [DOE]

Document explains how to navigate the FEMP Technical Assistance request portal. It includes instruction on how to register for an account, submit a request for assistance, and review saved requests.

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Scaling property and opinion model for interevent time of terrorism attack  

E-Print Network [OSTI]

The interevent time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows it follows a scale-free property. In order to understand the dynamic mechanism of such statistic feature, an opinion dynamic model with memory effect is proposed on a two-dimension lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter of the system reaches a critical value. Ultimately, the model reproduces the same statistical property as the empirical data and gives a good understanding of terrorism attack.

Zhu, Jun-Fang; Wang, Bing-Hong

2009-01-01T23:59:59.000Z

422

Florida Power and Light Comments on Smart Grid Request For Information...  

Broader source: Energy.gov (indexed) [DOE]

Florida Power and Light Comments on Smart Grid Request For Information (RFI): Addressing Policy & Logistical Challenges. Florida Power and Light Comments on Smart Grid Request For...

423

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

424

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

425

Optimal power grid protection through a defenderattackerdefender model  

Science Journals Connector (OSTI)

Abstract Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defenderattackerdefender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attackerdefender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defenderattackerdefender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

Wei Yuan; Long Zhao; Bo Zeng

2014-01-01T23:59:59.000Z

426

E-Print Network 3.0 - attack model development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: for the development of realistic models of DoS traffic, can be packaged as an automated tool to aid in rapid response... to detect and re- spond to attacks quickly....

427

An Attack on CFB Mode Encryption as Used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP...15 oracle queries for the initial setup work and 215 oracle queries for each block. S...

Serge Mister; Robert Zuccherato

2006-01-01T23:59:59.000Z

428

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

429

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks  

Science Journals Connector (OSTI)

Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet. Its distributed and cooperative nature makes i...

Angelo Furfaro; Pasquale Pace; Andrea Parise

2014-01-01T23:59:59.000Z

430

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

431

Antibiosis and Preferences as Factors in the Resistance of Certain Cottons to Pink Bollworm Attack  

E-Print Network [OSTI]

of resistance in this host-parasite relationship. There are sevezal economicaUy important paste attacking cotton. Resistant qualities have been demonstrated 1n certain varieties aga1nst sevezal of these pasta. Isely (1935) reported that cotton bo...

Reed, David Kent

1960-01-01T23:59:59.000Z

432

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Ettringite Fly ash Microstructural studies Sulfate attack a b s t r a c t A conventional solution in reducing of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

433

Proactive Intrusion Prevention and Response via Attack Graphs Steven Noel and Sushil Jajodia  

E-Print Network [OSTI]

triage and after-the-fact remediation. This chapter examines proactive methods of attack risk reduction for optimal countermeasures. This chapter describes the latest advances in an innovative proactive approach

Noel, Steven

434

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

435

Microsoft Word - Student Travel Request Form.docx  

Broader source: Energy.gov (indexed) [DOE]

neup@inl.gov | Fax: (208) 526-8076 | Phone: (208) 526-1336 neup@inl.gov | Fax: (208) 526-8076 | Phone: (208) 526-1336 FELLOWSHIP TRAVEL REQUEST FORM Student Name: _____________________________ Date of Request: _________________________ University: ________________________________ Email Address: ___________________________ Phone: ___________________________________ In-State Travel Out-of-State Travel Event Name: ___________________________________________________________________________ Destination: ___________________________________________________________________________ Justification: ___________________________________________________________________________ *Presentation/Poster Title: _______________________________________________________________ Departure Date: _________________________ Return Date: _________________________

436

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, December 2010) In light to provide bridge funding to the extent possible. The requests for funding will likely exceed the funds. For any given application to this program, if a decision is made to award bridge funding, that award

Sibille, Etienne

437

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, October 2012) In light bridge funding as permitted by funds available. A committee has been established to review the requests for bridge funding and to make prioritized recommendations for awards to Dr. Levine. This process

Sibille, Etienne

438

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, October 2011) In light to provide bridge funding to the extent possible. The requests for funding will likely exceed the funds. For any given application to this program, if a decision is made to award bridge funding, that award

Sibille, Etienne

439

REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences  

E-Print Network [OSTI]

1 REQUEST FOR BRIDGE FUNDING Schools of the Health Sciences (Revised, January 2009) In light to provide bridge funding to the extent possible. The requests for funding will likely exceed the funds. For any given application to this program, if a decision is made to award bridge funding, that award

