Powered by Deep Web Technologies
Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Widget:GeneralRedirect | Open Energy Information  

Open Energy Info (EERE)

GeneralRedirect Jump to: navigation, search This widget will redirect the browser to a URL that mediawiki doesn't know about (such as datasets). This widget will take a URL...

2

Widget:DatasetsRedirect | Open Energy Information  

Open Energy Info (EERE)

Widget Edit History Facebook icon Twitter icon Widget:DatasetsRedirect Jump to: navigation, search This widget will redirect the browser to the application at datasets. Usage:...

3

Help:Redirects | Open Energy Information  

Open Energy Info (EERE)

Redirects Redirects Jump to: navigation, search Redirects are used to forward users from one page name to another. They can be useful if a particular article is referred to by multiple names, or has alternative punctuation, capitalization or spellings. Contents 1 Creating a redirect 2 Viewing a redirect 3 Deleting a redirect 4 Double redirects 5 A redirect to a page in the category namespace Creating a redirect You may start a new page with the name you want to direct from (see Help:Starting a new page). You can also use an existing page that you are making inactive as a page by going to that page and using the "edit" tab at the top. In either case, you will be inserting the following code at the very first text position of the Edit window for the page: #REDIRECT [[pagename]]

4

V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Struts DefaultActionMapper Redirection and OGNL 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA54118 Apache Security Bulletin S2-16 Apache Security Bulletin S2-17 CVE-2013-2248 CVE-2013-2251 IMPACT ASSESSMENT: High DISCUSSION: 1) Input passed via the "redirect:" and "redirectAction:" prefixing parameters is not properly verified in the DefaultActionMapper class

5

A client oriented, IP level redirection mechanism  

E-Print Network [OSTI]

. Latency for Supporting Clients 2. Latency for Legacy Clients C. Bulk Transfer Time Measurements 10 10 13 13 18 25 27 27 28 29 30 32 36 42 42 46 46 VII APPLICATIONS A. Applications . l. VIobile IP Implementations 2. Relial...- allel Redirected Connections (P. R. C. ), Hash Space Size ? 15 . 15 IP Output Processing Time for s. Non-Redircctcd Session. with Parallel Redirected Connections (P. R. C. ) . 16 IP Processing Time for Single Redirected Session 41 17 TCP Connection...

Gupta, Sumita

1998-01-01T23:59:59.000Z

6

URL | Open Energy Information  

Open Energy Info (EERE)

URL URL Jump to: navigation, search Properties of type "URL" Showing 58 properties using this type. B Property:Buildings/ModelIdfFile Property:Buildings/ModelXmlFile Property:Buildings/PublicationURL E Property:EnergyAccessWebsite Property:Event/Website F Property:File/SourceURL Property:Foaf/Homepage Property:Foaf/Page G Property:GeoNames URL Property:Geothermal/AwardeeWebsite Property:Geothermal/NewsWebsite Property:Geothermal/Partner10Website Property:Geothermal/Partner11Website Property:Geothermal/Partner1Website Property:Geothermal/Partner2Website Property:Geothermal/Partner3Website Property:Geothermal/Partner4Website Property:Geothermal/Partner5Website Property:Geothermal/Partner6Website G cont. Property:Geothermal/Partner7Website Property:Geothermal/Partner8Website

7

A taxonomy of JavaScript redirection spam  

Science Journals Connector (OSTI)

Redirection spam presents a web page with false content to a crawler for indexing, but automatically redirects the browser to a different web page. Redirection is usually immediate (on page load) but may also be triggered by a timer or a harmless user ... Keywords: JavaScript, redirection spam, web search, web spam

Kumar Chellapilla; Alexey Maykov

2007-05-01T23:59:59.000Z

8

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

9

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Broader source: Energy.gov (indexed) [DOE]

91: cURL Lets Remote Users Decrypt SSL/TLS Traffic 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows

10

Widget:DocumentURL | Open Energy Information  

Open Energy Info (EERE)

Widget Edit History Facebook icon Twitter icon Widget:DocumentURL Jump to: navigation, search This widget will return the URL for the HTML document. Parameters include: none For...

11

Active Wake Redirection Control to Improve Energy Yield (Poster)  

SciTech Connect (OSTI)

Wake effects can dramatically reduce the efficiency of waked turbines relative to the unwaked turbines. Wakes can be deflected, or 'redirected,' by applying yaw misalignment to the turbines. Yaw misalignment causes part of the rotor thrust vector to be pointed in the cross-stream direction, deflecting the flow and the wake. Yaw misalignment reduces power production, but the global increase in wind plant power due to decreased wake effect creates a net increase in power production. It is also a fairly simple control idea to implement at existing or new wind plants. We performed high-fidelity computational fluid dynamics simulations of the wake flow of the proposed Fishermen's Atlantic City Windfarm (FACW) that predict that under certain waking conditions, wake redirection can increase plant efficiency by 10%. This means that by applying wake redirection control, for a given watersheet area, a wind plant can either produce more power, or the same amount of power can be produced with a smaller watersheet area. With the power increase may come increased loads, though, due to the yaw misalignment. If misalignment is applied properly, or if layered with individual blade pitch control, though, the load increase can be mitigated. In this talk we will discuss the concept of wake redirection through yaw misalignment and present our CFD results of the FACW project. We will also discuss the implications of wake redirection control on annual energy production, and finally we will discuss plans to implement wake redirection control at FACW when it is operational.

Churchfield, M. J.; Fleming, P.; DeGeorge, E.; Bulder, B; White, S. M.

