Powered by Deep Web Technologies
Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

2

Cyber and physical infrastructure interdependencies.  

SciTech Connect (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

3

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

4

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

5

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

indicators vis-a-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we present our definitions of the three indicators; an overview of the eighteen sectors of critical infrastructure...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

6

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

7

Reducing Cyber Risk to Critical Infrastructure: NIST Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to Developing a Cyber Security and Risk...

8

A hybrid systems model to simulate cyber interdependencies between critical infrastructures  

Science Journals Connector (OSTI)

Critical infrastructures (CI) depend on communications and information technology infrastructure (CITI) for many of their key functionalities, which is known as cyber interdependency. In this paper, we presented a cyber interdependency simulation technique that is based on the idea that overall performance of a CI network is determined by the behaviour of its components at multiple time scales. Accordingly, for cyber interdependency simulation, we decomposed CI network into two time scales; regular CI events are captured in large time-steps and data communication network events are captured in smaller time-steps. Two different simulators are used for each of these partitions and results from both simulations are synchronised appropriately. A real life example is presented to demonstrate the accuracy and usefulness of our approach. The hybrid simulation model gives significant flexibility to plug-in domain specific models into the critical infrastructure simulator for accurate and efficient solution.

Hafiz Abdur Rahman; José R. Martí; K.D. Srivastava

2011-01-01T23:59:59.000Z

9

Reducing Cyber Risk to Critical Infrastructure: NIST Framework  

Broader source: Energy.gov [DOE]

Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under Executive Order (EO) 13636 Improving...

10

AstroCloud, a Cyber-Infrastructure for Astronomy Research: Data Archiving and Quality Control  

E-Print Network [OSTI]

AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences){\\url{http://astrocloud.china-vo.org}}\\citep{O8-5_Cui_adassxxiv}. To archive the astronomical data in China, we present the implementation of the astronomical data archiving system (ADAS). Data archiving and quality control are the infrastructure for the AstroCloud. Throughout the data of the entire life cycle, data archiving system standardized data, transferring data, logging observational data, archiving ambient data, And storing these data and metadata in database. Quality control covers the whole process and all aspects of data archiving.

He, Boliang; Fan, Dongwei; Li, Changhua; Xiao, Jian; Yu, Ce; Wang, Chuanjun; Cao, Zihuang; Chen, Junyi; Yi, Weimin; Li, Shanshan; Mi, Linying; Yang, Sisi

2014-01-01T23:59:59.000Z

11

The National Weather Sensor Grid: a large-scale cyber-sensor infrastructure for environmental monitoring  

Science Journals Connector (OSTI)

A sensor grid integrates sensor networks with grid infrastructures to enable the real-time collection of sensor data, and the sharing of computational and storage resources for sensor data processing and management. We have developed a sensor grid architecture framework, called the Scalable Proxy-based aRchItecture for seNsor Grid (SPRING). Based on the SPRING framework, we designed the National Weather Sensor Grid (NWSG), a large-scale cyber-sensor infrastructure for environmental monitoring. The NWSG integrates mini weather stations deployed geographically across Singapore for weather data collection, processing and management. We have designed and implemented core sensor grid middleware components and services such as resource discovery, meta scheduling, job migration and security. The NWSG is designed to support long-term weather monitoring. The performance of the NWSG has been demonstrated in terms of reduction in latency for end-user response, significant improvement in overall system throughput, and even load balance across the sensor grid infrastructure.

Hock Beng Lim; Mudasser Iqbal; Wenqiang Wang; Yuxia Yao

2010-01-01T23:59:59.000Z

12

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

13

AstroCloud, a Cyber-Infrastructure for Astronomy Research: Architecture  

E-Print Network [OSTI]

AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences). The ultimate goal of this project is to provide a comprehensive end-to-end astronomy research environment where several independent systems seamlessly collaborate to support the full lifecycle of the modern observational astronomy based on big data, from proposal submission, to data archiving, data release, and to in-situ data analysis and processing. In this paper, the architecture and key designs of the AstroCloud platform are introduced, including data access middleware, access control and security framework, extendible proposal workflow, and system integration mechanism.

Xiao, Jian; Cui, Chenzhou; He, Boliang; Li, Changhua; Fan, Dongwei; Hong, Zhi; Yin, Shucheng; Wang, Chuanjun; Cao, Zihuang; Fan, Yufeng; Li, Shanshan; Mi, Linying; Wan, Wanghui; Wang, Jianguo; Zhang, Hailong

2014-01-01T23:59:59.000Z

14

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

15

INL Cyber Security Research (2008) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

16

An inter-realm, cyber-security infrastructure for virtual supercomputing  

SciTech Connect (OSTI)

Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

2001-01-01T23:59:59.000Z

17

infrastructure  

National Nuclear Security Administration (NNSA)

for Infrastructure and Operations develops and executes NNSA's infrastructure investment, maintenance, and operations programs and policies.

...

18

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

19

Cognitive Cyber Weapon Selection Tool Empirical Evaluation.  

E-Print Network [OSTI]

??Keeping in pace with the latest technological innovations in the cyber world, the misuse of this powerful infrastructure has also increased proportionally. Although a lot (more)

Ponangi, Preethi Vinayak

2011-01-01T23:59:59.000Z

20

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

22

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

23

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

24

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

25

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

26

Monitoring Advanced Metering Infrastructures with Amilyzer  

E-Print Network [OSTI]

-way communications between smart meters and utility control centers. They are a key component of the smart grid mechanisms are part of communication standards such as the ANSI #12;C12.22. While those protective measures detecting intrusions in IT environments have been developed and evaluated. Through the Trustworthy Cyber

Sanders, William H.

27

Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism  

Science Journals Connector (OSTI)

Abstracts: In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Lachlan MacKinnon; Liz Bacon; Diane Gan; Georgios Loukas; David Chadwick; Dimitrios Frangiskatos

2013-01-01T23:59:59.000Z

28

Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor  

SciTech Connect (OSTI)

The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constraints, inherent flaws in 'Maginot Line' defenses, and the growing number and sophistication of cyberattacks. This article defines the high-priority problems and examines the potential solution space. In that space, achieving scalable trustworthy computing and communications is possible through real-time knowledge-based decisions about cyber trust. This vision is based on the human-physiology-immunity metaphor and the human brain's ability to extract knowledge from data and information. The article outlines future steps toward scalable trustworthy systems requiring a long-term commitment to solve the well-known challenges.

Hively, Lee M [ORNL; Sheldon, Frederick T [ORNL

2011-01-01T23:59:59.000Z

29

INFRASTRUCTURE Engineering and Physical Sciences  

E-Print Network [OSTI]

infrastructure and its competitiveness was 12th, down from 5th in 2005. The Council for Science and Technology2Engineering Sensor Development CyberSecurity SustainableEnergy Networks EnergyStorag e #12;EPSRC investment supports

Berzins, M.

30

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG)...

31

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems  

E-Print Network [OSTI]

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems Marija Ilic, Carnegie Mellon University milic@andrew.cmu.edu Keynote at the Workshop on eNetworks as Infrastructure for the Future Cyber · Examples of existing and evolving energy industry architectures as particular cases of cyber- physical

Ilic, Marija D.

32

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

33

Trustworthy Customer Services | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Trustworthy Customer Services Trustworthy Customer Services Trustworthy Customer Services January 15, 2014 8:30AM EST to January 16, 2014 4:00PM EST Registration link: CHRIS 002452/0001$400.00 Course Type: Classroom Course Location: Forrestal RM GH-043 Course Description: In this interactive course, participants learn how to improve their customer service skills to build stronger and more effective relationships with customers, and to improve their overall individual and organizational effectiveness. Participants learn how to identify customers and their needs, and learn the fundamental attributes of strong customer service skills. The course uses a series of mini case studies and individual assessments to help participants focus on the steps they need to take to provide exceptional customer service. Participants receive a set of

34

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Broader source: Energy.gov (indexed) [DOE]

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

35

Cyber-Physical Systems CPS Program  

E-Print Network [OSTI]

prosthetics Critical Infrastructure More reliable and efficient power grid Highways that allow denser traffic hybridization of computational (logical), physical, and human action." Examples of cyber-physical systems devices and systems, next-generation power grid, future defense systems, next-generation automobiles

Rajkumar, Ragunathan "Raj"

36

Cyber Incidents Involving Control Systems  

SciTech Connect (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

37

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect (OSTI)

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a months worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a months worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-12-19T23:59:59.000Z

38

Cyber Train Videos | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Train Videos 1. Cyber Train Overview 2. Cyber Train Opt-Out Process 3. Cyber Train Complete Training 4. Submitting Course Completion Materials...

39

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

SciTech Connect (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

40

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Power grid simulation, evaluation, and test framework.  

E-Print Network [OSTI]

??The Virtual Power System Testbed (VPST) at the University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) (more)

Bergman, David C.

2010-01-01T23:59:59.000Z

42

Keeping terrorists from putting us in the dark  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

technology recently took place within the Trustworthy Cyber Infrastructure for the Power Grid project operated by the University of Illinois. Due to the principles of physics,...

43

Microsoft Word - OE Cyber Release 10 18 07.doc  

Broader source: Energy.gov (indexed) [DOE]

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

44

ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL INFRASTRUCTURE  

E-Print Network [OSTI]

ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL, "Improving Critical Infrastructure Cybersecurity," the President has directed NIST to develop a voluntary framework for reducing cyber risks to our nation's critical infrastructure. The Cybersecurity Framework

45

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

46

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

47

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

48

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

49

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

50

Cyber sleuths face off  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to plasma physics and new materials. Contact Communications Office (505) 667-7000 Hacking skills put to the test in week of hands-on cyber warfare training LOS ALAMOS, New...

51

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

52

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

these requirements, some technologies such as Phasor Measurement Unit (PMU), Flexible AC Transmission System (FACTS. Therefore, cyber physical security is vitally important for smart grid infrastructure. The data representing on the U.S. infrastructure increased 17-fold from 2009 to 2011 [4]. The Supervisory Control and Data

Kundur, Deepa

53

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

54

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

55

Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks  

E-Print Network [OSTI]

Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks Ruiliang Chen and Jung-Min Park to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent--Cognitive Radio, Spectrum Sensing, Primary User Emulation Attack, Location Verification. I. INTRODUCTION The need

56

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Broader source: Energy.gov (indexed) [DOE]

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

57

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

58

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice  

Science Journals Connector (OSTI)

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and ...

Steve Winterfeld; Jason Andress

2012-12-01T23:59:59.000Z

59

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

60

A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure  

Science Journals Connector (OSTI)

Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The ... proposing a key management scheme based on a hybrid-tree graph for AMI. The cyber security...

Jinshan Chen; Nian Liu; Wenxia Liu; Hong Luo

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect (OSTI)

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

62

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS .  

E-Print Network [OSTI]

??Cyber intrusions into substations of a power grid are a source of vulnerability since most substations are unmanned and with limited protection of the cyber (more)

[No author

2014-01-01T23:59:59.000Z

63

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

64

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

65

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

66

Cyber Defense Overview  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

67

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

68

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

69

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

70

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

71

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Office of Environmental Management (EM)

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

72

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

73

Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle  

Science Journals Connector (OSTI)

......cyber-physical systems; autonomous electric vehicle; energy management...applications [e.g., autonomous electric vehicle (AEV) with wireless...systems, such as aircrafts and automobiles, to large-scale systems...infrastructure that supplies electric energy for the recharging......

Jiafu Wan; Hehua Yan; Di Li; Keliang Zhou; Lu Zeng

2013-08-01T23:59:59.000Z

74

An Agent-Based Approach for Trustworthy Service Pinar Yolum Munindar P. Singh  

E-Print Network [OSTI]

. An agent may provide a service to another agent or give a referral that leads it in the right direction. Through referrals, agents can help one another find trustworthy parties. Two, re- cent work has studied trustworthy service recommendations. Referrals are essential for locating services in decentralized systems

Yolum, Pýnar

75

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

76

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

77

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

78

Energy Cyber Other Degree Program  

E-Print Network [OSTI]

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

79

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

80

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

82

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

83

Strengthening Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

84

Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS  

E-Print Network [OSTI]

PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

Kim, Kwangjo

85

Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System  

Science Journals Connector (OSTI)

Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and ... Keywords: Aviation Cyber Physical System CPS, Modelica, AADL, SysML, Spatial-Temporal Features, Dynamic Continuous Features

Lichen Zhang

2014-08-01T23:59:59.000Z

86

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

87

Social infrastructure  

E-Print Network [OSTI]

Current urbanization patterns and aging transportation infrastructures have marginalized millions of US citizens. The result is that 4 .5 million US residents live within 100 meters of a four-lane highway' and have become ...

Kurlbaum, Ryan E. (Ryan Edward)

2013-01-01T23:59:59.000Z

88

LOGISTICS INFRASTRUCTURE  

Science Journals Connector (OSTI)

exist at the national and company levels. The national consists of a nation's air, motor, rail, and shipping systems. This infrastructure consists of miles of improved highways, miles of railroad tracks, ...

2000-01-01T23:59:59.000Z

89

Green Infrastructure  

E-Print Network [OSTI]

SWM, Green Buildings, Energy Forum, Texas Smartscape) ? Deteriorating Roadways ? ASCE Report Card on Texas Infrastructure for 2008 identified roads as the #1 infrastructure concern ? Congestion ? DFW congestion is growing over 45% faster than... the national average (TTI) ? Crowded existing ROW ? utilities, pavement, sidewalk, parkway, etc. - with little room for widening Sustainable Public Rights of Way Subcommittee ? Subcommittee reports to the PWC ? Consists of PWC and other major interests...

Tildwell, J.

2011-01-01T23:59:59.000Z

90

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

91

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

92

Materials Informatics for the ICME CyberInfrastructure  

Broader source: Energy.gov [DOE]

2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer Evaluation

93

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

94

Cyber Security Standards.PDF  

Broader source: Energy.gov (indexed) [DOE]

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

95

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

96

BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS  

SciTech Connect (OSTI)

BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nations computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nations cyber space.