Sibille, Etienne

440

Binghamton University Space Request Form Innovative Technologies Complex Biotechnology Building  

E-Print Network [OSTI]

Binghamton University Space Request Form Innovative Technologies Complex ­ Biotechnology Building) Biotechnology Building. The individual researcher or research group leader requesting this space should complete ­ Biotechnology Building Revised:7/29/10 Section II . Check the one that most closely describes how space

Suzuki, Masatsugu

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Revised 4/7/14 POOL USE REQUEST FORM  

E-Print Network [OSTI]

-2873 Swimming Pool (during pool hours) 344-3496 Responsibilities of the host upon Approval of this requestRevised 4/7/14 POOL USE REQUEST FORM Building 478 Activity As the hosting BNL Employee, YOU MUST be present at this function. Check with Pool for availability, ext. 3496

442

A National Survey of Stress Reactions after the September 11, 2001, Terrorist Attacks  

Science Journals Connector (OSTI)

...population represented in the March 2001 Current Population Survey, our sample slightly overrepresented women, non-Hispanic whites, and persons with higher levels of education and household income, which is typical of samples selected by means of random-digit dialing. As a sensitivity analysis, we repeated... After the September 11 terrorist attacks, Americans experienced symptoms of psychological stress. This survey of U.S. adults performed just five days after the attacks quantifies the extent of the stress reactions.

Schuster M.A.; Stein B.D.; Jaycox L.H.

2001-11-15T23:59:59.000Z

443

Energy Secretary Announces $52 Million Request for Asia Pacific Partnership  

Broader source: Energy.gov (indexed) [DOE]

52 Million Request for Asia Pacific 52 Million Request for Asia Pacific Partnership on Clean Development and Climate Energy Secretary Announces $52 Million Request for Asia Pacific Partnership on Clean Development and Climate January 12, 2006 - 10:33am Addthis FY 2007 money to expand the use of clean energy technologies SYDNEY, AUSTRALIA - Secretary of Energy Samuel W. Bodman today announced that President Bush will request $52 million in the upcoming FY 2007 budget to support the efforts of the Asia Pacific Partnership on Clean Development and Climate. This Partnership will expand the use of new energy technologies, improve environmental quality, and promote worldwide economic growth. This funding request will complement the $3 billion the U.S. spends each year on climate change technology solutions and the billions of

444

How to Submit a FOIA Request | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to Submit a FOIA Request | National Nuclear Security Administration to Submit a FOIA Request | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) > How to Submit a FOIA Request How to Submit a FOIA Request FOIA requests to the NNSA/Office of the General Counsel may be submitted in

445

Request for Comments on the Electric Grid Integration Technical Workshops  

Broader source: Energy.gov (indexed) [DOE]

Request for Comments on the Electric Grid Integration Technical Request for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Request for Comments on the Electric Grid Integration Technical Workshops Summaries: Federal Register Notice Volume 78, No. 35 - Feb. 21, 2013 Notice is hereby given that two documents are publicly available and the Department of Energy is requesting public comments. The documents are the Electricity Distribution System Workshop Discussion Summary and the Electricity Transmission System Workshop Discussion Summary. Written comments are to be received no later than March 25, 2013. For details on how to submit comments, please view the Federal Register Notice, below. Request for Comments on the Electric Grid Integration Technical Workshops

446

DOE Headquarters FOIA Request Form | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Management » Freedom of Information Act » DOE Operational Management » Freedom of Information Act » DOE Headquarters FOIA Request Form DOE Headquarters FOIA Request Form To make an Electronic FOIA (E-FOIA) request, please provide the information below. Failure to enter accurate and complete information may render your FOIA request impossible to fulfill. * Requests submitted under the Privacy Act must be signed and, therefore, cannot be submitted on this form. Contact information Name * Organization Address * Fax number Phone number Email address Reasonably Describe Records Describe the specific record (s) you seek with sufficient detail that a knowledgeable official of the activity may locate the record with a reasonable amount of effort. Such detail should include: dates, titles, file designations, and offices to be searched. Since most DOE records are

447

Comments of Avista Corporation on DOE Request for  

Broader source: Energy.gov (indexed) [DOE]

Avista Corporation on DOE Request for Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy More Documents & Publications