2014-10-01T23:59:59.000Z

12

Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed  

E-Print Network [OSTI]

of a microstructured prismatic window film in deep open plandaylight- redirecting window film in a full-scale officedaylight- redirecting window film in a full-scale office

Thanachareonkit, Anothai

2014-01-01T23:59:59.000Z

13

Property:KML URL | Open Energy Information  

Open Energy Info (EERE)

KML URL KML URL Jump to: navigation, search This is a property of type URL. Pages using the property "KML URL" Showing 25 pages using this property. (previous 25) (next 25) A Afghanistan + http://finder.geocommons.com/overlays/download/7784.kml + Alabama + http://finder.geocommons.com/overlays/download/1198.kml + Alabama's 1st congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 2nd congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 3rd congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 4th congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 5th congressional district + http://finder.geocommons.com/overlays/download/323810.kml +

14

ReadFromWeb := proc (URL  

E-Print Network [OSTI]

>> >> (2)(2) >> >> >> >> >> (1)(1) >> ReadFromWeb := proc (URL::string, { printfile [ m + 1 . . n ] ) e n d i f o d : end proc: ReadFromWeb("http://www.math.sunysb.edu/~scott/mat331. spr

Sutherland, Scott

15

Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options -New York Times January 22, 2008  

E-Print Network [OSTI]

Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options - New York Times January 22, 2008 Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options By ELISABETH for biofuels, acknowledging that the environmental benefits of these fuels have often been overstated

16

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

17

Property:Buildings/PublicationURL | Open Energy Information  

Open Energy Info (EERE)

PublicationURL PublicationURL Jump to: navigation, search This is a property of type URL. Pages using the property "Buildings/PublicationURL" Showing 2 pages using this property. G General Merchandise 50% Energy Savings Technical Support Document 2009 + http://www.nrel.gov/docs/fy09osti/46100.pdf + Grocery Store 50% Energy Savings Technical Support Document 2009 + http://www.nrel.gov/docs/fy09osti/46101.pdf + Retrieved from "http://en.openei.org/w/index.php?title=Property:Buildings/PublicationURL&oldid=269807#SMWResults" What links here Related changes Special pages Printable version Permanent link Browse properties About us Disclaimers Energy blogs Linked Data Developer services OpenEI partners with a broad range of international organizations to grow

18

Pointright: a system to redirect mouse and keyboard control among multiple machines  

DOE Patents [OSTI]

The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

Johanson, Bradley E. (Palo Alto, CA); Winograd, Terry A. (Stanford, CA); Hutchins, Gregory M. (Mountain View, CA)

2008-09-30T23:59:59.000Z

19

Property:GeoNames URL | Open Energy Information  

Open Energy Info (EERE)

URL URL Jump to: navigation, search This is a property of type URL. Pages using the property "GeoNames URL" Showing 25 pages using this property. (previous 25) (next 25) A Abbotsford, Australia + http://sws.geonames.org/2178377/ + Abidjan, Côte d'Ivoire + http://sws.geonames.org/2293538/ + Abu Dhabi, United Arab Emirates + http://sws.geonames.org/292968/ + Accra, Ghana + http://sws.geonames.org/2306104/ + Alberta + http://sws.geonames.org/5883102/ + Alger, Algeria + http://sws.geonames.org/2507480/ + Almo, Idaho + http://sws.geonames.org/5583921/ + Anaconda, Montana + http://sws.geonames.org/5637146/ + Animas, New Mexico + http://sws.geonames.org/5455243/ + Ankara, Turkey + http://sws.geonames.org/323786/ + Argonne, Illinois + http://sws.geonames.org/4883533/ +

20

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


22

Empirical assessment of a prismatic daylight-redirecting window film in a  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Empirical assessment of a prismatic daylight-redirecting window film in a Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed Title Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed Publication Type Conference Paper LBNL Report Number LBNL-6496E Year of Publication 2013 Authors Thanachareonkit, Anothai, Eleanor S. Lee, and Andrew McNeil Conference Name Illuminating Engineering Society (IES) Annual Conference 2013 Date Published 10/2013 Conference Location Huntington Beach, California Keywords building energy efficiency., daylighting, microstructure film, prismatic film, windows Abstract Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-to-wall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare= probability and other metrics used to evaluate visual discomfort.

23

Research deciphers HIV attack plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights...

24

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

25

Redirecting carbon flux through exogenous pyruvate kinase to achieve high ethanol yields in Clostridium thermocellum  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Redirecting Redirecting carbon flux through exogenous pyruvate kinase to achieve high ethanol yields in Clostridium thermocellum Yu Deng a,c , Daniel G. Olson a,c , Jilai Zhou a,c , Christopher D. Herring a,b,c , A. Joe Shaw d , Lee R. Lynd a,b,c,n a Thayer School of Engineering, Dartmouth College, Hanover, NH 03755, USA b Mascoma Corporation, Lebanon, NH 03766, USA c BioEnergy Science Center, Oak Ridge, TN 37830, USA d Novogy, Inc. Cambridge, MA 02138, USA a r t i c l e i n f o Article history: Received 24 August 2012 Received in revised form 6 November 2012 Accepted 16 November 2012 Available online 29 November 2012 Keywords: Clostridium thermocellum Ethanol yield Pyruvate kinase Malate shunt a b s t r a c t In Clostridium thermocellum, a thermophilic anaerobic bacterium able to rapidly ferment cellulose to ethanol, pyruvate kinase (EC 2.7.1.40) is absent based on both the genome sequence and enzymatic

26

Redirection of the spherical expanding shock wave on the interface with plasma  

SciTech Connect (OSTI)

We study a strong spherical expanding shock wave interacting with the finite-gradient interface between neutral cold gas and weakly ionized plasma. We want to see how the interaction with the interface can alter the shock structure compared to the case of its free propagation through the media with the exponentially varying density. From our comparative calculations based on the 2D model, we found substantial difference in the shock structure including strong deformation of the shock front followed with its gradual flattening and the redirection in its propagation. There are a number of factors that can be used to control this phenomenon in order to strengthen or lessen the effect. The calculations can be made on any scale, limited with the requirement for the shock wave to be strong. The study points at the possibility in certain applications to avoid the shock wave with its redirection rather than attenuation. The results can be applicable to optimization of the energy deposition into the supersonic flux, the drag reduction in hypersonic flight, in the detonation theory, and combustion through the control of the ignition conditions, and for environmental improvements through sonic boom reduction. Cartesian coordinates were used in order to visualize the phenomenon.