DePhillips M. P.

2014-06-06T23:59:59.000Z

97

Cyber Assessment Methods for SCADA Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

98

Cyber Incident Information | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

99

Cyber Security Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

100

Design Security and Cyber-Physical Threats  

Science Journals Connector (OSTI)

The trustworthiness of reconfigurable hardware, such as FPGAs is defined by the mechanisms protecting the configuration data. The field programmability of an FPGA is a distinct feature enabling various possibi...

Thomas Feller

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

102

Transportation and its Infrastructure  

E-Print Network [OSTI]

Transport and its infrastructure Chapter 5 Hybrid vehiclesincluding hybrid- Transport and its infrastructure Chapter 5infrastructure Gt CO 2 -eq 1 - Diesels (LDVs) 2 - Hybrids (

2007-01-01T23:59:59.000Z

103

Transportation Infrastructure  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Infrastructure New Technologies * Potential need for dual-use casks * DOE should look toward industry & international communities for innovations * Industry unclear about delivery & receipt locations * Advances in physical & tracking technologies need to be factored in * Cost-benefit analysis of new technology Training & Dry Runs * Begin as soon as possible * Suggested order: #1-demonstrations, #2-training, #3-dry-runs * Don't re-invent the wheel- look at international programs * Allows DOE to test POC info/training * Standardization of training & materials * DOE should consider centralized training center * Use real equipment in dry- runs * Need for regionalized dry runs Packages * Full-scale Testing - Funds requested in 2003, potential use of

104

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

105

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security  

Science Journals Connector (OSTI)

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to ... ) has thus developed several iterations of cyber security standards. According to the NERC cyber stand...

Yong Wang; Da Ruan; Jianping Xu; Mi Wen; Liwen Deng

2010-01-01T23:59:59.000Z

106

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

107

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network [OSTI]

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

108

OCIO Technology Summit: Cyber Innovation | Department of Energy  

Energy Savers [EERE]

Articles OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: Data Analytics OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: High Performance Computing...

109

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

110

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

111

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers [EERE]

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

112

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

113

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

114

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

115

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

116

Cyber - Protection for utilities ... | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

117

Sandia National Laboratories: Sandia Cyber Engineering Research...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyberdefenders * CERL * computer security * Cyber Engineering Research Laboratory * cybersecurity * SAND2013-2827P * Sandia computing expertise * Sandia Science & Technology Park...

118

Security and Cyber Guidance | Department of Energy  

Office of Environmental Management (EM)

April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008...

119

Graph anomalies in cyber communications  

SciTech Connect (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

120

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

122

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

123

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

124

Cyber-Physical System Verification Embedded Systems Group  

E-Print Network [OSTI]

(Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

Berns, Karsten

125

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network [OSTI]

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

126

The Science, Engineering, and Business of Cyber Security  

E-Print Network [OSTI]

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

127

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect (OSTI)

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

128

Cyber Innovation Technology Summit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

129

Monitoring the Monitor: An Approach towards Trustworthiness in Service Oriented Architecture  

E-Print Network [OSTI]

Monitoring the Monitor: An Approach towards Trustworthiness in Service Oriented Architecture {mahantesh, harish, hridesh}@cs.iastate.edu ABSTRACT The key notion in service-oriented architecture of the service requests. In this work, we describe an extension of the service-oriented architecture

Rajan, Hridesh

130

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

131

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

132

c 2013 David Raymond Grochocki Jr DEPLOYMENT CONSIDERATIONS FOR INTRUSION DETECTION SYSTEMS IN  

E-Print Network [OSTI]

by a hybrid sensing infrastructure that uses both a centralized intrusion detection system and embedded meter by the Department of Energy under Award Number DE-OE0000097 as part of the Trustworthy Cyber Infrastructure IN ADVANCED METERING INFRASTRUCTURE BY DAVID RAYMOND GROCHOCKI JR THESIS Submitted in partial fulfillment

Sanders, William H.

133

Monitoring Infrastructure Capacity Monitoring Infrastructure Capacity  

E-Print Network [OSTI]

Levinson, D. (2000) Monitoring Infrastructure Capacity p. 165-181 in Land Market Monitoring for Smart Urban) task. Monitoring infrastructure capacity is at least as complex as monitoring urban land markets Levinson, D. (2000) Monitoring Infrastructure Capacity p. 165-181 in Land Market Monitoring for Smart Urban

Levinson, David M.

134

Infrastructure Institutional Change Principle  

Broader source: Energy.gov [DOE]

Research shows that changes in infrastructure prompt changes in behavior (for better or worse). Federal agencies can modify their infrastructure to promote sustainability-oriented behavior change,...

135

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect (OSTI)

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

136

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

137

NETL: Carbon Storage - Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure Infrastructure Carbon Storage Infrastructure The Infrastructure Element of DOE's Carbon Storage Program is focused on research and development (R&D) initiatives to advance geologic CO2 storage toward commercialization. DOE determined early in the program's development that addressing CO2 mitigation on a regional level is the most effective way to address differences in geology, climate, population density, infrastructure, and socioeconomic development. This element includes the following efforts designed to support the development of regional infrastructure for carbon capture and storage (CCS). Click on Image to Navigate Infrastructure Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player Regional Carbon Sequestration Partnerships (RCSP) - This

138

Security and Cyber Evaluations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

139

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

140

Chapter 2 - Definitions of Cyber Terrorism  

Science Journals Connector (OSTI)

Abstract The term cyber terror appeared for the first time in the mid-eighties. Since then the notion has been misused a number of times by journalists and politicians. It does not help that cyber terror does not have a clear, agreed definition. This chapter first analyses the background of the confusion. Secondly, the chapter provides a definition of cyber terrorism which aligns with national definitions of terrorism. From this, it becomes clear that no act of cyber terror has yet occurred. We need to be prepared however as the increasing societal critical reliance on ICT will make ICT systems and services as well as embedded ICT an interesting target for future terrorists.

Eric Luiijf

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A rational jurisdiction for cyber terrorism  

Science Journals Connector (OSTI)

Abstract Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.

Pardis Moslemzadeh Tehrani; Nazura Abdul Manap

2013-01-01T23:59:59.000Z

142

Model Transformation for Cyber Physical Systems  

Science Journals Connector (OSTI)

Cyber Physical Systems(CPS) are composed with discrete and continuous dynamics. Traditional modeling techniques cant implement the requirement of modeling CPS. One way of solving this is to model CPS parts wi...

Shuguang Feng; Lichen Zhang

2014-01-01T23:59:59.000Z

143

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

144

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Broader source: Energy.gov (indexed) [DOE]

Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs.

145

A nexus of Cyber-Geography and Cyber-Psychology: Topos/Notopia and identity in hacking  

Science Journals Connector (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as Notopia) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Lockes criterion of memory and the spatial-geographical criterion of identity.

Fivos Papadimitriou

2009-01-01T23:59:59.000Z

146

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

147

Interdependence of Electricity System Infrastructure and Natural...  

Broader source: Energy.gov (indexed) [DOE]

Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure - EAC 2011 Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure -...

148

cyber  

National Nuclear Security Administration (NNSA)

and the review of information prior to public release or posting to publicly available web sites to assure it does not contain data that would assist an adversary.

149

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect (OSTI)

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systems topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approachesare discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

150

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network [OSTI]

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

151

NISTIR 7916 Proceedings of the Cybersecurity in Cyber-  

E-Print Network [OSTI]

NISTIR 7916 Proceedings of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24 of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24, 2012 Editor: Tanya Brewer Computer Security

152

National Environmental Information Infrastructure  

E-Print Network [OSTI]

National Environmental Information Infrastructure: Reference Architecture Contributing Information Infrastructure: Reference Architecture v1.1 Environmental Information Programme Publication Series: Reference Architecture, Environmental Information Programme Publication Series, document no. 4, Bureau

Greenslade, Diana

153

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

154

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

155

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

156

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

157

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

158

Ant-Based Cyber Security  

SciTech Connect (OSTI)

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

159

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

160

Los Alamos director echoes cyber concerns  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

162

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

163

DOE Cyber Security Role, Competency and Functional Matrix  

Broader source: Energy.gov (indexed) [DOE]

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

164

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Broader source: Energy.gov (indexed) [DOE]

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

165

National Infrastructure Protection Plan  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

166

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

167

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

168

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

169

Benefits of green infrastructure Benefits of green infrastructure  

E-Print Network [OSTI]

Benefits of green infrastructure 1 #12;Benefits of green infrastructure 2 #12;Benefits of green infrastructure 3 Benefits of green infrastructure Report to Defra and CLG October 2010 Prepared by Land The report should be cited as: Forest Research (2010). Benefits of green infrastructure. Report to Defra

170

6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool-developed-to-catch-cyber-thieves-1370602608 1/5  

E-Print Network [OSTI]

cyber thieves Montreal: A new search tool developed by researchers in Canada can now help crime Lifestyle News Desk Cyber thief child porn search tool Canada cyber crime #12;6/16/13 New search tool6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool

Fung, Benjamin C. M.

171

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network [OSTI]

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

172

HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM  

E-Print Network [OSTI]

to serve as "go-to" organization to catalyze PA Hydrogen and Fuel Cell Economy development #12;FundingHYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA Melissa Klingenberg, PhDMelissa Klingenberg, PhD #12;Hydrogen ProgramHydrogen Program Air Products

173

An Amulet for Trustworthy Wearable mHealth Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare,  

E-Print Network [OSTI]

An Amulet for Trustworthy Wearable mHealth Jacob Sorber, Minho Shin, Ronald Peterson, Cory and manage their health. While the potential benefits of this "mHealth" technol- ogy include better health and privacy chal- lenges. In this paper we propose Amulet, an mHealth architecture that provides strong

Myers, Lawrence C.

174

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Broader source: Energy.gov (indexed) [DOE]

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

175

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

176

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

177

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

178

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

179

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

180

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

182

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

183

Office of Security and Cyber Evaluations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

184

Geographically-Based Infrastructure Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure Infrastructure Analysis Margo Melendez & Keith Parks January 26, 2006 Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition expertise to add the spatial component to infrastructure analysis NREL Core Competencies * Geographic data, tools, and expertise * Flexibility to address a wide array of transition issues NREL Capability Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric & Hydrogen Technologies Energy Analysis Office GIA Activities Previous and Ongoing * HYDS ME - Evaluates best infrastructure options * Interstate Infrastructure Analysis - Minimal infrastructure to facilitate interstate travel during transition New Analyses * Quantifying transitional hydrogen demand

185

infrastructure | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Storage Infrastructure Core Storage R&D Storage Infrastructure Strategic Program Support NATCARBAtlas Program Plan Project Portfolio Publications Carbon Storage Newsletter FAQs...

186

Innovations in Nuclear Infrastructure  

Broader source: Energy.gov (indexed) [DOE]

Innovations in Nuclear Infrastructure Innovations in Nuclear Infrastructure and Education (INIE) Innovations in Nuclear Infrastructure and Education (INIE) Presented to the Nuclear Energy Research Advisory Committee Crystal City, Virginia John Gutteridge Director, University Programs Office of Nuclear Energy, Science and Technology September 30 - October 1, 2002 Office of Nuclear Energy, Science and Technology Gutteridge/Sep-Oct_02 INIE-NERAC.ppt (2) INIE The Stimuli .... INIE The Stimuli .... 6 Declining number of operating university research/training reactors 6 Dwindling student population in nuclear engineering 6 Closing or loss of identity of university nuclear engineering programs 6 Looming shortage of nuclear engineering graduates 6 Threat of additional reactor closures -- Cornell, Michigan, MIT

187

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

188

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

189

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

190

BNL | Cloud Lifecycle Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

191

IPHE Infrastructure Workshop Proceedings  

Fuel Cell Technologies Publication and Product Library (EERE)

This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fuelin

192

Building safeguards infrastructure  

SciTech Connect (OSTI)

Much has been written in recent years about the nuclear renaissance - the rebirth of nuclear power as a clean and safe source of electricity around the world. Those who question the nuclear renaissance often cite the risk of proliferation, accidents or an attack on a facility as concerns, all of which merit serious consideration. The integration of these three areas - sometimes referred to as 3S, for safety, security and safeguards - is essential to supporting the growth of nuclear power, and the infrastructure that supports them should be strengthened. The focus of this paper will be on the role safeguards plays in the 3S concept and how to support the development of the infrastructure necessary to support safeguards. The objective of this paper has been to provide a working definition of safeguards infrastructure, and to discuss xamples of how building safeguards infrastructure is presented in several models. The guidelines outlined in the milestones document provide a clear path for establishing both the safeguards and the related infrastructures needed to support the development of nuclear power. The model employed by the INSEP program of engaging with partner states on safeguards-related topics that are of current interest to the level of nuclear development in that state provides another way of approaching the concept of building safeguards infrastructure. The Next Generation Safeguards Initiative is yet another approach that underscored five principal areas for growth, and the United States commitment to working with partners to promote this growth both at home and abroad.