448

Leader Electronics: Data Request (2010-SE-2301) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Data Request (2010-SE-2301) Data Request (2010-SE-2301) Leader Electronics: Data Request (2010-SE-2301) August 19, 2010 DOE requested test data from Leader Electronics Inc. for various models of external power supplies after Leader Electronics certified energy values that did not meet federal energy conservation standards. Leader Electronics was required to provide test data, including complete test reports, for external power supply models "NU50-2093400-I3(NU50-21090-300F)" and "MU03-F050040-AI(MU03-F1050-AKOS)." Leader Electronics: Data Request (2010-SE-2301) More Documents & Publications Leader Electronics: Noncompliance Determination (2010-SE-2301) Leader Electronics: Notice of Allowance (2010-SE-2301) Lutron Electronics: Noncompliance Determination (2012-SE-3796

449

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

450

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

51 - 9660 of 28,905 results. 51 - 9660 of 28,905 results. Map START Program Project Sites The Strategic Technical Assistance Response Team (START) Program is part of the DOE Office of Indian Energy effort to assist in the development of tribal renewable energy projects. Through START,... http://energy.gov/indianenergy/maps/start-program-project-sites Article V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. http://energy.gov/cio/articles/v-153-symantec-brightmail-gateway-input-validation-flaw-permits-cross-site-scripting Article V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form

451

Recommendation 224: Recommendations on the FY 2016 DOE Oak Ridge Environmental Management Budget Request  

Broader source: Energy.gov [DOE]

ORSSAB provides recommendations on the DOE Oak Ridge Environmental Management budget request for FY 2016.

452

Training Request Form Administration Training Services, Organizational Effectiveness/OHR 612-626-1373 ULearn  

E-Print Network [OSTI]

Training Request Form Administration Training Services, Organizational Effectiveness/OHR · 612-626-1373 ULearn www.umn.edu/ohr/trainingservices 5-17-12 A Training Request Forms are designed to obtain additional information from a learner when requesting training in ULearn. The Training Request Form

Minnesota, University of

453

Copy 1 Purchasing Copy 2 Residence Hall Director Request for Reimbursement  

E-Print Network [OSTI]

copy to the Purchasing Office. 3. The Purchasing Director will review the "Request for RequestCopy 1 ­ Purchasing Copy 2 ­ Residence Hall Director MU 6/94 Request for Reimbursement For Damages: _________________________________________________________________________________________ _________________________________________________________________________________________ _________________________________________________________________________________________ #12;Copy 1 ­ Purchasing Copy 2 ­ Residence Hall Director PROCEDURES FOR REQUESTING REIMBURSEMENT

Hardy, Christopher R.

454

FOIA Frequently Requested Documents: DE-EE0002884 Recovery Act- Integrated Algal Biorefinery (IABR)  

Office of Energy Efficiency and Renewable Energy (EERE)

FOIA Frequently Requested Documents: DE-EE0002884 Recovery Act - Integrated Algal Biorefinery (IABR).

455

STUDENT INTERN RELOCATION BENEFIT REQUEST FORM  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

01-RBR (8-2013) 01-RBR (8-2013) UCI (When Completed) UCI (When Completed) STUDENT INTERN RELOCATION BENEFIT REQUEST FORM Instructions for New Hire, Re-hire or Year-round Intern returning to Sandia work site from remote location: Review eligibility criteria below. If you believe that you may be eligible to receive relocation benefits from Sandia, complete and sign this form, then return to the CA or NM Student Intern Programs office. ELIGIBILITY CRITERIA Name: Phone: Email: School/Academic Residence Address Permanent Address Address 1 Address 2 City State Zip Code Student Acknowledgement: I certify that the information stated on this form is correct and complete to best of my knowledge. I

456

REQUEST FOR PROPOSALS RENEWABLE ENERGY CERTIFICATES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, 2005 5, 2005 REQUEST FOR PROPOSALS RENEWABLE ENERGY CERTIFICATES Issued by: World Resources Institute on behalf of corporate partners in the GREEN POWER MARKET DEVELOPMENT GROUP BACKGROUND Convened in 2000 by the World Resources Institute, the Green Power Market Development Group is a unique commercial and industrial partnership dedicated to building corporate markets for green power. The Group is transforming energy markets to enable corporate buyers to diversify their energy portfolios and reduce their impact on climate change. Group partners are Alcoa Inc., Delphi Corporation, the Dow Chemical Company, DuPont, FedEx Kinko's, General Motors, IBM, Interface, Johnson & Johnson, NatureWorks LLC, Pitney Bowes, Staples, and Starbucks Coffee Company. More information is available at

457

FY2012 EERE Congressional Budget Request  

Broader source: Energy.gov (indexed) [DOE]