Markhotok, A.; Popovic, S. [Physics Department, Old Dominion University, Norfolk, Virginia 23529 (United States)] [Physics Department, Old Dominion University, Norfolk, Virginia 23529 (United States)

2014-02-15T23:59:59.000Z

27

Efficient template attacks  

E-Print Network [OSTI]

joint MD , d joint LINEAR. 6 Evaluation of Methods We evaluated the efficiency of many template-attack variants on a real hard- ware platform, comparing all the compression methods from Table 110 and all 9 MATLAB, single core CPU with 3794 MIPS. 10 We... implementing template attacks. Data and Code Availability: In the interest of reproducible research we make available our data and associated MATLAB scripts at: http://www.cl.cam.ac.uk/research/security/datasets/grizzly/ Acknowledgement: Omar Choudary is a...

Choudary, Omar; Kuhn, Markus G.

2014-01-01T23:59:59.000Z

28

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

29

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

30

Seven Deadliest Wireless Technologies Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, ...

Brad Haines

2010-03-01T23:59:59.000Z

31

Seven Deadliest Unified Communications Attacks  

Science Journals Connector (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified ...

Dan York

2010-06-01T23:59:59.000Z

32

Insects Attacking Forage Crops.  

E-Print Network [OSTI]

on alfalfa leaves within web. Also attacks young corn ant1 soqhllm plants near ground. Have three dark spots in triangular shape on sides of most segments. GARDEN WEBWORM. Paqe II. 12. Foliage devoured by very hairy or wooly caterpillars up to 2 inches long... with irregular holes with ragged edges. Dark green worm up to nearly 2 inches long; light-coloretl line down middle of back and on each side of this line is a greenish-brown to black band. General feeder on all fora: ARMYWORM. Page 7. 3. Holes eaten in leaves...

Randolph, N. M.; Garner, C. F.

1961-01-01T23:59:59.000Z

33

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

34

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

attacks that compromise PMU data are much less likely thanPMU’s are networked on the newer NASPInet architecture which has been designed for secure data

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

35

Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for presentation to the IESNA 2013 Annual Conference, Huntington Beach, CA, for presentation to the IESNA 2013 Annual Conference, Huntington Beach, CA, October 26-29, 2013 and for publication in Leukos, the journal of the IESNA. Empirical assessment of a prismatic daylight- redirecting window film in a full-scale office testbed Anothai Thanachareonkit, Eleanor S. Lee, Andrew McNeil Building Technologies and Urban Systems Department, Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Mailstop 90-3111, 1 Cyclotron Road, Berkeley, CA 94720 USA Abstract Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing

36

WILD PIG ATTACKS ON HUMANS  

SciTech Connect (OSTI)

Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

Mayer, J.

2013-04-12T23:59:59.000Z

37

Modeling modern network attacks and countermeasures using attack graphs  

E-Print Network [OSTI]

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

Ingols, Kyle W.

38

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

39

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

40

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

42

An Attack on Centrifugal Costs  

E-Print Network [OSTI]

AN ATTACK ON CENTRIFUGAL COSTS j P. ~,t~~c1ier Mwra~ I Mons'anto ' Alvin, 'ie~as I ABSTRACT Energy conservation in small and medium horse power industrial centrifugal power users has re ceived very little attention to date. Monsanto...

Murray, P. F.

43

Mobile Malware Attacks and Defense  

Science Journals Connector (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

44

Modeling attacks on physical unclonable functions  

E-Print Network [OSTI]

We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm ...

Ulrich, Ruhrmair

45

URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation in Healthcare  

E-Print Network [OSTI]

URL To Story: http://press.arrivenet.com/technology/article.php/993701.html RFID Innovation on the RFID Tribe websit http://www.rfidtribe.com/home/index.php?option=com_events&Itemid=67 About RFID Tribe in Healthcare URL: http://press.arrivenet.com/technology/print.php

Chiao, Jung-Chih

46

The Cost of Attack in Competing Networks  

E-Print Network [OSTI]

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

2015-01-01T23:59:59.000Z

47

Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed  

SciTech Connect (OSTI)

Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-towall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare probability and other metrics used to evaluate visual discomfort. The window film was found to result in perceptible levels of discomfort glare on clear sunny days from the most conservative view point in the rear of the room looking toward the window. Daylight illuminance levels at the rear of the room were significantly increased above the reference window condition, which was defined as the same glazed clerestory window but with an interior Venetian blind (slat angle set to the cut-off angle), for the equinox to winter solstice period on clear sunny days. For partly cloudy and overcast sky conditions, daylight levels were improved slightly. To reduce glare, the daylighting film was coupled with a diffusing film in an insulating glazing unit. The diffusing film retained the directionality of the redirected light spreading it within a small range of outgoing angles. This solution was found to reduce glare to imperceptible levels while retaining for the most part the illuminance levels achieved solely by the daylighting film.

Thanachareonkit, Anothai; Lee, Eleanor S.; McNeil, Andrew

2013-08-31T23:59:59.000Z

48

ESAIM: Control, Optimisation and Calculus of Variations URL: http://www.emath.fr/cocv/  

E-Print Network [OSTI]

ESAIM: Control, Optimisation and Calculus of Variations URL: http://www.emath.fr/cocv/ December(fl(t))nf0g for almost every t: Let (; ) be the scalar product defined by g: The length of an admissible curve is: L(fl) = Z T 0 ( â?? fl(t); â?? fl(t)) 1 2 dt and the energy of fl is: E(fl) = Z T 0 ( â?? fl

Agrachev, Andrei

49

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |  

Broader source: Energy.gov (indexed) [DOE]

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide April 3, 2009 - 5:47pm Addthis Allison Casey Senior Communicator, NREL If you're a regular visitor to EERE's Consumer's Guide to Energy Efficiency and Renewable Energy, you may have noticed some changes this week. The site has moved to EnergySavers.gov and is now called "Energy Savers." The same in-depth information is still available, and we hope this new address will make the site easier for people to find. Along with this move came a home page facelift. Visit the site at EnergySavers.gov and let us know what you think! In the spirit of spring renewal, we've also refreshed our seasonal Web site; the winter "Stay Warm, Save Money" site is now " Stay Cool, Save