Stevens, Rebecca S [Los Alamos National Laboratory; Mcclelland - Kerr, John [NNSA/NA-242

2009-01-01T23:59:59.000Z

193

MFC Communications Infrastructure Study  

SciTech Connect (OSTI)

Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure. The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard. This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

2012-01-01T23:59:59.000Z

194

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

195

Cyber-physical energy systems: focus on smart buildings  

Science Journals Connector (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

196

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network [OSTI]

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

197

Implementing constrained cyber-physical systems with IEC 61499  

Science Journals Connector (OSTI)

Cyber-physical systems (CPS) are integrations of computation and control with sensing and actuation of the physical environment. Typically, such systems consist of embedded computers that monitor and control physical processes in a feedback loop. While ... Keywords: Compilers, IEC 61499, cyber-physical systems, function blocks, software synthesis, synchronous

Li Hsien Yoong; Partha S. Roop; Zoran Salcic

2012-12-01T23:59:59.000Z

198

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

199

View Consistency in Architectures for Cyber-Physical Systems  

Science Journals Connector (OSTI)

Current methods for modeling, analysis, and design of cyber-physical systems lack a unifying framework due to the complexity and heterogeneity of the constituent elements and their interactions. Our approach is to define relationships between system ... Keywords: system architecture, view consistency, graph morphism, multi-domain modeling, cyber-physical systems

Ajinkya Bhave; Bruce H. Krogh; David Garlan; Bradley Schmerl

2011-04-01T23:59:59.000Z

200

A modelica coordination pattern library for cyber-physical systems  

Science Journals Connector (OSTI)

Today's embedded systems often do not operate individually anymore. Instead, they form so called cyber-physical systems, where the overall functionality is provided by the collaboration of systems. Consequently, the design of this collaboration is an ... Keywords: cyber-physical systems, design patterns, modelica, real-time coordination, simulation

Uwe Pohlmann; Stefan Dziwok; Matthias Meyer; Matthias Tichy; Sebastian Thiele

2014-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Towards a theory for cyber-physical systems modeling  

Science Journals Connector (OSTI)

Modeling the heterogeneous composition of physical, computational and communication systems is an important challenge in engineering Cyber-Physical Systems (CPS), where the major sources of heterogeneity are causality, time semantics, and different physical ... Keywords: cyber-physical systems, formalization, heterogeneous composition, model-based engineering

Gabor Simko; Tihamer Levendovszky; Miklos Maroti; Janos Sztipanovits

2014-04-01T23:59:59.000Z

202

Hydrogen Production Infrastructure Options Analysis  

Broader source: Energy.gov [DOE]

Presentation on hydrogen production and infrastructure options presented at the DOE Transition Workshop.

203

Public Works Transportation Infrastructure Study  

E-Print Network [OSTI]

and Alleys · Street Lights · Traffic Signals #12;Public Works Transportation Infrastructure Study Minneapolis Infrastructure Study Minneapolis City of Lakes Infrastructure Included in Analysis: · Bridges · Streets Infrastructure Study Minneapolis City of Lakes Existing Inventory & Current Conditions Street Pavement Before

Minnesota, University of

204

Hydrogen Fueling Systems and Infrastructure  

E-Print Network [OSTI]

Infrastructure Development TIAX Sunline LAX, Praxair · Fuels Choice · Renewable Energy Transportation System

205

The Department's Cyber Security Incident Management Program, IG-0787 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

206

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

207

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

208

LNG infrastructure and equipment  

SciTech Connect (OSTI)

Sound engineering principals have been used by every company involved in the development of the LNG infrastructure, but there is very little that is new. The same cryogenic technology that is used in the manufacture and sale of nitrogen, argon, and oxygen infrastructure is used in LNG infrastructure. The key component of the refueling infrastructure is the LNG tank which should have a capacity of at least 15,000 gallons. These stainless steel tanks are actually a tank within a tank separated by an annular space that is void of air creating a vacuum between the inner and outer tank where superinsulation is applied. Dispensing can be accomplished by pressure or pump. Either works well and has been demonstrated in the field. Until work is complete on NFPA 57 or The Texas Railroad Commission Rules for LNG are complete, the industry is setting the standards for the safe installation of refueling infrastructure. As a new industry, the safety record to date has been outstanding.

Forgash, D.J.

1995-12-31T23:59:59.000Z

209

EV Charging Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Charging Infrastructure Charging Infrastructure JOHN DAVIS: Virtually anywhere in the U.S. you can bring light to a room with the flick of a finger. We take it for granted, but creating the national electric grid to make that possible took decades to accomplish. Now, in just a few years, we've seen the birth of a new infrastructure that allows electric vehicles to quickly recharge their batteries at home, work, or wherever they may roam. But this rapid growth has come with a few growing pains. Starting with less than 500 in 2009, there are now over 19,000 public-access charging outlets available to electric vehicles owners at commuter lots, parking garages, airports, retail areas and thousands of

210

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect (OSTI)

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

211

Infrastructure Assurance Center  

E-Print Network [OSTI]

, the United States relied on natural gas to meet about 22% of its energy needs. Therefore, assuring efficient, natural gas processing plants, and other industrial customers, along with the changes in the utilizationInfrastructure Assurance Center NGReal-time: processing and analysis tool for natural gas delivery

212

e-infrastructures  

Science Journals Connector (OSTI)

In the last decades, the Internet and the World Wide Web have evolved into a new infrastructure for science, business, and the public. Driven by the need to better cope with recent trends and developments caused by globalization, complexity, and the ...

Wolfgang Gentzsch

2007-09-01T23:59:59.000Z

213

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

214

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network [OSTI]

hardware for this deployment was based on the ability of the TSMP protocol to facilitate long battery life,

Kerkez, Branko

2012-01-01T23:59:59.000Z

215

Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures  

SciTech Connect (OSTI)

There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

Summerhill, Richard

2009-08-14T23:59:59.000Z

216

Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures  

SciTech Connect (OSTI)

At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including ? OSCARS layer2 and InterDomain Adaptation, ? Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, ? Control plane software release, ? Scheduling, AAA, security architecture, ? Network Virtualization architecture, ? Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

Lehman, Tom [USC] [USC; Ghani, Nasir [UNM] [UNM; Boyd, Eric [UCAID] [UCAID

2010-08-31T23:59:59.000Z

217

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network [OSTI]

well as solar and thermal radiation. As energy is introducedenergy into the system, usually in the form of solar and thermal

Kerkez, Branko

2012-01-01T23:59:59.000Z

218

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network [OSTI]

Potential Changes in hydropower production from globalirrigation, recreation, hydropower generation, and otheris also generated via hydropower. The major hydrologic

Kerkez, Branko

2012-01-01T23:59:59.000Z

219

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network [OSTI]

radiation sensor, (8) 10W solar panel, (9) external 8dBiradiation sensor, (8) 10W solar panel, (9) external 8dBibatteries and a 120 Watt solar panel. Careful selection of

Kerkez, Branko

2012-01-01T23:59:59.000Z

220

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)  

Science Journals Connector (OSTI)

The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring and disaster recover, etc. In fact, ... Keywords: cryptography, embedded devices, security, trusted

Frederik Armknecht, Jorge Guajardo

2014-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

222

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

223

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

224

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Broader source: Energy.gov (indexed) [DOE]

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

225

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Broader source: Energy.gov (indexed) [DOE]

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

226

Ruminati : modeling the detection of textual cyber-bullying  

E-Print Network [OSTI]

The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. ...

Dinakar, Karthik

2012-01-01T23:59:59.000Z

227

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

228

Advances in Materials Genomics: Making CyberSteels Fly | Argonne...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Events Upcoming Events Upcoming Events Advances in Materials Genomics: Making CyberSteels Fly January 7, 2015 3:00PM to 4:00PM Presenter Greg Olson, Northwestern University and...

229

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

230

Towards a modeling language for cyber-physical systems  

Science Journals Connector (OSTI)

A cyber-physical system (CPS) is an interactive system of continuous plants and real-time controller programs. These systems usually feature a tight relationship between the physical and computational components and exhibit true concurrency with respect ...

Longfei Zhu; Yongxin Zhao; Huibiao Zhu; Qiwen Xu

2013-01-01T23:59:59.000Z

231

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect (OSTI)

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

232

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

233

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect (OSTI)

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

234

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

235

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 22280 of 28,905 results. 71 - 22280 of 28,905 results. Download TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives... http://energy.gov/oe/downloads/tcip-trustworthy-cyberinfrastructure-power-grid Download Reliability as a Public Good http://energy.gov/oe/downloads/reliability-public-good Download A Review of Market Monitoring Activities at U.S. Independent System Operators http://energy.gov/oe/downloads/review-market-monitoring-activities-us-independent-system-operators Download Microsoft PowerPoint- UAE Masdar 2-24-10 final for distribution.pptx http://energy.gov/downloads/microsoft-powerpoint-uae-masdar-2-24-10-final-distributionpptx

236

Upcoming Webinar December 16: International Hydrogen Infrastructure...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges NOW, DOE, and NEDO Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges...

237

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Broader source: Energy.gov (indexed) [DOE]

Electric Drive Vehicle Demonstration and Vehicle Infrastructure Evaluation Electric Drive Vehicle Demonstration and Vehicle Infrastructure Evaluation 2010 DOE Vehicle Technologies...

238

International Hydrogen Infrastructure Challenges Workshop Summary...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

International Hydrogen Infrastructure Challenges Workshop Summary - NOW, NEDO, and DOE International Hydrogen Infrastructure Challenges Workshop Summary - NOW, NEDO, and DOE...

239

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network [OSTI]

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

240

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network [OSTI]

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Pennsylvania Regional Infrastructure Project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CTC Team CTC Team 1 Pennsylvania Regional Infrastructure Project Presentation by: The Concurrent Technologies Corporation (CTC) Team January 6, 2004 The CTC Team 2 Presentation Outline Introduction of CTC Team CTC Background Technical Approach - CTC Team Member Presentations Conclusions The CTC Team 3 The CTC Project Team Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Resource Dynamics Corp. Tradeoff Analyses of Hydrogen

242

Smarter Physical Infrastructure  

E-Print Network [OSTI]

Building Operations, Montreal, Quebec, October 8-11, 2013 Bending the Spoon ESL-IC-13-10-57 Proceedings of the 13th International Conference for Enhanced Building Operations, Montreal, Quebec, October 8-11, 2013 Data Points ESL-IC-13-10-57 Proceedings... of the 13th International Conference for Enhanced Building Operations, Montreal, Quebec, October 8-11, 2013 IT Enablers for Physical Infrastructure ?M2M ?IOT ?Big Data ?Mobility ?Cloud ESL-IC-13-10-57 Proceedings of the 13th International Conference...

Bartlett, D.

2013-01-01T23:59:59.000Z

243

Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services  

Science Journals Connector (OSTI)

This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructu...

Yuri Demchenko; Canh Ngo; Cees de Laat

2013-01-01T23:59:59.000Z

244

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network [OSTI]

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

245

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Journals Connector (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

246

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

247

California Hydrogen Infrastructure Project  

SciTech Connect (OSTI)

Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a ???¢????????real-world???¢??????? retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation???¢????????s hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations with a focus on safe, convenient, fast-fills. These potential areas were then compared to and overlaid with suitable sites from various energy companies and other potential station operators. Work continues to match vehicle needs with suitable fueling station locations. Once a specific site was identified, the necessary agreements could be completed with the station operator and expected station users. Detailed work could then begin on the site drawings, permits, safety procedures and training needs. Permanent stations were successfully installed in Irvine (delivered liquid hydrogen), Torrance (delivered pipeline hydrogen) and Fountain Valley (renewable hydrogen from anaerobic digester gas). Mobile fueling stations were also deployed to meet short-term fueling needs in Long Beach and Placerville. Once these stations were brought online, infrastructure data was collected and reported to DOE using Air Products???¢???????? Enterprise Remote Access Monitoring system. Feedback from station operators was incorporated to improve the station user???¢????????s fueling experience.

Edward C. Heydorn

2013-03-12T23:59:59.000Z

248

NREL: Energy Analysis: Transmission Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transmission Infrastructure Transmission Infrastructure Grid expansion and planning to allow large scale deployment of renewable generation Large scale deployment of renewable electricity generation will require additional transmission to connect renewable resources, which are wide-spread across the US, but regionally-constrained, to load centers. Long-term transmission planning, based on potential future growth in electric loads and generation resource expansion options, is critical to maintaining the necessary flexibility required for a reliable and robust transmission system. NREL's analyses support transmission infrastructure planning and expansion to enable large-scale deployment of renewable energy in the future. NREL's transmission infrastructure expansion and planning analyses show

249

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

250

Forecourt and Gas Infrastructure Optimization  

Broader source: Energy.gov (indexed) [DOE]

Forecourt and Gas Infrastructure Optimization Bruce Kelly Nexant, Inc. Hydrogen Delivery Analysis Meeting May 8-9, 2007 Columbia, Maryland 2 Analysis of Market Demand and Supply...

251

millionImaging research infrastructure  

E-Print Network [OSTI]

Centre for Imaging Technology Commercialization, led by Aaron Fenster $34 million Hybrid imaging infrastructureimaging #12;IMAGING Investment $100 millionImaging research infrastructure Formation

Denham, Graham

252

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

More California Gas Stations Can Provide Hydrogen than Previously Thought, Sandia Study Says On July 29, 2014, in Center for Infrastructure Research and Innovation (CIRI), CRF,...

253

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

254

Fluxnet Synthesis Dataset Collaboration Infrastructure  

E-Print Network [OSTI]

Fluxnet Synthesis Dataset Collaboration Infrastructure DebUCB) The Fluxnet synthesis dataset originally compiled forhave been added and the dataset now contains over 920 site

Agarwal, Deborah A.

2009-01-01T23:59:59.000Z

255

Sandia National Laboratories: Energy Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

power is essential to key infrastructure such as military installations. Economically, electricity outages presently cost our economy 150 billion annually. Energy Surety The...

256

Geographically-Based Infrastructure Analysis  

Broader source: Energy.gov [DOE]

Presentation on Geographically-Based Infrastructure Analysis given by Keith Parks of the National Renewable Energy Laboratory during the DOE Hydrogen Transition Analysis Workshop on January 26, 2006.