Energy Efficiency and Renewable Energy Energy Efficiency and Renewable Energy eere.energy.gov The Parker Ranch installation in Hawaii The FY 2012 Budget Request February 2011 Henry Kelly Principal Deputy Assistant Secretary for EERE 2 | Energy Efficiency and Renewable Energy eere.energy.gov "This is our generation's Sputnik moment. We'll invest in ... clean energy technology - an investment that will strengthen our security, protect our planet, and create countless new jobs for our people. Maintaining our leadership in research and technology is crucial to America's success." President Obama State of the Union January 25, 2011 Clean Innovative Energy Solutions Securing America's Future 3 | Energy Efficiency and Renewable Energy eere.energy.gov EERE Budget Trend EERE Budget Trend FY 2003 -

458

REQUEST FOR RECORDS DISPOSITION AUTHORITY S  

Broader source: Energy.gov (indexed) [DOE]

S S e e Instructions o n reverse) NATIONAL ARCHIVES and RECORDS ADMINISTRATION (NIR) WASHINGTON. DC 20408 , - - 1. FROM (Agency or establishment) Department of Energy 2. MAJOR SUBDIVISION Assistant Secretary For Fossil Energy (FE-1) I 3. MINOR SUBDIVISION Office of Naval Petroleum and Shale Oil 4 . NAME OF PERSON WITH WHOM TO CON I 1 Jerry Hinkle (FE 47) 1(202)586-43 80 I I / 6. AGENCY CERTIFICATION I NOTIFICATION TO AGENCY i I In accordance with the provisions of 44 U.S.C. 3303a the disposition request, including amendments, is ap roved except for items that may be marke! "dis osition not approved" or "withdrawn" in c o L n 10. I hereby certify that I am authorized to act for this agency in yatters pertaining to of its records and that the records roposed for disposal on the attached

459

EM FY 2012 Presidential Budget Request  

Broader source: Energy.gov (indexed) [DOE]

safety performance cleanup closure safety performance cleanup closure E M Environmental Management 1 EM FY 2012 Presidential Budget Request www.em.doe.gov E M Environmental Management 2 safety performance cleanup closure Leveraging strategic investments to meet compliance and maintain cleanup momentum  We reduce risks and protect our workers, our communities and the environment through cleanup  Our work is urgent and essential to the health and economic vitality of our communities and the nation and positions our Sites for future missions and use  Our mission is not discretionary - it is a congressional mandate to D&D the gaseous diffusion plant under the U.S. Energy Policy Act of 1992 and a federal obligation to address the cold war environmental legacy cleanup and honor our

460

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Broader source: Energy.gov (indexed) [DOE]

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Trojan-horse attacks threaten the security of practical quantum cryptography  

E-Print Network [OSTI]

A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

Nitin Jain; Elena Anisimova; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-06-23T23:59:59.000Z

462

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

463

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting  

E-Print Network [OSTI]

Cost-share Fee Waiver request form Request for a cost share for a GSSP fee waiver on the following project. Documentation from granting agency with information regarding tuition as unallowable must____________________________________________________________ Project Name __________________________________________________________________ Funding Agency

Taylor, Jerry

464

Request for Information on Permitting of Transmission Lines: Federal  

Broader source: Energy.gov (indexed) [DOE]

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

465

How to Request & Access Beam Time | Stanford Synchrotron Radiation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

How to Request & Access Beam Time How to Request & Access Beam Time Step 1: Submit a proposal that summarizes proposed research plans. Step 2: Submit beam time requests. Step 3: Review & accept beam time allocations. Instructions for users allocated beam time on SSRL X-ray/VUV beam lines. Accept Beam Time & Submit Support Request Registration & Assistance User Agreements User Financial Accounts, Supplies, Gases, Domestic & International Shipments User Computer Accounts User Safety Preparing for Arrival/Lodging/Check-In Acknowledgements, Publications, Science Highlights & News Feedback Step 1: Submit a proposal that summarizes proposed research plans. Review the guidelines for proposals and scheduling procedures. Standard proposals can be submitted through the user portal three times each year:

466

Booz Allen Hamilton Response to Department of Energy Request for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Booz Allen Hamilton Response to Department of Energy Request for Booz Allen Hamilton Response to Department of Energy Request for Information on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Booz Allen Hamilton Response to Department of Energy Request for Information on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform the Federal Smart Grid Policy Booz Allen Hamilton (Booz Allen) has had an enduring relationship with the Department of Energy (DOE) for more than two decades. We are pleased to be responding to the DOE's Request for Information (RFI), Implementing the National Broadband Plan by Studying the Communcations Requirements of Electric Utilities to Inform Federal Smart Grid Policy, with our