50

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |  

Broader source: Energy.gov (indexed) [DOE]

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide April 3, 2009 - 5:47pm Addthis Allison Casey Senior Communicator, NREL If you're a regular visitor to EERE's Consumer's Guide to Energy Efficiency and Renewable Energy, you may have noticed some changes this week. The site has moved to EnergySavers.gov and is now called "Energy Savers." The same in-depth information is still available, and we hope this new address will make the site easier for people to find. Along with this move came a home page facelift. Visit the site at EnergySavers.gov and let us know what you think! In the spirit of spring renewal, we've also refreshed our seasonal Web site; the winter "Stay Warm, Save Money" site is now " Stay Cool, Save

51

Practical Attacks on Proximity Identification Systems  

E-Print Network [OSTI]

DEFCON ­ eavesdropped RFID at 20 m Confusion ?? RFID type Definition of distances Experimental setup skimming) Relay Attacks Practical Attacks on Proximity Identification Systems ­ p. #12;"Proximity from distance dE Further considerations dRT , Reader Token communication dTR, Token Reader

Hancke, Gerhard

52

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

53

Injection Technologies for Fault Attacks on Microprocessors  

Science Journals Connector (OSTI)

The fault injection technique we will analyze in detail in Sect. 16.3, is the constant under-powering of a computing device. By running the chip with a depleted power supply, the attacker is able to insert transi...

Alessandro Barenghi; Guido M. Bertoni; Luca Breveglieri…

2012-01-01T23:59:59.000Z

54

SQL Injection Attacks and Defense, 2 edition  

Science Journals Connector (OSTI)

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." ¿¿Richard ...

Justin Clarke; Kevvie Fowler; Erlend Oftedal; Rodrigo Marcos Alvarez; Dave Hartley; Alexander Kornbrust; Gary O'Leary-Steele; Alberto Revelli; Sumit Siddharth; Marco Slaviero

2009-06-01T23:59:59.000Z

55

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

56

When Utility Bills Attack! | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

57

Zero-knowledge against quantum attacks  

E-Print Network [OSTI]

This paper proves that several interactive proof systems are zero-knowledge against quantum attacks. This includes a few well-known classical zero-knowledge proof systems as well as quantum interactive proof systems for the complexity class HVQSZK, which comprises all problems having "honest verifier" quantum statistical zero-knowledge proofs. It is also proved that zero-knowledge proofs for every language in NP exist that are secure against quantum attacks, assuming the existence of quantum computationally concealing commitment schemes. Previously no non-trivial proof systems were known to be zero-knowledge against quantum attacks, except in restricted settings such as the honest-verifier and common reference string models. This paper therefore establishes for the first time that true zero-knowledge is indeed possible in the presence of quantum information and computation.

John Watrous

2005-11-03T23:59:59.000Z

58

Responding to chemical attack. Final report  

SciTech Connect (OSTI)

In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

Bagley, R.W.

1991-02-11T23:59:59.000Z

59

URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1  

E-Print Network [OSTI]

URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1 70118, USA Abstract We study the expressive power of an augmented version of Timed CSP and show constraints. We also show that this new version of Timed CSP is expressive enough to capture the most widely

Ouaknine, Joël

60

../fusion/templates/mapguide/maroon/css/maroon_fusion.css background-image: url(../images/background.gif);  

E-Print Network [OSTI]

../fusion/templates/mapguide/maroon/css/maroon_fusion.css body { background-image: url(../images/background.gif); ../fusion/templates/mapguide/maroon/css/ maroon_fusion.css body { background-color: #3e5c5f; ../fusion/templates/mapguide/maroon/css/ maroon_fusion.css #ToolbarVertical { background: #500000; maroon_fusion.css #Toolbar { background

Ahmad, Sajjad

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

ESAIM: Control, Optimisation and Calculus of Variations May 2001, Vol. 6, 361386 URL: http://www.emath.fr/cocv/  

E-Print Network [OSTI]

ESAIM: Control, Optimisation and Calculus of Variations May 2001, Vol. 6, 361­386 URL: http (see Haraux [9]) in the energy space or they are based on non local feed-backs (see for instance. More precisely, let X be a complex Hilbert space with norm and inner product denoted respectively

Tucsnak, Marius - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

62

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

63

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

64

Heart Disease and Early Heart Attack Care  

E-Print Network [OSTI]

Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

Ohta, Shigemi

65

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication  

E-Print Network [OSTI]

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty #12;ABSTRACT Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho the true network identity of com- municating parties against eavesdropping adversaries. Tor, acronym

Keromytis, Angelos D.

66

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

67

PUF Modeling Attacks on Simulated and Silicon Data  

E-Print Network [OSTI]

We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal of our attacks is to construct a computer ...

Ruhrmair, Ulrich

68

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

operation Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and...

69

Fatal Chimpanzee Attack in Loango National Park, Gabon  

E-Print Network [OSTI]

Fatal Chimpanzee Attack in Loango National Park, Gabon Christophe Boesch & Josephine Head & Nikki a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found or habituation. Keywords chimpanzees . fatal attack . gabon . intergroup conflict Introduction Chimpanzee social

70

ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University  

E-Print Network [OSTI]

1 Chapter 74 ELECTRONIC ATTACKS Thomas M. Chen, Southern Methodist University Matthew C. Elder An understanding of electronic attacks is an essential prerequisite to building strong cyber defenses. This chapter gives an overview of the major electronic attacks encountered today, proceeding through the basic steps

Chen, Thomas M.

71

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

72

Cascade-based attacks on complex networks  

Science Journals Connector (OSTI)

We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

Adilson E. Motter and Ying-Cheng Lai

2002-12-20T23:59:59.000Z

73

E-Print Network 3.0 - acute migraine attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with either depression or migraine attack frequency. Conclusion... on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant......

74

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

75

Cascading Failures in Power Grid under Three Node Attack Strategies  

Science Journals Connector (OSTI)

This paper studies cascading failures of power grid under three node attack strategies based on...k is k ? , and ?...is a tunable parameter. We investigated the...