257

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

258

Michigan E85 Infrastructure  

SciTech Connect (OSTI)

This is the final report for a grant-funded project to financially assist and otherwise provide support to projects that increase E85 infrastructure in Michigan at retail fueling locations. Over the two-year project timeframe, nine E85 and/or flex-fuel pumps were installed around the State of Michigan at locations currently lacking E85 infrastructure. A total of five stations installed the nine pumps, all providing cost share toward the project. By using cost sharing by station partners, the $200,000 provided by the Department of Energy facilitated a total project worth $746,332.85. This project was completed over a two-year timetable (eight quarters). The first quarter of the project focused on project outreach to station owners about the incentive on the installation and/or conversion of E85 compatible fueling equipment including fueling pumps, tanks, and all necessary electrical and plumbing connections. Utilizing Clean Energy Coalition (CEC) extensive knowledge of gasoline/ethanol infrastructure throughout Michigan, CEC strategically placed these pumps in locations to strengthen the broad availability of E85 in Michigan. During the first and second quarters, CEC staff approved projects for funding and secured contracts with station owners; the second through eighth quarters were spent working with fueling station owners to complete projects; the third through eighth quarters included time spent promoting projects; and beginning in the second quarter and running for the duration of the project was spent performing project reporting and evaluation to the US DOE. A total of 9 pumps were installed (four in Elkton, two in Sebewaing, one in East Lansing, one in Howell, and one in Whitmore Lake). At these combined station locations, a total of 192,445 gallons of E85, 10,786 gallons of E50, and 19,159 gallons of E30 were sold in all reporting quarters for 2011. Overall, the project has successfully displaced 162,611 gallons (2,663 barrels) of petroleum, and reduced regional GHG emissions by 375 tons in the first year of station deployment.

Sandstrom, Matthew M.

2012-03-30T23:59:59.000Z

259

Energy Transmission and Infrastructure  

SciTech Connect (OSTI)

The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); analyze the potential within the district to utilize farm wastes to produce biofuels; enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; identify the policy, regulatory, and financial barriers impeding development of a new energy system; and improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the Colleges yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.

Mathison, Jane

2012-12-31T23:59:59.000Z

260

Clean Cities: Electric Vehicle Infrastructure Training Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Electric Vehicle Infrastructure Electric Vehicle Infrastructure Training Program to someone by E-mail Share Clean Cities: Electric Vehicle Infrastructure Training Program on Facebook Tweet about Clean Cities: Electric Vehicle Infrastructure Training Program on Twitter Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Google Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Delicious Rank Clean Cities: Electric Vehicle Infrastructure Training Program on Digg Find More places to share Clean Cities: Electric Vehicle Infrastructure Training Program on AddThis.com... Goals & Accomplishments Partnerships National Clean Fleets Partnership National Parks Initiative Electric Vehicle Infrastructure Training Program Advanced Vehicle Technology Competitions

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Evaluation Report on The Department's Unclassified Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

262

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Broader source: Energy.gov (indexed) [DOE]

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

263

Computational Infrastructure for Nuclear Astrophysics  

SciTech Connect (OSTI)

A Computational Infrastructure for Nuclear Astrophysics has been developed to streamline the inclusion of the latest nuclear physics data in astrophysics simulations. The infrastructure consists of a platform-independent suite of computer codes that is freely available online at nucastrodata.org. Features of, and future plans for, this software suite are given.

Smith, Michael S.; Hix, W. Raphael; Bardayan, Daniel W.; Blackmon, Jeffery C. [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Lingerfelt, Eric J.; Scott, Jason P.; Nesaraja, Caroline D. [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Dept. Physics and Astronomy, Univ. of Tennessee, Knoxville, TN 37996-1200 (United States); Chae, Kyungyuk; Guidry, Michael W. [Dept. Physics and Astronomy, Univ. of Tennessee, Knoxville, TN 37996-1200 (United States); Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Koura, Hiroyuki [Japan Atomic Energy Agency, Tokai, Naka-gun, Ibaraki 319-1195 (Japan); Meyer, Richard A. [RAME' Inc., Teaticket, MA, 02536 (United States)

2006-07-12T23:59:59.000Z

264

Critical Infrastructure and Internal Controls  

Science Journals Connector (OSTI)

Critical refers to infrastructure that provides an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. According to Resolution of the National Security Strategy of the Republic ... Keywords: Risk management,Process control,Government,Standards,Security,Uncertainty,internal controls,critical infrastructure,risk,risk management

Iztok Podbregar; Mojca Ferjancic Podbregar

2012-08-01T23:59:59.000Z

265

Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure Technologies Program Hydrogen Codes &  

E-Print Network [OSTI]

Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure)DescriptionMilestone #12;Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure Technologies Program Hydrogen Codes & Standards #12;Hydrogen Codes & Standards: Goal & Objectives Goal

266

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

267

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

268

of Western Area Power Administration's Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

269

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

270

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

271

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

272

Towards Truly Ubiquitous and Opportunistic Trust Infrastructures: Position for Next Generation Cybersecurity Infrastructure Workshop  

E-Print Network [OSTI]

: Position for Next Generation Cybersecurity Infrastructure Workshop Stephen Nightingale Generation Cybersecurity Infrastructure workshop, we note that Federated Identities [1

Tennessee, University of

273

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect (OSTI)

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

274

Innovative Financing for Green Infrastructure | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Innovative Financing for Green Infrastructure Innovative Financing for Green Infrastructure November 4, 2014 1:00PM to 2:30PM EST Topic Overview Financing green infrastructure is...

275

Advanced Metering Infrastructure  

SciTech Connect (OSTI)

The report provides an overview of the development of Advanced Metering Infrastructure (AMI). Metering has historically served as the cash register for the utility industry. It measured the amount of energy used and supported the billing of customers for that usage. However, utilities are starting to look at meters in a whole different way, viewing them as the point of contact with customers in supporting a number of operational imperatives. The combination of smart meters and advanced communications has opened up a variety of methods for utilities to reduce operating costs while offering new services to customers. A concise look is given at what's driving interest in AMI, the components of AMI, and the creation of a business case for AMI. Topics covered include: an overview of AMI including the history of metering and development of smart meters; a description of the key technologies involved in AMI; a description of key government initiatives to support AMI; an evaluation of the current market position of AMI; an analysis of business case development for AMI; and, profiles of 21 key AMI vendors.

NONE

2007-10-15T23:59:59.000Z

276

Federal Energy Management Program: Infrastructure Institutional Change  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure Infrastructure Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Infrastructure Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Infrastructure Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Google Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Delicious Rank Federal Energy Management Program: Infrastructure Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Infrastructure Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

277

The regulatory anticommons of green infrastructures  

Science Journals Connector (OSTI)

Development of green infrastructures (renewable energy plants and transmission networks) is urgently needed ... improve planning and siting procedures for cross-border green infrastructures. The literature on ant...

Giuseppe Bellantuono

2014-04-01T23:59:59.000Z

278

Natural Gas and Hydrogen Infrastructure Opportunities: Markets...  

Broader source: Energy.gov (indexed) [DOE]

Natural Gas and Hydrogen Infrastructure Opportunities: Markets and Barriers to Growth Natural Gas and Hydrogen Infrastructure Opportunities: Markets and Barriers to Growth...

279

Natural Gas and Hydrogen Infrastructure Opportunities Workshop...  

Broader source: Energy.gov (indexed) [DOE]

Natural Gas and Hydrogen Infrastructure Opportunities Workshop Agenda Natural Gas and Hydrogen Infrastructure Opportunities Workshop Agenda Agenda for the Natural Gas and Hydrogen...

280

NREL: Energy Systems Integration Facility - Research Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure The foundation of the Energy Systems Integration Facility is its research infrastructure. In addition to extensive fixed equipment, the facility incorporates...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Electric Drive Vehicle Infrastructure Deployment | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Infrastructure Deployment Electric Drive Vehicle Infrastructure Deployment 2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer...

282

California Low Carbon Fuels Infrastructure Investment Initiative...  

Broader source: Energy.gov (indexed) [DOE]

California Low Carbon Fuels Infrastructure Investment Initiative California Low Carbon Fuels Infrastructure Investment Initiative 2012 DOE Hydrogen and Fuel Cells Program and...

283

Department of Energy Cites Parsons Infrastructure & Technology...  

Office of Environmental Management (EM)

Parsons Infrastructure & Technology Group, Inc. for Worker Safety and Health Violations Department of Energy Cites Parsons Infrastructure & Technology Group, Inc. for Worker Safety...

284

Advanced Metering Infrastructure Security Considerations | Department...  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to...

285

Controlled Hydrogen Fleet & Infrastructure Analysis | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

& Infrastructure Analysis Controlled Hydrogen Fleet & Infrastructure Analysis 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

286

Hydrogen Vehicle and Infrastructure Demonstration and Validation...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Vehicle and Infrastructure Demonstration and Validation Hydrogen Vehicle and Infrastructure Demonstration and Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program...

287

California Hydrogen Infrastructure Project | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Hydrogen Infrastructure Project California Hydrogen Infrastructure Project 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

288

Hydrogen Fueling Infrastructure Research and Station Technology...  

Energy Savers [EERE]

Infrastructure Research and Station Technology Download presentation slides from the DOE Fuel Cell Technologies Office webinar "An Overview of the Hydrogen Fueling Infrastructure...

289

Hydrogen, Fuel Cells and Infrastructure Technologies Program...  

Broader source: Energy.gov (indexed) [DOE]

Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report...

290

Webinar: International Hydrogen Infrastructure Challenges-NOW...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO December 16, 2013 1:00PM EST...

291

Overcoming performance collapse for 100Gbps cyber security  

Science Journals Connector (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

292

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref  

E-Print Network [OSTI]

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref November 16, 2012 construction. In this framework, we consider controller synthesis problem: given a model of the system.e. a controller that optimizes a quantitative measure.We review some of the recent works on synthesis of optimal

Plotkin, Joshua B.

293

CyberWalk: Enabling unconstrained omnidirectional walking through virtual environments  

Science Journals Connector (OSTI)

Despite many recent developments in virtual reality, an effective locomotion interface which allows for normal walking through large virtual environments was until recently still lacking. Here, we describe the new CyberWalk omnidirectional treadmill ... Keywords: Virtual reality, control system, locomotion, spatial navigation, treadmill

J. L. Souman; P. Robuffo Giordano; M. Schwaiger; I. Frissen; T. Thmmel; H. Ulbrich; A. De Luca; H. H. Blthoff; M. O. Ernst

2011-11-01T23:59:59.000Z

294

Statistical Model Checking for Cyber-Physical Systems  

E-Print Network [OSTI]

-Physical System (CPS). The autopilot is a software which provides inputs to the aircraft's engines and flight to keep control of the vehicle and improving safety. Cyber-Physical Systems enjoy wide adoption in our society, even in safety- critical applications, but are difficult to reason about. In particular

Clarke, Edmund M.

295

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

296

Cyber-Physical Energy Systems: Focus on Smart Buildings  

E-Print Network [OSTI]

of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxiCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical- tributions: one, a careful examination of different types of buildings and their energy use; two

Gupta, Rajesh

297

Cyber-Physical Systems Energy and the Environment  

E-Print Network [OSTI]

to Restructure · Generate energy locally ­ Wind, Solar ­ Energy Storage Plug in Hybrids ­ Share Power ­ Economics12/16/2008 1 Cyber-Physical Systems Energy and the Environment Bruce McMillin Department FREEDM ­ Future Renewable Electric Energy Delivery and Management Systems McMillin, 12/15/2008 Major

Rajkumar, Ragunathan "Raj"

298

Domestic campsites and cyber landscapes in the Rocky Mountains  

E-Print Network [OSTI]

Domestic campsites and cyber landscapes in the Rocky Mountains Laura L. Scheiber1 & Judson Byrd, Central Rocky Mountains, GIS, GPS, stone circles, architecture, multi-scalar, households, technology, tipis, horses and wagons occupying a flat clearing along a valley floor c. 1907. Photograph by Richard

Scheiber, Laura L.

299

Hydrogen Delivery Infrastructure Options Analysis  

Fuel Cell Technologies Publication and Product Library (EERE)

This report, by the Nexant team, documents an in-depth analysis of seven hydrogen delivery options to identify the most cost-effective hydrogen infrastructure for the transition and long term. The pro

300

Electric Vehicle Smart Charging Infrastructure  

E-Print Network [OSTI]

Vehicles on the US Power Grid." The 25th World Battery,infrastructure assignment and power grid impacts assessmentfrom the vehicle to the power grid and overcome its current

Chung, Ching-Yen

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Intelligent Infrastructure for Energy Efficiency  

Science Journals Connector (OSTI)

...their faults. Intelligent infrastructure extends smart grid initiatives that seek to save energy by allowing utilities...4 National Institute of Standards and Technology , Smart Grid Interoperability Standards Project (http://nist...

Neil Gershenfeld; Stephen Samouhos; Bruce Nordman

2010-02-26T23:59:59.000Z

302

Hydrogen Infrastructure Market Readiness Workshop  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) hosted the Hydrogen Infrastructure Market Readiness Workshop February 1617, 2011, in Washington, D.C....

303

GIS-Based Infrastructure Modeling  

Broader source: Energy.gov [DOE]

Presentation by NREL's Keith Parks at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

304

Hydrogen Regional Infrastructure Program in Pennsylvania  

Broader source: Energy.gov [DOE]

Hydrogen Regional Infrastructure Program in Pennsylvania. Objectives: Capture data pertinent to H2 delivery in PA

305

CLOUD COMPUTING INFRASTRUCTURE AND OPERATIONS PROGRAM  

E-Print Network [OSTI]

CLOUD COMPUTING INFRASTRUCTURE AND OPERATIONS PROGRAM A six-week in-depth program in the architectures, infrastructure, and operations of Cloud Computing DePaul University's Cloud Computing Infrastructure and Operations Program provides specialized knowledge in Cloud infrastructure with emphasis

Schaefer, Marcus

306

2012 Annual Report Research Reactor Infrastructure Program  

SciTech Connect (OSTI)

The content of this report is the 2012 Annual Report for the Research Reactor Infrastructure Program.

Douglas Morrell

2012-11-01T23:59:59.000Z

307

Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)  

SciTech Connect (OSTI)

This presentation summarizes controlled hydrogen fleet & infrastructure analysis undertaken for the DOE Fuel Cell Technologies Program.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.