467

Response to several FOIA requests - Renewable Energy | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, nepdg_2001_2250.pdf. As in the case of the Chrysler bailout in the 1970s, if a utility must tap into the fund, the taxpayers who made the fund possible receive a legal interest in the future success of the utility. This legal interest comes in the form of stock warrants. They can only be exercised if the price of the stock goes up comfortably above the (presumably epressed) level at the time the warrants were issued. And the state would not actually hold any stock, but rather would exercise its right to buy the stock at the earlier (lower) price, and this would trigger an obligation on the part of the utility to buy it back at the present (higher) price, less

468

Response to several FOIA requests - Renewable Energy. Demand for Fossil  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Demand for Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. Demand for Fossil Fuels Response to several FOIA requests - Renewable Energy. nepdg_251_500.pdf. Demand for Fossil Fuels. Renewable sources of power. Demand for fossil fuels surely will overrun supply sooner or later, as indeed it already has in the casc of United States domestic oil drilling. Recognition also is growing that our air and land can no longer absorb unlimited quantities of waste from fossil fuel extraction and combustion. As that day draws nearer, policymakers will have no realistic alternative but to turn to sources of power that today make up a viable but small part of America's energy picture. And they will be

469

Response to Request for Information from the Department of Energy:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to Request for Information from the Department of Energy: to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 Response to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." EnerNOC is a provider of demand response and energy efficiency solutions to utilities,

470

DOE Issues Request for Quotations for Depleted Uranium Hexafluoride  

Broader source: Energy.gov (indexed) [DOE]

Issues Request for Quotations for Depleted Uranium Hexafluoride Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services DOE Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services December 12, 2012 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 bill.taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) today issued a Request for Quotation (RFQ) for engineering and operations technical services to support the Portsmouth Paducah Project Office and the oversight of operations of the Depleted Uranium Hexafluoride (DUF6) Conversion Project located in Paducah KY, and Portsmouth OH. The RFQ is for a Time-and-Materials Task Order for three years with two one-year option periods. The estimated contract value is approximately $15 - 20 million.

471

Comments on Request For Information regarding Reducing Regulatory Reform  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Comments on Request For Information regarding Reducing Regulatory Comments on Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). Comments on Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). I have reviewed the Request For Information regarding Reducing Regulatory Reform issued February 3, 2011 (Federal Register /Vol. 76, No. 23 /Thursday, February 3, 2011 /Notices). In the Department of Energy"s (DOE) attempt to meet its obligation to implement Executive Order 13563, ""Improving Regulation and Regulatory Review,"" issued by the President on January 18, 2011, I recommend DOE make a bold move to change

472

NETL: Gasification - Request Gasification Systems Information on a CD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gasification Systems Gasification Systems Request Gasification Systems Information on a CD Please fill in the form below to receive the CDs of your choice. * Denotes required field Requestor Contact Information Requested By (Agency/Company): First Name: * Last Name: * Address: * PO Box: City: * State: * Zip: * Country: Email: * Phone: CD Request Select CD(s):* Gasification Systems Project Portfolio Gasification Technologies Training Course Special Instructions: Submit Request Reset Contacts Program Contact: Jenny Tennant (304) 285-4830 jenny.tennant@netl.doe.gov Close Contacts Disclaimer Disclaimer of Liability: This system is made available by an agency of the United States Government. Neither the United States Government, the Department of Energy, the National Energy Technology Laboratory, nor any of

473

DOE Issues Draft Request for Proposals for Hanford Site Occupational  

Broader source: Energy.gov (indexed) [DOE]

Issues Draft Request for Proposals for Hanford Site Issues Draft Request for Proposals for Hanford Site Occupational Medical Services - Agency Solicits Input from Industry, Stakeholders, and Workforce DOE Issues Draft Request for Proposals for Hanford Site Occupational Medical Services - Agency Solicits Input from Industry, Stakeholders, and Workforce July 19, 2011 - 12:00pm Addthis Media Contact Geoff Tyree, DOE Geoffrey.Tyree@rl..doe.gov 509-376-4171 The Department of Energy today issued a Draft Request for Proposals (RFP) for an Occupational Medical Services acquisition at the Hanford Site in southeastern Washington State. The Draft RFP is one step in the process toward awarding a contract and provides an opportunity for companies, Hanford stakeholders, and the site's workforce to provide input on the Draft RFP. DOE will provide