Sui-Min Jia; Yun-Ye Wang; Cong Feng; Zhi-Juan Jia…

2014-01-01T23:59:59.000Z

76

Signs of a Heart Attack - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletter & Updates > Safety Meeting Toolkits > Signs of a Heart Attack Newsletter & Updates Health News & InsideOut Newsletter Pandemic Preparedness Diabetes Ergonomic Awareness...

77

Attacking Systems ecurity vulnerabilities related to buffer overruns  

E-Print Network [OSTI]

Attacking Systems S ecurity vulnerabilities related to buffer overruns account for the largest exploits that take ad- vantage of the vulnerability to attack a system. The traditional approach and even security profession- als seemingly assume that all buffer overrun exploits operate in a similar

Sekar, R.

78

Cardiologists from CU testing revolutionary heart-attack treatment  

E-Print Network [OSTI]

Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

Cerveny, Vlastislav

79

Heart Attack Survival Plan Information To Share With  

E-Print Network [OSTI]

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

80

Securing SQL Server: Protecting Your Database from Attackers, 2 edition  

Science Journals Connector (OSTI)

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server ...

Denny Cherry

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks  

E-Print Network [OSTI]

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J by an implementation of the relay attack that has been tested on live systems. Once designers appreciate the risk to the smartcard standard, based on a distance bounding protocol, which provides adequate resistance to the relay

Xu, Wenyuan

82

Fault and Side-Channel Attacks on Pairing Based Cryptography ?  

E-Print Network [OSTI]

such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

83

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

84

On the algebraic attack against summation type keystream generators  

Science Journals Connector (OSTI)

The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.

Md. Iftekhar Salam; Hoon-Jae Lee

2012-01-01T23:59:59.000Z

85

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

Council. Focus on Heart Attack in Pennsylvania. Researchexperienced an acute heart attack due to coronary arterysample. 18. Focus on Heart Attack in Pennsylvania, Research

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

86

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

P S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:This third report on heart attack mortality rates expandsconditions selected were heart attack (acute myocardial

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

87

PoisonAmplifier: a guided approach of discovering compromised websites through reversing search poisoning attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. ...

Jialong Zhang; Chao Yang; Zhaoyan Xu; Guofei Gu

2012-09-01T23:59:59.000Z

88

Optimal response to attacks on the open science grids.  

SciTech Connect (OSTI)

Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

2011-01-01T23:59:59.000Z

89

TCPL: A Defense against wormhole attacks in wireless sensor networks  

SciTech Connect (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

90

E-Print Network 3.0 - attacks influence driving Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

91

E-Print Network 3.0 - attacks draft resolution Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(and our attacks) to four real-world PRNGs. We close Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 8 Cryptanalytic Attacks on...

92

Complex Attack Analysis and Safeguard Selection: a Cost-Oriented Approach.  

E-Print Network [OSTI]

??When intelligent threats attack a system, they rarely achieve their goals by exploiting a single vulnerability. Rather, they achieve their goals by composing attacks and… (more)

TANG, SUK WAH CRISTINA

2009-01-01T23:59:59.000Z

93

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks  

Science Journals Connector (OSTI)

Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware...

Jialong Zhang; Chao Yang; Zhaoyan Xu…

2012-01-01T23:59:59.000Z

94

The Daily Tar Heel URL: http://www.dailytarheel.com/index.php/article/2010/09/grant_money_to_help_scholars  

E-Print Network [OSTI]

The Daily Tar Heel URL: http://www.dailytarheel.com/index.php/article/2010/09/grant_money_to_help_scholars Current Date: Sun, 26 Sep 2010 13:05:26 -0400 Grant money to help scholars To benefit biomedical students in biology, physics and chemistry, as well as high-level math and applied sciences courses. The grant money

Sekelsky, Jeff

95

Book Title Author(s) URL A Complete Guide to Quality in Small-Scale Wine MakingConsidine, John http://www.sciencedirect.com/science/book/9780124080812  

E-Print Network [OSTI]

Book Title Author(s) URL A Complete Guide to Quality in Small-Scale Wine MakingConsidine, John http://www.sciencedirect.com/science/book/9780124080812 A Pharmacology Primer Kenakin, Terry http://www.sciencedirect.com/science/book/9780124076631 A Practical Guide to SysML Friedenthal, Sanford http://www.sciencedirect.com/science/book/14_NO_ISBN_101

96

To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51_2_242/_article  

E-Print Network [OSTI]

To link to this article: URL : https://www.jstage.jst.go.jp/article/isijinternational/51/2/51 with chunky graphite. (2010) ISIJ International, vol. 51 (n° 2). pp. 242-249. ISSN 0915-1559 Open Archive-defined transition from the outer unaffected area and the inner affected one. All previous works that looked

Mailhes, Corinne

97

To link to this article: DOI:10.1109/TPS.2012.2190303 URL : http://dx.doi.org/10.1109/TPS.2012.2190303  

E-Print Network [OSTI]

observed toward high-temperature range of the collagen denaturation and 2) the stiffening of the chainsTo link to this article: DOI:10.1109/TPS.2012.2190303 URL : http://dx.doi.org/10.1109/TPS.2012, Florian and Dandurand, Jany and Lacabanne, Colette Effect of Low-Temperature Plasma Jet on Thermal

Mailhes, Corinne

98

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack the key deriva- tion of IPsec

Paris-Sud XI, Université de

99

Practical Electromagnetic Template Attack on Pierre-Alain Fouque1  

E-Print Network [OSTI]

: HMAC is standardized (by ANSI, IETF, ISO and NIST) and widely deployed (e.g. SSL, TLS, SSH, IPsec the confidentiality of other Internet standards such as the Layer Two Tunneling Protocol (L2TP [27]) or to attack

Fouque, Pierre-Alain

100

Fatal Chimpanzee Attack in Loango National Park, Gabon  

Science Journals Connector (OSTI)

In some populations, chimpanzees engage in lethal aggression within and between social units. We report a fatal attack on an adult male chimpanzee at a new research site in Loango National Park, Gabon. We found a...