2010-06-10T23:59:59.000Z

308

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

309

Alternative Fuels Data Center: Alternative Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fueling Alternative Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

310

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

311

Alternative Fuels Data Center: Ethanol Infrastructure Funding  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Infrastructure Ethanol Infrastructure Funding to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Funding on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Funding on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Funding on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Funding on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Funding The Ethanol Infrastructure Incentive Program provides funding to offset the cost of installing ethanol blender pumps at retail fueling stations

312

Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration  

Broader source: Energy.gov (indexed) [DOE]

Year-in-Review: 2010 Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy August 2011 OE/ISER Report 8/31/11 i For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about information in this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Mindi Farber-DeAnda, Robert Laramey, Carleen Lewandowski, Max

313

Use and Abuse of the Internet: Parental Knowledge of Cyber Bullying in Middle School.  

E-Print Network [OSTI]

??The current literature has emphasized the impact of cyber bullying on the lives of children and adolescents. However there are gaps in the literature in (more)

Rowe, Na Lisa

2008-01-01T23:59:59.000Z

314

Terrorism or hacking? A law interpretation on the concept of cyber terrorism.  

E-Print Network [OSTI]

?? Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration (more)

Synnestvedt Jensen, Louise

2013-01-01T23:59:59.000Z

315

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network [OSTI]

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

316

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

317

Department of Energy's July 2013 Cyber Security Breach  

Broader source: Energy.gov (indexed) [DOE]

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

318

Wireless Policy, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

319

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

320

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Kentucky Corn Growers' Association (KyCGA) offers grants of $5,000 per pump to retailers installing new E85 dispensers in Kentucky. For more

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Alternative Fuels Data Center: Biofuels Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biofuels Biofuels Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuels Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuels Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuels Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuels Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuels Infrastructure Grants The Renewable Fuel Infrastructure Program provides financial assistance to qualified E85 and biodiesel retailers. Cost-share grants are available for

322

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Colorado Corn Blender Pump Pilot Program provides funding assistance for each qualified station dispensing mid-level ethanol blends. Projects

323

Alternative Fuels Data Center: Biofuel Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biofuel Infrastructure Biofuel Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuel Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuel Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuel Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuel Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Infrastructure Grants The Arizona Biofuel Conversion Program distributes grants to encourage the use of biofuels in the state and to promote the development of fueling

324

GridStat Cyber Security and Regional Deployment Project Report  

SciTech Connect (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

325

Intelligent Infrastructure for Energy Efficiency  

Science Journals Connector (OSTI)

...infrastructure extends smart grid initiatives that seek...demand (4). However, a grid cannot be smart if it is connected to...exhausts (17). The energy benefits in these I2E systems will...Standards and Technology , Smart Grid Interoperability Standards...

Neil Gershenfeld; Stephen Samouhos; Bruce Nordman

2010-02-26T23:59:59.000Z

326

Control-theoretic cyber-physical system modeling and synthesis: A case study of an active direct methanol fuel cell  

Science Journals Connector (OSTI)

A joint optimization of the physical system and the cyber world is one of the key problems in the design of a cyber-physical system (CPS). The major mechanical forces and/or chemical reactions in a plant are commonly modified by actuators in the balance-of-plant ... Keywords: Balance of plants system, Cyber-physical systems, Direct methanol fuel cell

Donghwa Shin; Jaehyun Park; Younghyun Kim; Jaeam Seo; Naehyuck Chang

2012-12-01T23:59:59.000Z

327

Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan  

Science Journals Connector (OSTI)

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the ... Keywords: Cyber-bullying, Organizational innovation climate, Positive thinking, Psychological response, Workplace bullying

Jon-Chao Hong; Lin Chien-Hou; Ming-Yueh Hwang; Ru-Ping Hu; Yi-Ling Chen

2014-01-01T23:59:59.000Z

328

New TCIPG Research Program Builds on Past Successes with Nearly $18.8  

Broader source: Energy.gov (indexed) [DOE]

TCIPG Research Program Builds on Past Successes with Nearly TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award A new award of nearly $18.8 million over a five-year period from the Department of Energy (DOE) and contributions from the Department of Homeland Security (DHS) will fund the new Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project, an expanded effort of the current project TCIP. New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review

329

A multi-level approach to understanding the impact of cyber crime on the financial sector  

Science Journals Connector (OSTI)

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible ... Keywords: Causal loop diagram, Cyber crime, Economic impact, Financial sector, System dynamics

Monica Lagazio, Nazneen Sherif, Mike Cushman

2014-09-01T23:59:59.000Z

330

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics  

E-Print Network [OSTI]

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics Informal Definition and Implication Abstract We argue that emergent behavior is inherent to cybersecurity). Scenario: Illustration of cyber epidemics model (which is a specific kind of Cybersecurity Dynamics model

Xu, Shouhuai

331

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network [OSTI]

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

332

Participatory infrastructure monitoring : design factors and limitations of accountability technologies  

E-Print Network [OSTI]

This dissertation investigates practices of participatory infrastructure monitoring and their implications for the governance of urban infrastructure services. By introducing the concept of infrastructure legibility, the ...

Offenhuber, Dietmar

2014-01-01T23:59:59.000Z

333

H2FIRST: Hydrogen Fueling Infrastructure Research and Station...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

FIRST: Hydrogen Fueling Infrastructure Research and Station Technology H2FIRST: Hydrogen Fueling Infrastructure Research and Station Technology Hydrogen Fueling Infrastructure...

334

The Electricity and Transportation Infrastructure Convergence  

E-Print Network [OSTI]

The Electricity and Transportation Infrastructure Convergence Using Electrical Vehicles Final Project Report Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System #12;#12;The Electricity and Transportation Infrastructure Convergence Using Electrical

335

"Mapping" Nonprofit Infrastructure Organizations in Texas  

E-Print Network [OSTI]

The stability of the nonprofit sector and its ability to meet our nations needs in an era of unprecedented challenges requires a solid nonprofit infrastructure (Brown, et al., 2008). These organizations that comprise this infrastructure system work...

Aho, Andrea; Harris, Amanda; Kessel, Kendall; Park, Jongsoo; Park, Jong Taek; Rios, Lisa; Swendig, Brett

2010-01-01T23:59:59.000Z

336

National Environmental Information Infrastructure Reference Architecture  

E-Print Network [OSTI]

National Environmental Information Infrastructure Reference Architecture Consultation Draft Environmental Information Infrastructure Reference Architecture: Consultation Draft Environmental Information Contributing to the Australian Government National Plan for Environmental Information initiative #12;National

Greenslade, Diana

337

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

338

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Broader source: Energy.gov (indexed) [DOE]

Utilities Employers Develop long-range Plan Deployment area Vehicle penetration Infrastructure requirements Develop EV Micro-Climate Support...

339

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Broader source: Energy.gov (indexed) [DOE]

Utilities Employers Develop Long-Range Plan Deployment Area Vehicle Penetration Infrastructure Requirements Develop EV Micro-Climate Initial...

340

Controlled Hydrogen Fleet and Infrastructure Demonstration and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Fuel Cell Technologies Program Overview: 2012 DOE Hydrogen Compression, Storage, and Dispensing Workshop Refueling Infrastructure for...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Controlled Hydrogen Fleet and Infrastructure Demonstration and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3veenstra.pdf More Documents & Publications Technology Validation Controlled Hydrogen Fleet & Infrastructure Analysis HYDROGEN TO THE HIGHWAYS...

342

The generative mechanisms of digital infrastructure evolution  

Science Journals Connector (OSTI)

The current literature on digital infrastructure offers powerful lenses for conceptualizing the increasingly interconnected information system collectives found in contemporary organizations. However, little attention has been paid to the generative ... Keywords: adoption, case study, case survey, configuration theory, critical realism, digital infrastructure, generative mechanism, information infrastructure, innovation, multimethod, scaling

Ola Henfridsson, Bendik Bygstad

2013-09-01T23:59:59.000Z

343

Hydrogen Delivery Infrastructure Option Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Delivery Infrastructure Hydrogen Delivery Infrastructure Option Analysis Option Analysis DOE and FreedomCAR & Fuel Partnership Hydrogen Delivery and On-Board Storage Analysis Workshop January 25, 2005 Washington DC This presentation does not contain any proprietary or confidential information Tan-Ping Chen Nexant Jim Campbell Bhadra Grover Air Liquide Stefan Unnasch TIAX Glyn Hazelden GTI Graham Moore Chevron Matt Ringer NREL Ray Hobbs Pinnacle West 2 Presentation Outline Project Background Knowledge Collected and Preliminary Results for Each Delivery Option Summary of Observations Next Step Project Background Project Background 4 Delivery Options Option 1* GH delivery by new pipelines Option 2 Converting NG/oil pipelines for GH delivery Option 3 Blending GH into NG pipelines Option 4* GH tube trailers

344

A scalable tools communication infrastructure.  

SciTech Connect (OSTI)

The Scalable Tools Communication Infrastructure (STCI) is an open source collaborative effort intended to provide high-performance, scalable, resilient, and portable communications and process control services for a wide variety of user and system tools. STCI is aimed specifically at tools for ultrascale computing and uses a component architecture to simplify tailoring the infrastructure to a wide range of scenarios. This paper describes STCI's design philosophy, the various components that will be used to provide an STCI implementation for a range of ultrascale platforms, and a range of tool types. These include tools supporting parallel run-time environments, such as MPI, parallel application correctness tools and performance analysis tools, as well as system monitoring and management tools.

Buntinas, D.; Bosilca, G.; Graham, R. L.; Vallee, G.; Watson, G. R.; Mathematics and Computer Science; Univ. of Tennessee; ORNL; IBM

2008-07-01T23:59:59.000Z

345

A Scalable Tools Communication Infrastructure  

SciTech Connect (OSTI)

The Scalable Tools Communication Infrastructure (STCI) is an open source collaborative effort intended to provide high-performance, scalable, resilient, and portable communications and process control services for a wide variety of user and system tools. STCI is aimed specifically at tools for ultrascale computing and uses a component architecture to simplify tailoring the infrastructure to a wide range of scenarios. This paper describes STCI's design philosophy, the various components that will be used to provide an STCI implementation for a range of ultrascale platforms, and a range of tool types. These include tools supporting parallel run-time environments, such as MPI, parallel application correctness tools and performance analysis tools, as well as system monitoring and management tools.

Buntinas, Darius [Argonne National Laboratory (ANL); Bosilca, George [University of Tennessee, Knoxville (UTK); Graham, Richard L [ORNL; Vallee, Geoffroy R [ORNL; Watson, Gregory R. [IBM T. J. Watson Research Center

2008-01-01T23:59:59.000Z

346

Presented by Petascale System Infrastructure  

E-Print Network [OSTI]

National Center for Computational Sciences #12;2 Managed by UT-Battelle for the U.S. Department of Energy and analysis cluster #12;3 Managed by UT-Battelle for the U.S. Department of Energy Shipman_Infrastructure_SC10 Area Network ­ Over 3,000 InfiniBand ports ­ Over 3 miles of cables ­ Scales as computational

347

Infrastructure and Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Operations | National Nuclear Security Administration Operations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Operations Home > About Us > Our Operations > Infrastructure and Operations Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The Associate Administrator for

348

NNSA Completes Successful Facilities and Infrastructure Recapitalization  

National Nuclear Security Administration (NNSA)

Completes Successful Facilities and Infrastructure Recapitalization Completes Successful Facilities and Infrastructure Recapitalization Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA Completes Successful Facilities and Infrastructure Recapitalization Program Press Release NNSA Completes Successful Facilities and Infrastructure Recapitalization

349

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect (OSTI)

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

350

Infrastructure Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Institutional Change Principle Infrastructure Institutional Change Principle Infrastructure Institutional Change Principle October 8, 2013 - 11:09am Addthis Research shows that changes in infrastructure prompt changes in behavior (for better or worse). Federal agencies can modify their infrastructure to promote sustainability-oriented behavior change, ideally in ways that make new behaviors easier and more desirable to follow than existing patterns of behavior. The physical structures, technologies, systems, and processes that constitute the infrastructure of a workplace should be aligned with sustainability goals and desired behavioral changes. For example, a rule requiring double-sided printing necessitates the availability and access to functioning duplex printers. Methods Modifying infrastructure so that it promotes sustainable behavior change is

351

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

352

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

353

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Broader source: Energy.gov (indexed) [DOE]

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

354

Natural Gas and Hydrogen Infrastructure Opportunities Workshop  

Broader source: Energy.gov [DOE]

Argonne National Laboratory held a Natural Gas and Hydrogen Infrastructure Opportunities Workshop October 18-19, 2011, in Lemont, Illinois. The workshop objectives were to convene industry and...

355

Natural Gas and Hydrogen Infrastructure Opportunities Workshop...  

Broader source: Energy.gov (indexed) [DOE]

* Convene industry and other stakeholders to share current statusstate-of-the art for natural gas and hydrogen infrastructure. * Identify key challenges (both technical and...

356

Agenda: Energy Infrastructure Finance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

CAPITAL FOR ENERGY TRANSMISSION, STORAGE, AND DISTRIBUTION How do investors and capital markets view energy TS&D infrastructure as an asset class, especially compared to other...

357

Policy Option for Hydrogen Vehicles and Infrastructure  

Broader source: Energy.gov [DOE]

Presentation by Stefan Unnasch at the 2010-2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure meeting on January 31, 2007.

358

Grant Helps Efficiently Rebuild Ohio Infrastructure | Department...  

Energy Savers [EERE]

ourselves to move forward with doing additional energy conservation and promoting renewables," Donna Winchester, environment manager for Dayton, says. "Our aging infrastructure...

359

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

Broader source: Energy.gov (indexed) [DOE]

the AFV Experience Moderator: Dan Sperling, Institute of Transportation Studies at UC Davis, Director Lessons and Challenges for Early Hydrogen Refueling Infrastructure (PDF 1.2...