474

DOE Issues Request for Quotations for Depleted Uranium Hexafluoride  

Broader source: Energy.gov (indexed) [DOE]

Issues Request for Quotations for Depleted Uranium Hexafluoride Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services DOE Issues Request for Quotations for Depleted Uranium Hexafluoride Conversion Technical Services December 12, 2012 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 bill.taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) today issued a Request for Quotation (RFQ) for engineering and operations technical services to support the Portsmouth Paducah Project Office and the oversight of operations of the Depleted Uranium Hexafluoride (DUF6) Conversion Project located in Paducah KY, and Portsmouth OH. The RFQ is for a Time-and-Materials Task Order for three years with two one-year option periods. The estimated contract value is approximately $15 - 20 million.

475

DOE Issues Draft Request for Proposals Seeking Contractor to Manage,  

Broader source: Energy.gov (indexed) [DOE]

DOE Issues Draft Request for Proposals Seeking Contractor to DOE Issues Draft Request for Proposals Seeking Contractor to Manage, Operate Waste Isolation Pilot Plant DOE Issues Draft Request for Proposals Seeking Contractor to Manage, Operate Waste Isolation Pilot Plant April 1, 2011 - 12:00pm Addthis Media Contact Bill Taylor 513-246-0539 william.taylor@emcbc.doe.gov Cincinnati - The U.S. Department of Energy (DOE) issued a Draft Request for Proposal (RFP)seeking a management and operations contractor to maintain the Waste Isolation Pilot Plan (WIPP) and manage the DOE National Transuranic Waste (TRU) Program in Carlsbad, New Mexico. The estimated value of the anticipated contract is from $130 to $160 million per year, for five years, with an option to extend the contract for an additional five years. DOE anticipates awarding a competitive, cost-plusaward-fee

476

Request Photos from 2011 Secretarial Honor Awards Program | Department of  

Broader source: Energy.gov (indexed) [DOE]

Request Photos from 2011 Secretarial Honor Awards Program Request Photos from 2011 Secretarial Honor Awards Program Request Photos from 2011 Secretarial Honor Awards Program To facilitate the distribution of photographs from the 2011 Secretarial Honor Awards Program, held in the Forrestal Building, Washington, D.C. on October 27, 2011, posted here are 1) proof sheets of the photos taken (the proofs are split into two files to facilitate downloading), and 2) an order form to request which images you want to receive, what format you want them (electronic and/or prints), and quantity. Please review the proof sheets for the photos you want, fill in the form (the form is an Acrobat file and is savable from both the free Acrobat Reader as well as a web browser). If you are interested in obtaining files or prints of the photographs

477

Comments of Southern Company Services, Inc. on DOE Request for  

Broader source: Energy.gov (indexed) [DOE]

Comments of Southern Company Services, Inc. on DOE Request for Comments of Southern Company Services, Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Southern Company Services, Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Southern Company Services, Inc., for itself and on behalf of Alabama Power Company, Georgia Power Company, Gulf Power Company, Mississippi Power Company, and its other affiliates (collectively, "Southern"), is pleased to have this opportunity to provide responses to questions contained in the Department of Energy ("DOE") Request for Information

478

SMART GRID Request for Information And Public Comments | Department of  

Broader source: Energy.gov (indexed) [DOE]

SMART GRID Request for Information And Public Comments SMART GRID Request for Information And Public Comments SMART GRID Request for Information And Public Comments July 20, 2011 - 2:46pm Addthis As part of its ongoing effort regarding the formation of smart grid policy, the Department of Energy issued a Request for Information in September of 2010 on the topic of "Addressing Policy and Logistical Challenges to Smart Grid Implementation." The purpose was to solicit comments from interested stakeholders on policy and logistical challenges that confront smart grid implementation, and recommendations on how to best overcome those challenges. The comments and recommendations will help inform the Department and the Administration's analysis of policy challenges and possible solutions being developed by the Smart Grid Subcommittee of the National Science and

479

Energy Department Requests Proposals for Advanced Scientific Computing  

Broader source: Energy.gov (indexed) [DOE]

Requests Proposals for Advanced Scientific Requests Proposals for Advanced Scientific Computing Research Energy Department Requests Proposals for Advanced Scientific Computing Research December 27, 2005 - 4:55pm Addthis WASHINGTON, DC - The Department of Energy's Office of Science and the National Nuclear Security Administration (NNSA) have issued a joint Request for Proposals for advanced scientific computing research. DOE expects to fund $67 million annually for three years to five years under its Scientific Discovery through Advanced Computing (SciDAC) research program. Scientific computing, including modeling and simulation, has become crucial for research problems that are insoluble by traditional theoretical and experimental approaches, hazardous to study in the laboratory, or time-consuming or expensive to solve by traditional means.