Christophe Boesch; Josephine Head; Nikki Tagg…

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

102

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS  

E-Print Network [OSTI]

network service during a prefix hijack attack. This thesis proposes a novel framework to provide defense against prefix hijacking which can be offered as a service by Content Distribution Networks and large Internet Service Providers. Our experiments...

Tadi, Krishna C.

2010-01-16T23:59:59.000Z

103

Tag Second-preimage Attack against -cipher Gaetan Leurent  

E-Print Network [OSTI]

The generalized birthday attack of Wagner is an attack against the m-sum problem: given m lists L1, L2, . . . , Lm of n-bit words, one find values l1 L1, . . . , lm Lm such that m i=1 lm = 0. If each list contains the sums of elements in L1, ...Lm/2 and Lm/2+1, ...Lm respectively, then sort LA and LB, and look

Paris-Sud XI, Université de

104

Modeling attacker-defender interactions in information networks.  

SciTech Connect (OSTI)

The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

Collins, Michael Joseph

2010-09-01T23:59:59.000Z

105

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan  

E-Print Network [OSTI]

Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

Bandettini, Peter A.

106

High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1, we have built a simulation model using OPNET simulation package, where the attack agents create as in the non-attacked condition. Keywords: Network Security, Denial-of-Service Attack, TCP Flooding, Router

Merat, Francis L.

107

Learn What a Heart Attack Feels Like--It Could Save Your Life.  

E-Print Network [OSTI]

Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

Bandettini, Peter A.

108

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars  

E-Print Network [OSTI]

to certain types of relay attacks 1 . Our attack allowed to open and start the car while the true distanceRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris.francillon, boris.danev, srdjan.capkun}@inf.ethz.ch Abstract We demonstrate relay attacks on Passive Keyless Entry

109

Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems  

SciTech Connect (OSTI)

Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

Bri Rolston

2005-09-01T23:59:59.000Z

110

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

111

A fundamental threat to quantum cryptography: gravitational attacks  

E-Print Network [OSTI]

An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

R. Plaga

2006-03-26T23:59:59.000Z

112

Watermarking Attack: Security of WSS Techniques Francois Cayre1  

E-Print Network [OSTI]

carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal. This approach is certainly not the only one but secret disclosure is a very powerful hack: it gives the access of the communication channel at the lowest distortion price to hack content. The key idea of this security analysis

Boyer, Edmond

113

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

114

Energy Attacks and Defense Techniques for Wireless Systems  

E-Print Network [OSTI]

systems, where energy is the most critical constraint to life- time and reliability. We for the first time propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden Security Keywords Wireless security, hardware Trojan, leakage energy 1. INTRODUCTION Wireless communication

Potkonjak, Miodrag

115

Generalized watermarking attack based on watermark estimation and perceptual remodulation  

E-Print Network [OSTI]

on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise image statistics to perform the best watermark removal or damage. The proposed attack is based and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; b) watermark alteration

Genève, Université de

116

Mobility and cooperation to thwart node capture attacks in MANETs  

Science Journals Connector (OSTI)

The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture ...

Mauro Conti; Roberto Di Pietro; Luigi V. Mancini; Alessandro Mei

2009-02-01T23:59:59.000Z

117

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony executed corresponding other actions (e.g., a payment gateway approves a charge to customer C's account

Stoller, Scott

118

A Bound on Attacks on Payment Protocols Scott D. Stoller  

E-Print Network [OSTI]

hypothesis of our reduction is the bounded support restriction (BSR), which states that in every history (i.eA Bound on Attacks on Payment Protocols Scott D. Stoller Computer Science Dept., SUNY at Stony- ously executed corresponding other actions (e.g., a payment gateway approves a charge to customer C

Stoller, Scott

119

Measuring Topological Robustness of Networks under Sustained Targeted Attacks  

Science Journals Connector (OSTI)

In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network ... Keywords: complex networks, robustness, social networks

Mahendra Piraveenan; Shahadat Uddin; Kon Shing Kenneth Chung

2012-08-01T23:59:59.000Z

120

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Defending Resource Depletion Attacks on Implantable Medical Devices  

E-Print Network [OSTI]

that could deplete IMD resources (e.g., battery power) quickly. The RD attacks could reduce the lifetime are powered by a non-rechargeable battery and replacing the battery requires surgery. Re-charging an IMD from an external RF electromagnetic source causes thermal effects in the organs and thus is not recommended. Unlike

Wu, Jie

122

Attacks on Physical-layer Identification Boris Danev  

E-Print Network [OSTI]

Attacks on Physical-layer Identification Boris Danev Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland bdanev@inf.ethz.ch Heinrich Luecken Comm. Tech. Laboratory ETH Zurich 8092 Zurich, Switzerland lueckenh@nari.ee.ethz.ch Srdjan Capkun Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland capkuns

Capkun, Srdjan

123

A Mechanism for Detecting Gray Hole Attacks on Synchrophasor Data  

E-Print Network [OSTI]

in smart grids [1]. Phasor measurement unit (PMU) or synchrophasor data serves to facilitate a number. This paper addresses the problem of securing PMU data against packet dropping or gray hole attacks in the network on PMU data can easily lead to the loss of observability of the system and render useless a number

Sikdar, Biplab

124

Combating Time Synchronization Attack: A Cross Layer Defense Mechanism  

E-Print Network [OSTI]

is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms- munication infrastructure [8]. Nowadays most researches on cyber physical system security focus on false data- ply enhancing the firmware of the monitoring devices. In addition, unlike a malicious data attack [10

Li, Husheng

125

Your Online Interests Pwned! A Pollution Attack Against Targeted Advertising  

E-Print Network [OSTI]

Your Online Interests ­ Pwned! A Pollution Attack Against Targeted Advertising Wei Meng Georgia in biasing ads towards the desired higher-paying advertisers; the polluter can influence up to 74% and 12; Profile Pollution; Ad Measurement 1. INTRODUCTION Online targeted advertising is one of the primary

Lee, Wenke

126

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

127

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......of dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...Support System for Nuclear Emergency Management...Hazard Release Risk Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