360

Forecourt and Gas Infrastructure Optimization | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Optimization Forecourt and Gas Infrastructure Optimization Presentation by Bruce Kelly of Nexant at the Joint Meeting on Hydrogen Delivery Modeling and Analysis, May 8-9,...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Hydrogen Fueling Infrastructure Research and Station Technology  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

box hydrogenandfuelcells.energy.gov Hydrogen Fueling Infrastructure Research and Station Technology Chris Ainscough, Joe Pratt, Jennifer Kurtz, Brian Somerday, Danny Terlip, Terry...

362

Final Report- Hydrogen Delivery Infrastructure Options Analysis  

Broader source: Energy.gov [DOE]

This report provides in-depth analysis of various hydrogen delivery options to determine the most cost effective infrastructure and R&D efforts for the long term.

363

EV Everywhere Consumer Acceptance and Charging Infrastructure...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Introduction EV Everywhere Consumer Acceptance and Charging Infrastructure Workshop Introduction Presentation given at the EV Everywhere Grand Challenge: Consumer Acceptance and...

364

Hydrogen Infrastructure Market Readiness: Opportunities and Potential...  

Broader source: Energy.gov (indexed) [DOE]

Opportunities and Potential for Near-term Cost Reductions. Proceedings of the Hydrogen Infrastructure Market Readiness Workshop and Summary of Feedback Provided through the...

365

Geographically Based Hydrogen Demand and Infrastructure Rollout...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rollout Scenario Analysis Geographically Based Hydrogen Demand and Infrastructure Rollout Scenario Analysis Presentation by Margo Melendez at the 2010-2025 Scenario Analysis for...

366

California Hydrogen Infrastructure Project | Open Energy Information  

Open Energy Info (EERE)

Project Jump to: navigation, search Name: California Hydrogen Infrastructure Project Place: California Sector: Hydro, Hydrogen Product: String representation "The CHIP progra ... s...

367

Briefing Memo: Enhancing Resilience in Energy Infrastructure...  

Broader source: Energy.gov (indexed) [DOE]

on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two...

368

Alternative Ways of Financing Infrastructure Investment: Potential...  

Open Energy Info (EERE)

'Novel' Financing Models Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Alternative Ways of Financing Infrastructure Investment: Potential for 'Novel' Financing Models...

369

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen Workshop Proceedings M.W. Melaina National Renewable Energy Laboratory S. McQueen and J. Brinch...

370

Africa's Transport Infrastructure Mainstreaming Maintenance and  

Open Energy Info (EERE)

Africa's Transport Infrastructure Mainstreaming Maintenance and Africa's Transport Infrastructure Mainstreaming Maintenance and Management Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa's Transport Infrastructure Mainstreaming Maintenance and Management Agency/Company /Organization: World Bank Complexity/Ease of Use: Not Available Website: www.infrastructureafrica.org/system/files/Africa%27s%20Transport%20Inf Transport Toolkit Region(s): Africa & Middle East Related Tools The BEST Experiences with Bioethanol Buses The Sourcebook on Sustainable Urban Transport Alternative Fuels and Advanced Vehicles Data Center ... further results Find Another Tool FIND TRANSPORTATION TOOLS Transport infrastructure is a key requirement for economic growth. In Africa today, networks are sparse, conditions poor, transit slow and

371

Africa Infrastructure Country Diagnostic Documents: ARCGIS Shape...  

Open Energy Info (EERE)

Shape File, all Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Infrastructure Country Diagnostic Documents: ARCGIS Shape File, all Countries Agency...

372

Africa Infrastructure Country Diagnostic Documents: Interactive...  

Open Energy Info (EERE)

MAP in PDF, all Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Infrastructure Country Diagnostic Documents: Interactive MAP in PDF, all Countries...

373

State Experience in Hydrogen Infrastructure in California  

Broader source: Energy.gov [DOE]

Presentation by Gerhard Achtelik, California Air Resources Board, at the Hydrogen Infrastructure Market Readiness Workshop, February 17, 2011, in Washington, DC.

374

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Broader source: Energy.gov (indexed) [DOE]

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

375

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

376

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Broader source: Energy.gov (indexed) [DOE]

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

377

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

378

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network [OSTI]

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

379

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

380

Treatment outcomes using CyberKnife for brain metastases from lung cancer  

Science Journals Connector (OSTI)

......Treatment outcomes using CyberKnife for brain metastases from lung cancer Keisuke Tamari...fractionated stereotactic radiotherapy (SRT) for brain metastases from lung cancer. A total of 67 patients with 109 brain metastases from lung cancer treated using......

Keisuke Tamari; Osamu Suzuki; Naoya Hashimoto; Naoki Kagawa; Masateru Fujiwara; Iori Sumida; Yuji Seo; Fumiaki Isohashi; Yasuo Yoshioka; Toshiki Yoshimine; Kazuhiko Ogawa

2014-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Cyber visual training as a new method for the mastery of endoscopic surgery  

Science Journals Connector (OSTI)

We devised a new method incorporating cyber visual training whereby novices in endoscopic surgery are instructed via repetition of a video-recorded procedure. We then conducted a study designed to investigate ...

S. Takiguchi; M. Sekimoto; M. Yasui

2005-09-01T23:59:59.000Z

382

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

383

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

384

Automatic Library Tracking Database Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Libraries » ALTD Libraries » ALTD ALTD Automatic Library Tracking Database Infrastructure To track and monitor library usage and better serve your software needs, we have enabled the Automatic Library Tracking Database (ALTD) on our prodcution systems, Hopper and Edison. ALTD is also availailable on Carver, but has not enabled for all users by default yet. ALTD, developed by National Institute for Computational Sciences, automatically and transparently tracks all libraries linked into an application at compile time, as well as the libraries used at run time, by intercepting the linker (ld) and the job launcher (aprun, or mpirun). It is a light-weight tool, and should not change your experience with compilation and execution of codes on the machine. However, if you encounter any problems due to ALTD,

385

Hydrogen Production Infrastructure Options Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Production Production Infrastructure Options Analysis January 26, 2006 Brian D. James Julie Perez Peter Schmidt (703) 243 - 3383 Brian_James@DirectedTechnologies.com Directed Technologies, Inc. Page 1 of 39 26 January 2006 2006-1-26 DOE Transition Workshop Agenda 1. Project Description and Objective 2. Team Members 3. Approach 4. Model Theory, Structure and Assumptions 5. Model Description 1. Logic 2. Features 3. Cost Components (Production, Delivery & Dispensing) 6. Los Angeles Transitional Example 7. Model Flexibility Page 2 of 39 26 January 2006 2006-1-26 DOE Transition Workshop Team Members & Interactions Start: May 2005 (effective) End: Summer 2007 * Directed Technologies, Inc.- Prime * Sentech, Inc., Research Partner * Air Products, Industrial Gas Supplier * Advisory Board * Graham Moore, Chevron Technology Ventures

386

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Broader source: Energy.gov (indexed) [DOE]

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

387

Predicting Cyber-Production deviance in the workplace  

Science Journals Connector (OSTI)

The excessive use of the internet for non-work-related activities is a form of white-collar deviant behaviour at work. Applying the Theory of Reasoned Action, structural equation modelling was used to predict Cyber-Production (CP) deviant behaviours in the workplace. Attitude and intention to visit non-work-related websites were found to be important predictors of such behaviours. Workplace Subjective Norms (SN) had no impact on the tendency to perform CP deviant activities but did influence intention to visit work-related websites. The findings of the study contributed to an expanded understanding of the potential predictors of CP deviance in the workplace and suggested appropriate strategies for effective internet management.

Pruthikrai Mahatanankoon

2006-01-01T23:59:59.000Z

388

Alternative Fuels Data Center: Propane Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Infrastructure Development to someone by E-mail Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Propane Fueling Infrastructure Development on AddThis.com... More in this section... Propane Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

389

Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Infrastructure Development to someone by E-mail Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on AddThis.com... More in this section... Biodiesel Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

390

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

11 - 11320 of 26,764 results. 11 - 11320 of 26,764 results. Download EIS-0293: Record of Decision Conveyance and Transfer of Certain Land Tracts Administered by the Department of Energy and Located at Los Alamos National Laboratory, Los Alamos and Santa Fe Counties, New Mexico http://energy.gov/nepa/downloads/eis-0293-record-decision Download Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations- Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day... http://energy.gov/oe/downloads/cybersecurity-energy-delivery-systems-2010-peer-review-presentations-trustworthy-cyber

391

Power Grid Proposal Motivation  

Broader source: Energy.gov (indexed) [DOE]

TCIP: Trustworthy Cyber TCIP: Trustworthy Cyber Infrastructure for the Power Grid William H. Sanders University of Illinois at Urbana-Champaign TCIP team proprietary. Do not distribute without written permission. DOE Office of Electricity Delivery & Energy Reliability Visualization and Controls Program Peer Review, October 2006 2 Scale of effort * $1.5 M per year for 5 years (Total FY06 DOE funding: 125K) * NSF/CISE, NSF/ENG, DOE, DHS * 4 universities, 19 senior investigators - University of Illinois at Urbana-Champaign (14) - Washington State University (3) - Cornell University (1) - Dartmouth University (1) * 19 member external advisory board (growing from 14) 3 TCIP Vision and Strategy * Provide the fundamental science and technology to create an intelligent, adaptive power grid which -

392

Site Support Program Plan Infrastructure Program  

SciTech Connect (OSTI)

The Fiscal Year 1996 Infrastructure Program Site Support Program Plan addresses the mission objectives, workscope, work breakdown structures (WBS), management approach, and resource requirements for the Infrastructure Program. Attached to the plan are appendices that provide more detailed information associated with scope definition. The Hanford Site`s infrastructure has served the Site for nearly 50 years during defense materials production. Now with the challenges of the new environmental cleanup mission, Hanford`s infrastructure must meet current and future mission needs in a constrained budget environment, while complying with more stringent environmental, safety, and health regulations. The infrastructure requires upgrading, streamlining, and enhancement in order to successfully support the site mission of cleaning up the Site, research and development, and economic transition.

NONE

1995-09-26T23:59:59.000Z

393

Reinventing Infrastructure: The 101 Freeway and the Revisioning of Downtown Los Angeles  

E-Print Network [OSTI]

hybrid of architecture, landscape, and infrastructure andforms of infrastructure/architecture hybrids, these projectsa hybrid: landscape becomes plinth, infrastructure becomes

Samuels, Linda C.

2012-01-01T23:59:59.000Z

394

Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fueling Alternative Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Grants

395

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

396

Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biofuel Fueling Biofuel Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Fueling Infrastructure Tax Credit

397

Alternative Fuels Data Center: Natural Gas Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on AddThis.com... More in this section... Natural Gas Basics Benefits & Considerations Stations Locations Infrastructure Development

398

DOE Hydrogen Analysis Repository: Analysis of Energy Infrastructures  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Analysis of Energy Infrastructures Analysis of Energy Infrastructures Project Summary Full Title: Analysis of Energy Infrastructures and Potential Impacts from an Emergent Hydrogen Fueling Infrastructure Project ID: 250 Principal Investigator: David Reichmuth Brief Description: Sandia National Laboratories is using a system dynamics approach to simulate the interaction of vehicle adoption and infrastructure for hydrogen, electricity, natural gas, and gasoline. Purpose It is envisioned that the transition to hydrogen vehicles will begin by taking advantage of the existing infrastructure for natural gas. This project will study the impact of hydrogen vehicles on demand for natural gas, electricity, and gasoline. The impact of existing energy infrastructures on hydrogen infrastructure growth will also be considered.

399

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

400

Antioch University and EPA Webinar: Green Infrastructure and...  

Office of Environmental Management (EM)

Antioch University and EPA Webinar: Green Infrastructure and Flood Resiliency Webinar Antioch University and EPA Webinar: Green Infrastructure and Flood Resiliency Webinar January...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

FY 2014 Scientific Infrastructure Support for Consolidated Innovative...  

Office of Environmental Management (EM)

4 Scientific Infrastructure Support for Consolidated Innovative Nuclear Research FOA FY 2014 Scientific Infrastructure Support for Consolidated Innovative Nuclear Research FOA The...

402

CHP: Enabling Resilient Energy Infrastructure for Critical Facilities...  

Energy Savers [EERE]

CHP: Enabling Resilient Energy Infrastructure for Critical Facilities - Report, March 2013 CHP: Enabling Resilient Energy Infrastructure for Critical Facilities - Report, March...

403

2011 Biomass Program Platform Peer Review: Infrastructure | Department...  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure 2011 Biomass Program Platform Peer Review: Infrastructure This document summarizes the recommendations and evaluations provided by an independent external panel of...

404

taking charge : optimizing urban charging infrastructure for shared electric vehicles  

E-Print Network [OSTI]

This thesis analyses the opportunities and constraints of deploying charging infrastructure for shared electric vehicles in urban environments. Existing electric vehicle charging infrastructure for privately owned vehicles ...

Subramani, Praveen

2012-01-01T23:59:59.000Z

405

Infrastructure Analysis Tools: A Focus on Cash Flow Analysis...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

hydrogen infrastructure: 1. Infrastructure costs 2. Realistic market growth scenarios 3. Return on investment expectations 4. Policy support options * NREL has been developing...

406

H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional Pathway Options Analysis Results - Interim Report H2A Hydrogen Delivery Infrastructure Analysis Models and...

407

HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis Presentation by NREL's...

408

Connecticut Company to Advance Hydrogen Infrastructure and Fueling...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Connecticut Company to Advance Hydrogen Infrastructure and Fueling Station Technologies Connecticut Company to Advance Hydrogen Infrastructure and Fueling Station Technologies July...

409

Webinar: An Overview of the Hydrogen Fueling Infrastructure Research...  

Office of Environmental Management (EM)

An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project Webinar: An Overview of the Hydrogen Fueling Infrastructure Research and...

410

FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure...  