480

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Energy. Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy, epdg_13501_13750.pdf Mr. BARTON. Right.1639 Mr. GARMAN. You know, it varies widely. I can give you 1640 a very kind of gross median savings. 1641 Mr. BARTON. Well, my understanding is the industry 1642 estimates that the cost of an air conditioner"will increase 1643 by $407, 16.9 percent increase at 12 SEER, and $712 or a 29.5 1644 percent increase at a 13 SEER. So the difference is nearly 1645 double between the 12 and 13, just in the cost of the air 1646 conditioner. Response to several FOIA requests - Renewable Energy. More Documents & Publications Response to several FOIA requests - Renewable Energy Electricity Advisory Committee Meeting, December 11, 2008: Meeting

Note: This page contains sample records for the topic "request forgery attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Re: DOE Request for Information - Implementing the National Broadband  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DOE Request for Information - Implementing the National DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy Re: DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy The Edison Electric Institute ("EEI"), on behalf of its member companies, hereby submits the following comments in response to the Request for Information ("RFI") by the Department of Energy ("Department" or "DOE") regarding the current and future communications requirements of utilities, including, but not limited to, the requirements of the Smart Grid in an effort to implement certain recommendations of the National Broadband Plan.

482

Department of Energy Issues Draft Request for Proposals for Argonne  

Broader source: Energy.gov (indexed) [DOE]

Draft Request for Proposals for Argonne Draft Request for Proposals for Argonne National Laboratory Contractor Department of Energy Issues Draft Request for Proposals for Argonne National Laboratory Contractor January 3, 2006 - 9:06am Addthis WASHINGTON, DC -- The Department of Energy (DOE) is seeking comments on a draft Request for Proposals (RFP) for the competitive selection of a management and operating (M&O) contractor for Argonne National Laboratory (ANL), a major DOE Office of Science research facility located near Chicago, Ill. This competition for a laboratory contractor is the first in the history of the lab. ANL is a multiprogram laboratory, funded at approximately $492 million annually by the Office of Science (SC), other DOE programs, as well as other government agencies and private industry. Argonne was chartered in

483

Response to several FOIA requests - Renewable Energy | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy Response to several FOIA requests - Renewable Energy, Financing and Technical Assistance for Energy Efficiency Investments in Federal, State, and Other Public Buildings.Background There remains a very large potential for cost-effective eergy savings in federal, state, and local government buildings. While some progress has been made through the Federal Energy Management Program (FEMP), the federal government still spends nearly S4 billion to heat, cool, light, and power its roughly 500,000 buildings. The Federal government together with state and local governments spend more than $8 billion per year on energy in public buildings, with K-12 schools responsible for additional S6 billion in

484

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. National Energy Policy Legislation - A Comprehensive Approach to Ensuring Energy Security March 2001,Summary: A confluence of even s involving rising prices and supply shortages in several energy sectors has focused public and political attention on the need to update the nation's energy policy and to provide for increased production of domestic energy sources. President George W. Bush made this central point in his campaign platform on energy issues and hasdesignated an Administration team under the leadership of Vice President Cheney to develop specific recommendations in this regard. House and Senate

485

How to Respond to data Requests in Portfolio Manager  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

"How To" Series How to Respond to Data Requests in Portfolio Manager ® EPA's ENERGY STAR Portfolio Manager tool helps you measure and track the energy use, water use, and greenhouse gas emissions of your properties, all in a secure online environment. You can use the results to identify under-performing buildings, set investment priorities, verify efficiency improvements, and receive EPA recognition for superior energy performance. Portfolio Manager provides the ability for organizations wishing to collect data from a variety of individuals to develop and use a custom Data Request within Portfolio Manager. You may receive Data Requests from other users or organizations to provide property or portfolio data as part of a program or initiative. Each request includes a

486

Response to several FOIA requests - Renewable Energy. | Department of  

Broader source: Energy.gov (indexed) [DOE]

Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy. Response to several FOIA requests - Renewable Energy,.Summary of Important Terms PETROLEUM PRICES Refiner acquisition cost of crude oil (RAC): The average monthly cost of crude oil to U.S. refiners, including transportation and fees. The composite cost is the weighted average of domestic and imported crude oil costs. Typically, the imported RAC is about $1.50 per barrel below the monthly average spot price of West Texas Intermediate (WTI) crude oil and is within about $0.20 per barrel of the average monthly spot price of Brent crude oil. Unless otherwise stated, the imported RAC is what is referred to in this report as the 'world oil price" or "average crude oil price." 24701

487

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC COMPANY...  