128

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......dirty bomb attacks. Also a compilation...connection with nuclear power plant accidents...with a terror attack. It is also...potentially security sensitive...System for Nuclear Emergency...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

129

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,age, sex, type of heart attack, and chronic diseases were

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

130

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 1  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereand location of the heart attack, and the specific chronicP S , Luft HS. Report on Heart Attack 1991-1993, Volume 1:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

131

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 2  

E-Print Network [OSTI]

age, sex, type of heart attack, and chronic diseases wereJA, Zach AP. Report on Heart Attack 1991-1993, Volume 2:California, Santa Barbara Heart Attack Clinical Panel Melvin

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

132

Third Report of the California Hospital Outcomes Project (1997): Report on Heart Attack, 1991-1993 Volume 3  

E-Print Network [OSTI]

18 N O P Q Report on Heart Attack Hospital Detailed Results,18 N O P Q Report on Heart Attack Hospital Detailed Results,HS, Romano PS. Report on Heart Attack, 1991-1993, Volume 3:

Romano, Patrick S; Luft, Harold S; Rainwater, Julie A

1997-01-01T23:59:59.000Z

133

An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten  

E-Print Network [OSTI]

An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut fË?ur Experimentelle

Diem, Claus

134

Governments' and Terrorists' Defense and Attack in a T-Period Game  

Science Journals Connector (OSTI)

We analyze how a government allocates its resources between attacking to downgrade a terrorist's resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a government's asset and defending ... Keywords: conflict, contest success function, dynamics, game theory, multiple-period game, terror capacity, terrorism, threat

Kjell Hausken; Jun Zhuang

2011-03-01T23:59:59.000Z

135

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato  

E-Print Network [OSTI]

An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister & Robert Zuccherato Entrust, Inc.mister,robert.zuccherato}@entrust.com Abstract. This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode for each block. Standard CFB mode encryption does not appear to be affected by this attack. It applies

136

An attack on CFB mode encryption as used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to determine 16 bits of any block of plaintext with about 215 oracle ... Keywords: OpenPGP, chosen-ciphertext attacks, cipher-feedback mode, encryption

Serge Mister; Robert Zuccherato

2005-08-01T23:59:59.000Z

137

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

138

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering  

E-Print Network [OSTI]

Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks without stuttering. The attack takes around O(285 ) CPU clocks with 278 keystream observations. Keywords

139

1. Introduction A man is rushed to a hospital in the throes of a heart attack.  

E-Print Network [OSTI]

1. Introduction A man is rushed to a hospital in the throes of a heart attack. The doctor needs when a heart attack patient is admitted, rank them accord- ing to their importance, and combine them heart attack patients according to risk using only a maxi- mum of three variables. If a patient has had

Cottrell, Garrison W.

140

WORKING PAPER N 2008 -12 Regional disparities in mortality by heart attack  

E-Print Network [OSTI]

WORKING PAPER N° 2008 - 12 Regional disparities in mortality by heart attack: Evidence from France disparities in mortality by heart attack: evidence from France Laurent Gobillony Carine Milcentz February 21 of patients treated in a hospital for a heart attack in France. These determinants can be some di

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY  

E-Print Network [OSTI]

Fish or Fish Oil in the Diet and Heart Attacks MAURICE E. STANSBY Introduction Research has shown more effective in reducing incidence of fatal heart attacks in heart patients than were any other can act to reduce blood platelet aggregation and thereby reduce the risk of heart attack. This ef

142

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer attacker intent, objectives, and strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ... Keywords: Attacker intent and strategy modeling, attack strategy inference, game theory

Peng Liu; Wanyu Zang; Meng Yu

2005-02-01T23:59:59.000Z

143

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

144

Ice slurry technology can save heart attack victims, surgery patients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

145

Argonne applied mathematicians use INCITE awards to attack energy problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

146

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

147

Secondary Prevention after Ischemic Stroke or Transient Ischemic Attack  

Science Journals Connector (OSTI)

...-pressure lowering depend on the particular class of antihypertensive drugs or simply on the antihypertensive effect of all such drugs remains controversial, although most of the evidence appears to support the latter. The PROGRESS trial showed a greater reduction in the risk of stroke and other vascular... This article reviews recommended strategies to reduce the risk of a subsequent stroke in patients with a history of transient ischemic attack (TIA) or stroke.

Davis S.M.; Donnan G.A.

2012-05-17T23:59:59.000Z

148

Factors contributing to resistance of cotton to pink bollworm attack  

E-Print Network [OSTI]

cage used in the anti?biosis s t u d y . . . . . . . . . . . . . . . . 5 ? 0 Appendix II. Figure 1* Pink bollworm emergence data, College Station, Texas ,19f?6-195>8. . 1^2 FACTORS CONTRIBUTING TO RESISTANCE OF COTTON TO PINK BOLLWORM ATTACK... hybrids resulting from crosses of aphid- resistant and susceptible cantaloupes were resistant and that the F2 progeny were three-fourths resistant and one- fourth susceptible* This typical Mendellan ratio indicates that resistance was due to a single...

Williams, Robert Kenneth

2013-10-04T23:59:59.000Z

149

Measurement of intergranular attack in stainless steel using ultrasonic energy  

DOE Patents [OSTI]

Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

1989-08-08T23:59:59.000Z

150

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon  

E-Print Network [OSTI]

Terror Attacks: Psychological Effects and Management of Fear The modules in this class will examine the psychological and emotional effects of terror attacks upon populations. Module 1 The Psychological Effects of Terror 1. Terror as a Strategy of Psychological Warfare against the Masses 2. Mental Health

Rhode Island, University of

151

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network [OSTI]

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

152

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow, your  

E-Print Network [OSTI]

PANIC ATTACKS QUICK! Your heart is pounding, your chest aches, you can't catch a breath or swallow you feel you may go crazy, pass out, or die. What's wrong? Heart attacks? You've fallen in love? Well, maybe. But what you may be experiencing is a panic attack. What is a panic attack? You may have had

Kasman, Alex

153

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

154

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

155

Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks  

SciTech Connect (OSTI)

A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

2009-05-15T23:59:59.000Z

156

E-Print Network 3.0 - attack cellular handling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information for use in a later attack. Lastly, ... Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 30 Breaking Up Is Hard To...