Broader source: Energy.gov (indexed) [DOE]

FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program...

411

Green Infrastructure and Flood Resiliency-Land Use Management...  

Office of Environmental Management (EM)

Green Infrastructure and Flood Resiliency-Land Use Management as an Adaptation Strategy in the Built Environment Green Infrastructure and Flood Resiliency-Land Use Management as an...

412

Webinar: Creating a Green Infrastructure Plan to Transform Your...  

Broader source: Energy.gov (indexed) [DOE]

Webinar: Creating a Green Infrastructure Plan to Transform Your Community Webinar: Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014 3:00PM to...

413

EPA Webcast - Creating a Green Infrastructure Plan to Transform...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014...

414

Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues This presentation by Bill Elrick...

415

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fueling Alternative Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

416

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

417

Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on AddThis.com... More in this section... Ethanol Basics Benefits & Considerations Stations Locations Infrastructure Development Business Case Equipment Options

418

Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fuel Alternative Fuel Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel Infrastructure Tax Credit

419

Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives -  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Propane Infrastructure Propane Infrastructure and Fuel Incentives - Boulden Propane to someone by E-mail Share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Facebook Tweet about Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Twitter Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Google Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Delicious Rank Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Digg Find More places to share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on AddThis.com...

420

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on AddThis.com... More in this section... Hydrogen Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Fueling Ethanol Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Fueling Infrastructure Grants The Minnesota Corn Research & Promotion Council and the Minnesota

422

Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Distribution Distribution Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuels Distribution Infrastructure Tax Credit

423

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

424

Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Blend Ethanol Blend Infrastructure Grant Program to someone by E-mail Share Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Facebook Tweet about Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Twitter Bookmark Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Google Bookmark Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Delicious Rank Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Digg Find More places to share Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Blend Infrastructure Grant Program

425

SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY...  

Broader source: Energy.gov (indexed) [DOE]

SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY Based on the finding of a growing potential...

426

Computerization and Competitiveness: National Information Infrastructure in the USA  

E-Print Network [OSTI]

stay 'fairly intense,' USA Today, August 1994. Clinton,INFRASTRUCTURE IN THE USA Kenneth L. Kraemer Professor ofINFRASTRUCTURE IN THE USA INTRODUCTION The production and

Kraemer, Kenneth L.

1994-01-01T23:59:59.000Z

427

SLT Power Infrastructure Projects Pvt Ltd | Open Energy Information  

Open Energy Info (EERE)

SLT Power Infrastructure Projects Pvt Ltd Jump to: navigation, search Name: SLT Power & Infrastructure Projects Pvt Ltd. Place: Hyderabad, Andhra Pradesh, India Zip: 500044 Sector:...

428

Deadline Extended for RFI Regarding Hydrogen Infrastructure and...  

Energy Savers [EERE]

Regarding Hydrogen Infrastructure and FCEVs Deadline Extended for RFI Regarding Hydrogen Infrastructure and FCEVs February 4, 2014 - 12:00am Addthis DOE has extended the submission...

429

Fermilab | Recovery Act | General Infrastructure Projects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General Infrastructure Projects General Infrastructure Projects High Availability Computing Center The Computing Division provides administrative, technical and physical support of central computing, storage and networking equipment critical to the success of the lab’s scientific mission. Before the renovation, Feynman Computing Center housed the only high availability computing center on the Fermilab campus, which operated at its electrical capacity. The requirements for a high availability computing center include backup infrastructure support for computing equipment that operates continuously, such as networking, web and email services, experiment databases and file serving. Electrical service must be backed up by both an uninterrupted power supply system and a standby electrical generator.

430

Transforming the U.S. Energy Infrastructure  

SciTech Connect (OSTI)

The U.S. energy infrastructure is among the most reliable, accessible and economic in the world. On the other hand, the U.S. energy infrastructure is excessively reliant on foreign sources of energy, experiences high volatility in energy prices, does not practice good stewardship of finite indigenous energy resources and emits significant quantities of greenhouse gases (GHG). This report presents a Technology Based Strategy to achieve a full transformation of the U.S. energy infrastructure that corrects these negative factors while retaining the positives.

Larry Demick

2010-07-01T23:59:59.000Z

431

Hydrogen Regional Infrastructure Program in Pennsylvania  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REGIONAL REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA Melissa Klingenberg, PhD Melissa Klingenberg, PhD Hydrogen Program Hydrogen Program Air Products and Chemicals, Inc. (APCI) Hydrogen Separation Hydrogen Sensors Resource Dynamics Corporation (RDC) Tradeoff/Sensitivity Analyses of Hydrogen Delivery Approaches EDO Fiber Science High Pressure/High Strength Composite Material Development and Prototyping CTC * Program Management * Hydrogen Delivery - CH 4 /H 2 co-transport - H 2 separation - Delivery approaches * Advanced Materials - Characterization - Testing/Analyses - Predictive Modeling * Sensors SRNL Pipeline Life Management Program Develop infrastructure technology for a H 2 economy Aims to serve as "go-to" organization to catalyze PA Hydrogen

432

Fast multi-core co-simulation of Cyber-Physical Systems : Application to internal combustion engines  

E-Print Network [OSTI]

on renewable energy and energy efficiency. This challenge affects the whole energy cycle: production, transport. Automobiles are typical examples of Cyber-Physical Systems, where chem- ical energy (gasoline, diesel, ethanol. Currently, building high fidelity system-level models of Cyber-Physical Sys- tems in general and automotive

Boyer, Edmond

433

National Infrastructure Protection Plan | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Protection Plan Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation's CI/KR as weapons of mass destruction could have even more

434

Natural Gas and Hydrogen Infrastructure Opportunities: Markets...  

Broader source: Energy.gov (indexed) [DOE]

h presentation slides: Natural Gas and hydrogen Infrastructure opportunities: markets and Barriers to Growth Matt Most, Encana Natural Gas 1 OctOber 2011 | ArgOnne nAtiOnAl...

435

Delaware Transportation Infrastructure Forum Problem Identification Statements  

E-Print Network [OSTI]

2013 Delaware Transportation Infrastructure Forum Problem Identification Statements Sponsored by The Delaware Center for Transportation and the Delaware Department of Transportation Delaware Center for Transportation Your main resource for transportation education and research Identifying Important Issues Related

Firestone, Jeremy

436

Distributed Water Infrastructure for Sustainable Communities  

Science Journals Connector (OSTI)

Distributed water infrastructure (located at the community or the household level) is relatively untried and unproven, compared with technologies for managing urban water at higher (e.g. regional) levels. This...

Christos K. Makropoulos; David Butler

2010-09-01T23:59:59.000Z

437

Hydrogen Fueling Infrastructure Research and Station Technology  

Broader source: Energy.gov [DOE]

Presentation slides from the DOE Fuel Cell Technologies Office webinar "An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project" held on November 18, 2014.

438

Offshore Infrastructure Associates Inc | Open Energy Information  

Open Energy Info (EERE)

Database. This article is a stub. You can help OpenEI by expanding it. Retrieved from "http:en.openei.orgwindex.php?titleOffshoreInfrastructureAssociatesInc&oldid769313...

439

Costs Associated With Propane Vehicle Fueling Infrastructure  

SciTech Connect (OSTI)

This document is designed to help fleets understand the cost factors associated with propane vehicle fueling infrastructure. It provides an overview of the equipment and processes necessary to develop a propane fueling station and offers estimated cost ranges.

Smith, M.; Gonzales, J.

2014-08-01T23:59:59.000Z

440

Geographically Based Infrastructure Margo Melendez & Keith Parks  

E-Print Network [OSTI]

is incentive to purchase Alternative Fuels Data Center, EERE #12;Description of Metrics Vehicle Clean Cities Coalitions Alternative Fuels Data Center, EERE #12;Preliminary Findings #12;Preliminary;Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Modeling Risks in Infrastructure Asset Management  

E-Print Network [OSTI]

The goal of this dissertation research is to model risk in delivery, operation and maintenance phases of infrastructure asset management. More specifically, the two main objectives of this research are to quantify and measure financial risk...

Seyedolshohadaie, Seyed Reza

2012-10-19T23:59:59.000Z

442

Dispersion of agglomeration through transport infrastructure  

E-Print Network [OSTI]

My dissertation aims to assess transport infrastructure's influence on the productivity, scale and distribution of urban economic activities through changing intercity accessibility. Standard project-level cost-benefit ...

Fang, Wanli, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

443

Hydrogen Infrastructure Market Readiness Workshop: Preliminary Results  

Broader source: Energy.gov [DOE]

Preliminary results from the Hydrogen Infrastructure Market Readiness Workshop held February 16-17, 2011. This presentation was disseminated to workshop attendees to convey the aggregate and "raw" feedback collected during the workshop.

444

Geographically-Based Infrastructure Analysis for California  

Broader source: Energy.gov [DOE]

Presentation by Joan Ogden of the University of California at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

445

Public private partnership in infrastructure financing  

E-Print Network [OSTI]

The global financial crisis, which was unique in its magnitude and after effects, has generated significant interest in Public Private Partnership (PPP). Lack of investments and deteriorated infrastructure challenges ...

Ahmed, Anas

2014-01-01T23:59:59.000Z

446

Geographically Based Hydrogen Demand and Infrastructure Analysis  

Broader source: Energy.gov [DOE]

Presentation by NREL's Margo Melendez at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

447

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Broader source: Energy.gov (indexed) [DOE]

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

448

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

449

Presidential Proclamation: Critical Infrastructure Security and Resilience Month, 2013  

Broader source: Energy.gov [DOE]

A proclamation from President Barack Obama declaring November 2013 Critical Infrastructure Security and Resilience Month.

450

International Hydrogen Infrastructure Challenges Workshop Summary NOW, NEDO, and DOE  

Broader source: Energy.gov [DOE]

Webinar slides for the International Hydrogen Infrastructure Challenges Workshop Summary from NOW, NEDO, and DOE.

451

Hydrogen Vehicle and Infrastructure Codes and Standards Citations  

Broader source: Energy.gov [DOE]

This document lists codes and standards typically used for US hydrogen vehicle and infrastructure projects.

452

Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Natural Gas and Natural Gas and Hydrogen Infrastructure Opportunities Workshop to someone by E-mail Share Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Facebook Tweet about Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Twitter Bookmark Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Google Bookmark Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Delicious Rank Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Digg Find More places to share Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on AddThis.com...

453

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Tax Credit for Residents to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Residents on AddThis.com... More in this section...

454

Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fuel and Fuel and Fueling Infrastructure Incentives to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on Google Bookmark Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on Delicious Rank Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel and Fueling Infrastructure Incentives on AddThis.com... More in this section... Federal State Advanced Search

455

Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Natural Gas Vehicle Natural Gas Vehicle (NGV) and Infrastructure Initiative to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on Google Bookmark Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on Delicious Rank Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Vehicle (NGV) and Infrastructure Initiative on AddThis.com... More in this section... Federal

456

Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Vehicle (EV) Vehicle (EV) Infrastructure Definitions to someone by E-mail Share Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on Facebook Tweet about Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on Twitter Bookmark Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on Google Bookmark Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on Delicious Rank Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on Digg Find More places to share Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure Definitions on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

457

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Hydrogen Fueling Hydrogen Fueling Infrastructure Permitting and Safety to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on AddThis.com... More in this section... Federal State Advanced Search

458

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fueling Alternative Fueling Infrastructure Tax Credit for Businesses to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit for Businesses on AddThis.com...

459

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

460

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Broader source: Energy.gov (indexed) [DOE]

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

ReSS: Resource Selection Service for National and Campus Grid Infrastructure  

SciTech Connect (OSTI)

The Open Science Grid (OSG) offers access to around hundred Compute elements (CE) and storage elements (SE) via standard Grid interfaces. The Resource Selection Service (ReSS) is a push-based workload management system that is integrated with the OSG information systems and resources. ReSS integrates standard Grid tools such as Condor, as a brokering service and the gLite CEMon, for gathering and publishing resource information in GLUE Schema format. ReSS is used in OSG by Virtual Organizations (VO) such as Dark Energy Survey (DES), DZero and Engagement VO. ReSS is also used as a Resource Selection Service for Campus Grids, such as FermiGrid. VOs use ReSS to automate the resource selection in their workload management system to run jobs over the grid. In the past year, the system has been enhanced to enable publication and selection of storage resources and of any special software or software libraries (like MPI libraries) installed at computing resources. In this paper, we discuss the Resource Selection Service, its typical usage on the two scales of a National Cyber Infrastructure Grid, such as OSG, and of a campus Grid, such as FermiGrid.

Mhashilkar, Parag; Garzoglio, Gabriele; Levshina, Tanya; Timm, Steve; /Fermilab

2009-05-01T23:59:59.000Z

462

Hydrogen Infrastructure Transition Analysis: Milestone Report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrogen Infrastructure Hydrogen Infrastructure Transition Analysis M. Melendez and A. Milbrandt Milestone Report NREL/TP-540-38351 January 2006 Hydrogen Infrastructure Transition Analysis M. Melendez and A. Milbrandt Prepared under Task No. HY55.2200 Milestone Report NREL/TP-540-38351 January 2006 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle Contract No. DE-AC36-99-GO10337 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any

463

Acquasol Infrastructure Limited | Open Energy Information  

Open Energy Info (EERE)

Acquasol Infrastructure Limited Acquasol Infrastructure Limited Jump to: navigation, search Name Acquasol Infrastructure Limited Place Adelaide, South Australia, Australia Zip 5000 Sector Solar Product Adelaide based solar thermal project and technology developer. Coordinates -34.926102°, 138.599884° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":-34.926102,"lon":138.599884,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

464

Electric Vehicle Charging Infrastructure Deployment Guidelines: British  

Open Energy Info (EERE)

Electric Vehicle Charging Infrastructure Deployment Guidelines: British Electric Vehicle Charging Infrastructure Deployment Guidelines: British Columbia Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Electric Vehicle Charging Infrastructure Deployment Guidelines: British Columbia Agency/Company /Organization: Natural Resources Canada, British Columbia Hydro and Power Authority Focus Area: Vehicles Topics: Best Practices Website: www.bchydro.com/etc/medialib/internet/documents/environment/EVcharging A major component of winning public acceptance for plug-in vehicles is the streamlining of the private electric vehicle charging or supply equipment permitting and installation process as well as the public and commercial availability of charging locations. These guidelines are intended to anticipate the questions and requirements to ensure customer satisfaction.