Broader source: Energy.gov (indexed) [DOE]

REQUEST BY GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC36- 04G014223 ENTITLED "HI-WAY INITIATIVE IN NEW YORK";...

488

Response to several FOIA requests - Renewable Energy | Department...  

Broader source: Energy.gov (indexed) [DOE]

& TECHNOLOGY AND JAMES DUDERSTADT UNDER SECY'S CONF. ROOM 11:45 AM (T) PRE-BRIEF FOR USEC MEETING. nepdg1200112250.pdf Response to several FOIA requests - Renewable Energy...

489

EERE FY 2015 Budget Request Webinar-- Renewable Power  

Office of Energy Efficiency and Renewable Energy (EERE)

EERE FY 2015 Budget Request Webinar, featuring Steve Chalk, Deputy Assistant Secretary for Renewable Power, Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy, as presented on Tuesday, April 1, 2014.

490

EERE FY 2015 Budget Request Webinar-- Energy Efficiency  

Office of Energy Efficiency and Renewable Energy (EERE)

EERE FY 2015 Budget Request Webinar, featuring Kathleen Hogan, Deputy Assistant Secretary for Energy Efficiency, Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy, as presented on Wednesday, April 2, 2014.

491

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate  

E-Print Network [OSTI]

Northwest Energy Efficiency Alliance Request for Proposals to Evaluate Existing Consumer Behavioral research, evaluations and behavior change initiatives. The Northwest Energy Efficiency Alliance (NEEA interest groups and energy efficiency industry representatives that operate in the states of Idaho, Montana

492

STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC COMPANY...  

Broader source: Energy.gov (indexed) [DOE]

ft * STATEMENT OF CONSIDERATIONS REQUEST BY GENERAL ELECTRIC COMPANY FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE- FC36-04GO14001 ENTITLED...

493

President Requests $650.8 Million for Fossil Energy Programs...  

Office of Environmental Management (EM)

and includes a rescission of 6 million in prior year funds. Naval Petroleum and Oil Shale Reserves. The FY 2013 budget requests 14.9 million for the Naval Petroleum and Oil...

494

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

-- - , 1 .3 t fLU4 ' I 04 - -t - rt . .5 * * STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE...

495

STATEMENT OF CONSIDERATIONS REQUEST BY AIR PRODUCTS AND CHEMICALS...  

Broader source: Energy.gov (indexed) [DOE]

DOE COOPERATIVE AGREEMENT NO. DE-FC36-94GO10004; W(A)-94-034; CH-0844 The Petitioner, Air Products and Chemicals, Inc. has requested a waiver of domestic and foreign patent...

496

STATEMENT OF CONSIDERATIONS REQUEST BY H2GEN INNOVATIONS, INC...  

Broader source: Energy.gov (indexed) [DOE]

DE-FC04-02AL67613, DOE WAIVER NO. W(A) 02-021. The Petitioner, H2Gen, a subcontractor to Air Products & Chemicals, Inc. (Air Products), has requested a waiver of all domestic and...

497

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

IPL DOE CH 630 252 2779 TO AGCP-HQ P.0204 * * STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER ITS SUBCONTRACT WITH THE GLASS...

498

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC., FOR AN...  

Broader source: Energy.gov (indexed) [DOE]

STATEMENT OF CONSIDERATIONS REQUEST BY PRAXAIR, INC., FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-01NT41147;...

499

WATEMENT OF CONSIDERAJNS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE...  

Broader source: Energy.gov (indexed) [DOE]

WATEMENT OF CONSIDERAJNS REQUEST BY PRAXAIR, INC. FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO. DE-FC26-00NT40756; W(A)-00-018,...

500

FOIA Frequently Requested Documents: DE-EE0002867 Recovery Act...  

Broader source: Energy.gov (indexed) [DOE]

Recovery Act FOIA Frequently Requested Documents: DE-EE0002867 Recovery Act. Algenol Biofuels, Inc. Part 1 of 36 Algenol Biofuels, Inc. Part 2 of 36 Algenol Biofuels, Inc. Part 3...