465

Geographically-Based Infrastructure Analysis for California  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Geographically-Based Infrastructure Geographically-Based Infrastructure Analysis for California Joan Ogden Institute of Transportation Studies University of California, Davis Presented at the USDOE Hydrogen Transition Analysis Meeting Washington, DC August 9-10, 2006 Acknowledgments UC Davis Researchers: Michael Nicholas Dr. Marc Melaina Dr. Marshall Miller Dr. Chris Yang USDOE: Dr. Sig Gronich Research support: USDOE; H2 Pathways Program sponsors at UC Davis * Refueling station siting and sizing are key aspects of designing H2 infrastructure during a transition * Initial H2 stations may be co-located with vehicle fleets * Wider consumer adoption of H2 vehicles depends on fuel availability and cost (which are related to station number, size and location), + other factors. * Decision when and where to deploy network

466

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

467

A measurement infrastructure for sustainable manufacturing  

Science Journals Connector (OSTI)

Global resource degradation, climate change, and environmental pollution are worsening due to increasing globalised industrialisation. Manufacturing industries have thus been put under pressure to cope with these problems while maintaining competitiveness. Sustainable manufacturing has been proposed to meet these challenges. The measurement of sustainability in manufacturing enables the quantitative measure of sustainability performance in specific manufacturing processes that will support decision-making for more sustainable processes and products. This paper describes a proposed sustainable manufacturing measurement infrastructure. The centre piece of this infrastructure is a sustainability performance management component that will effectively manage a sustainable indicator repository, measurement process guidelines, and sustainability performance analysis, evaluation, and reporting. The sustainability measurement infrastructure provides a foundation for decision-making tools development and enables users to create a tight integration into business strategy development processes. Examples in this paper are on carbon emissions and energy consumption.

Shaw C. Feng; Che B. Joung

2011-01-01T23:59:59.000Z

468

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

469

Hydrogen Infrastructure Transition Analysis: Milestone Report  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Hydrogen Infrastructure Hydrogen Infrastructure Transition Analysis M. Melendez and A. Milbrandt Milestone Report NREL/TP-540-38351 January 2006 Hydrogen Infrastructure Transition Analysis M. Melendez and A. Milbrandt Prepared under Task No. HY55.2200 Milestone Report NREL/TP-540-38351 January 2006 National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov Operated for the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy by Midwest Research Institute * Battelle Contract No. DE-AC36-99-GO10337 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any

470

Sustainable Buildings and Infrastructure | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sustainable Buildings and Infrastructure Sustainable Buildings and Infrastructure "A sustainable society is one which satisfies its needs without diminishing the prospects of future generations." - Lester R. Brown, Founder and President, Worldwatch Institute Department of Energy facilities managers have a significant role to play in achieving the goals of E.O. 13423, Strengthening Federal Environmental Energy and Transportation Management and E.O. 13514, Federal Leadership in Environmental, Energy, and Economic Performance. The expectation is that DOE will build, operate and maintain energy efficient, environmentally sensitive buildings that provide a comfortable and productive working environment. DOE Sustainable Environmental Stewardship will reduce the

471

Near Term Hydrogen and Electricity Infrastructure Integration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Denver, CO Denver, CO September 22, 2004 Abbas Akhil, DER and Energy Storage Sandia National Laboratories, Albuquerque, NM (505) 844-7308 aaakhil@sandia.gov Near-term Hydrogen and Electricity Infrastructure Integration Near-term Hydrogen and Electricity Infrastructure Integration Integration Scenarios and Issues Integration Scenarios and Issues ! How and where can electrolysis systems be integrated in the grid? " Siting/location " Operational issues " Investments " Benefits " Ownership ! Objectives are " Capture "grid" benefits " Seek to reduce emissions Siting and Location Siting and Location ! Electrolysis systems can be sited at " Existing generating stations " Transmission substations " Distribution substations ! Each locations has different

472

Verifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop  

E-Print Network [OSTI]

-6925 A recent trend in the automotive industry is the rapid inclusion of electronics, computers and controlsVerifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop Francesco that focus entirely on improved functionality and overall system robustness. This makes the automotive sector

Rajkumar, Ragunathan "Raj"

473

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer  

E-Print Network [OSTI]

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer Dept security challenges for a fu- ture power grid. It highlights deficiencies and shortcom- ings of existing and fault resilience of power as a utility must be a prime objective for power grids. Security compromises

Mueller, Frank

474

Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System  

E-Print Network [OSTI]

, or for sporadic reasons, for example a power plant goes offline unexpectedly (e.g., due to an earthquake or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

475

Towards automation of low standardized logistic processes by use of cyber physical robotic systems (CPRS)  

Science Journals Connector (OSTI)

Global logistics networks have an increasing demand for handling of general cargo. Particularly, huband-spoke networks requires a lot of handling actions in order to realize benefits in comparison to point-to-point networks. The use of automation technologies ... Keywords: cooperative robotics, cyber physical systems, human computer interaction, human machine interface, industrial robots, virtual reality

Bernd Scholz-Reiter; Moritz Rohde; Stefan Kunaschk; Michael Ltjen

2011-11-01T23:59:59.000Z

476

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration  

E-Print Network [OSTI]

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Jaehong Park Institute University of Texas at San Antonio ravi.sandhu@utsa.edu Abstract--Collaboration takes place in both closed and open environments. While closed collaboration focuses on information or resource sharing amongst

Sandhu, Ravi

477

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network [OSTI]

), and renewable energy resources (e.g., solar and hydro) [2]. Therefore, the National Institute of StandardsSurvey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu importantly, with the integration of advanced computing and communication technologies, the Smart Grid

Wang, Wenye

478

Fuel Cell Technologies Office: Refueling Infrastructure for Alternative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Refueling Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen to someone by E-mail Share Fuel Cell Technologies Office: Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen on Facebook Tweet about Fuel Cell Technologies Office: Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen on Twitter Bookmark Fuel Cell Technologies Office: Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen on Google Bookmark Fuel Cell Technologies Office: Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen on Delicious Rank Fuel Cell Technologies Office: Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen on Digg

479

APS1031 Infrastructure Planning University of Toronto  

E-Print Network [OSTI]

-requisite of sustainable development, and we look at how resilience can be built into our infrastructure plan. With case development policy? While each is a specialist area of practice, all have a basis in strategic planning to manage the financing and design processes. As the UN observed, resilience is the pre

Toronto, University of

480

Infrastructure Constraints in New England Background Memo  

Broader source: Energy.gov [DOE]

On Monday, April 21, 2014 the U.S. Department of Energy (DOE), acting in its capacity as the Secretariat for the QER Task Force, will convene a two-part public meeting to examine energy infrastructure constraints in New England and regional approaches to addressing them.

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Framework for Improving Critical Infrastructure Cybersecurity  

E-Print Network [OSTI]

Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 #12;February 12, 2014 Cybersecurity Framework Version 1.0 Table............................................................................................................. 20 ii #12;February 12, 2014 Cybersecurity Framework Version 1.0 Executive Summary The national

482

Chapter ??. Knowledge as infrastructure Ole Hanseth  

E-Print Network [OSTI]

1 Chapter ??. Knowledge as infrastructure Ole Hanseth Introduction ICT solutions are often designed process because of the need for the construction and adoption of a lot of new knowledge. For example, new knowledge is required about the design of better business processes in various business sectors

Hanseth, Ole

483

Refueling Infrastructure for Alternative Fuel Vehicles  

E-Print Network [OSTI]

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen Panel Session Innovation Coordination Slow Fast Cars Codes Fuel production and delivery technology Vehicle technology Motors Catherine Dunwoody, California Fuel Cell Partnership Ulrich Bünger, L-B-Systemtechnik Discussion

484

What is the VALUE of Nature's Infrastructure?  

E-Print Network [OSTI]

& Infrastructure by acreage & type Utilize recognized payments for each service. Utilize existing Real Estate. To be "Sustainable" a community system must retain between 40% to 60% green space to gain the services of the natural "natural lands". #12;Lee County Conservation 2020 On the path to Sustainability by Acquiring Natural Lands

Demers, Nora Egan

485

PEV Infrastructure Needs UC Davis Policy Institute  

E-Print Network [OSTI]

1 PEV Infrastructure Needs UC Davis Policy Institute Policy Forum Series: ZEVs June 13, 2012 www · SDG&E · SMUD Consulting / Research · CALSTART · EPRI · ICCT · UC Davis Advocacy Organizations into an increasingly clean, efficient, reliable, and safe electricity grid · PEVs advance energy security, air quality

California at Davis, University of

486

A Web Service Infrastructure for Thermochemical Data  

Science Journals Connector (OSTI)

A Web Service Infrastructure for Thermochemical Data ... At this time, DFT is only supported using either the Becke exchange with the Lee/Yang/Parr (LYP) correlation (BLYP) functional or the hybrid HF/Becke/LYP using VWN formula 5 (B3LYP) functional. ...

Christopher P. Paolini; Subrata Bhattacharjee

2008-06-11T23:59:59.000Z

487

Future Perspectives of the Unified Global Infrastructure  

Science Journals Connector (OSTI)

A novel approach towards the realisation of future communication systems is presented, highlighting some key research-areas, whose proper development will contribute to the development of the envisaged trends. The concept of a unified global infrastructure ... Keywords: air interfaces, ambient networks, context-aware technologies, flexible platforms, optical networks, user interface

Ramjee Prasad; Marina Ruggieri

2003-08-01T23:59:59.000Z

488

Future Internet Infrastructures for FI Prototyping  

E-Print Network [OSTI]

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11­2009 #12;Future Internet Berlin AV de- partment (Architektur für Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

489

Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)  

SciTech Connect (OSTI)

This is a presentation about the Fuel Cell Electric Vehicle Learning Demo, a 7-year project and the largest single FCEV and infrastructure demonstration in the world to date. Information such as its approach, technical accomplishments and progress; collaborations and future work are discussed.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

2012-05-01T23:59:59.000Z

490

Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure- EAC 2011  

Broader source: Energy.gov [DOE]

Recommendations from the Electricity Advisory Committee on actions to be taken by the Department of Energy given the interdependence of the Nations electric infrastructure and natural gas...

491

Data-Intensive Visual Analysis for Cyber Security  

SciTech Connect (OSTI)

Protecting communications networks against attacks where the aim is to steal information, disrupt order, or harm critical infrastructure can require the collection and analysis of staggering amounts of data. The ability to detect and respond to threats quickly is a paramount concern across sectors, and especially for critical government, utility and financial networks. Yet detecting emerging or incipient threats in immense volumes of network traffic requires new computational and analytic approaches. Network security increasingly requires cooperation between human analysts able to spot suspicious events through means such as data visualization and automated systems that process streaming network data in near real-time to triage events so that human analysts are best able to focus their work.

Pike, William A.; Best, Daniel M.; Love, Douglas V.; Bohn, Shawn J.

2013-01-29T23:59:59.000Z

492

Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure  

Science Journals Connector (OSTI)

The advanced electric power grid is a cyber-physical system comprised of ... of the device and the reliability of the power grid on which they are deployed. The IEEE118...

Ayman Z. Faza; Sahra Sedigh

2009-01-01T23:59:59.000Z

493

Alternative Fuels Data Center: E85 Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

E85 Fueling E85 Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type E85 Fueling Infrastructure Grants The Illinois Department of Commerce and Economic Opportunity's (Department)

494

Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives -  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Propane Infrastructure Propane Infrastructure and Fuel Incentives - SchagrinGAS to someone by E-mail Share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on Facebook Tweet about Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on Twitter Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on Google Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on Delicious Rank Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on Digg Find More places to share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - SchagrinGAS on AddThis.com... More in this section...

495

Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biofuel Fueling Biofuel Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Fueling Infrastructure Grants The Tennessee Department of Transportation (TDOT) engages in public-private

496

Alternative Fuels Data Center: Natural Gas Infrastructure Loans  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Gas Gas Infrastructure Loans to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Infrastructure Loans on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Infrastructure Loans on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Infrastructure Loans on Google Bookmark Alternative Fuels Data Center: Natural Gas Infrastructure Loans on Delicious Rank Alternative Fuels Data Center: Natural Gas Infrastructure Loans on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Infrastructure Loans on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Natural Gas Infrastructure Loans Effective July 1, 2013, the Wyoming Partnership Challenge (Challenge) may issue loans to businesses for the cost of the engineering, design, real

497

Alternative Fuels Data Center: E85 Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: E85 Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type E85 Fueling Infrastructure Grants The Twin Cities Clean Cities Coalition offers funding assistance to fuel

498

Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Infrastructure and Battery Tax Exemptions to someone by E-mail Infrastructure and Battery Tax Exemptions to someone by E-mail Share Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on Facebook Tweet about Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on Twitter Bookmark Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on Google Bookmark Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on Delicious Rank Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on Digg Find More places to share Alternative Fuels Data Center: Electric Vehicle (EV) Infrastructure and Battery Tax Exemptions on AddThis.com...

499

Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Renewable Fuel Renewable Fuel Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Renewable Fuel Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Renewable Fuel Infrastructure Tax Credit A tax credit is available for 25% of the cost to install or retrofit

500

S E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES  

E-Print Network [OSTI]

civilization documentary, economic, social and even political or spiritual value #12;SEISMIC ENGINEERINGS E R I E S SEISMIC ENGINEERING RESEARCH INFRASTRUCTURES FOR EUROPEAN SYNERGIES COMMISSION of Research Infrastructures in Performance-based Earthquake Engineering Shaking table testing of models