157

E-Print Network 3.0 - attacks security mechanisms Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 8 The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks College of Electrical and Summary: the real capability of the attacker and...

158

Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography  

E-Print Network [OSTI]

Semiconductor avalanche photodiodes (APDs) are commonly used for single photon detection in quantum key distribution. Recently, many attacks using bright illumination have been proposed to manipulate gated InGaAs APDs. In order to devise effective counter-measures, careful analysis of these attacks must be carried out to distinguish between incorrect operation and genuine loopholes. Here, we show that correctly-operated, gated APDs are immune to continuous-wave illumination attacks, while monitoring the photocurrent for anomalously high values is a straightforward counter-measure against attacks using temporally tailored light.

Z. L. Yuan; J. F. Dynes; A. J. Shields

2011-06-14T23:59:59.000Z

159

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network [OSTI]

are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table... are l, argetting at, detecting an attack as close to the origin of the attack as possible. Therefore, we need to ensnre that the signature processing time does not form a bottleneck. The LBIJ Cache searching mechanism is implemented using a hash table...

Ramanathan, Anu

2012-06-07T23:59:59.000Z

160

E-Print Network 3.0 - amyloid oxidative attack Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: amyloid oxidative attack Page: << < 1 2 3 4 5 > >> 1 Brain Research Reviews 43 (2003) 164178 www.elsevier.comlocatebrainresrev Summary: to...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Effect of Tricalcium Silicate Content on Expansion in Internal Sulfate Attack.  

E-Print Network [OSTI]

??The purpose of this study was to determine the cementitious parameters and placement temperature that impact internal sulfate attack in concrete. Concrete structures make up… (more)

Whitfield, Troy T.

2006-01-01T23:59:59.000Z

162

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

163

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

164

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network [OSTI]

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

165

The phenomenology of anger attacks and their association with past trauma.  

E-Print Network [OSTI]

??Anger attacks have been defined as acute episodes of intense anger that involve activation of autonomic arousal similar to that experienced in anxiety. The experience… (more)

Susljik, Ina

2010-01-01T23:59:59.000Z

166

Perceived Threat of a Heart Attack among Mexican Americans with Cardiovascular Disease Risk.  

E-Print Network [OSTI]

??Compared to the general population, Mexican Americans are at greater risk for cardiovascular disease (CVD) events, such as heart attack, due to the high prevalence… (more)

Florez, Elizabeth

2013-01-01T23:59:59.000Z

167

THE WILLINGNESS TO PAY FOR THE DETECTION AND TREATMENT OF VULNERABLE PLAQUE RELATED TO HEART ATTACKS.  

E-Print Network [OSTI]

??Recent medical studies have led cardiologists to revise theories regarding the cause of heart attacks. Rather than a gradual clogging of the arteries, eruption of… (more)

Ryan, Patricia L.

2007-01-01T23:59:59.000Z

168

E-Print Network 3.0 - attack host aphids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with generalist predators including Harmonia axyridis... beetle (Harmonia axyridis Pallas) attacking soybean aphid (Aphis glycines Matsumura) (Photo: D. A. Landis... of the...

169

E-Print Network 3.0 - angle of attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences 58 NAVIERSTOKES ANALYSIS OF SUBSONIC FLOWFIELDS OVER A MISSILE CONFIGURATION Summary: configuration are computed at high angles of attack ranging...

170

An Adaptive Selective Defense for Application Layer DDoS Attacks  

E-Print Network [OSTI]

, Capital One, Fifth29 Third Bank, BB&T, and HSBC. They have still been suffering attacks from a30 a foreign

Nigam, Vivek

171

Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) Higgs Bosons --H0  

E-Print Network [OSTI]

for the 2012 edition (URL: http://pdg.lbl.gov) Higgs Bosons -- H0 and H± , Searches for A REVIEW GOES HERE ­ Check our WWW List of Reviews STANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITS

172

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhäusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

173

Measurement of attacks and interferences with health care in conflict: validation of an incident reporting tool for attacks on and interferences with health care in eastern Burma  

Science Journals Connector (OSTI)

Attacks on health care in armed conflict and other civil disturbances, including those on health workers, health facilities, patients and health transports, represent a critical yet often overlooked violation ...

Rohini J Haar; Katherine HA Footer; Sonal Singh; Susan G Sherman…

2014-11-01T23:59:59.000Z

174

An ab initio investigation into the SN2 reaction: Frontside attack versus backside attack in the reaction of F? with CH3F  

Science Journals Connector (OSTI)

The energy hypersurface for the attack of fluoride ion on methyl fluoride has been explored with ab initio LCAO-SCF calculations at a split-valence basis set level. Transition states for frontside and backside at...

H. Bernhard Schlegel; Kurt Mislow; Fernando Bernardi…

1977-01-01T23:59:59.000Z

175

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

176

Sustaining Availability of Web Services under Distributed Denial of Service Attacks  

E-Print Network [OSTI]

;ective and practical countermeasure that allows a victim system or network to sustain high availabilitySustaining Availability of Web Services under Distributed Denial of Service Attacks #3; Jun Xu defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect

Vigoda, Eric

177

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks  

E-Print Network [OSTI]

Hellas, Greece Abstract. We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated Abuse% of the duration of the attack. 1 Introduction The Internet is a complicated distributed system that interconnects

California at Santa Barbara, University of

178

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS  

E-Print Network [OSTI]

THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES-LONG BEACH Gordon, P.usc.edu/create Report #05-012DRAFT #12;THE ECONOMIC IMPACT OF A TERRORIST ATTACK ON THE TWIN PORTS OF LOS ANGELES International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many

Wang, Hai

179

Digital image watermarking resistant to geometric and removal attacks in the wavelet transform domain  

E-Print Network [OSTI]

,2]. The watermark is embedded in the image additively, in the difficulty. g · Translation · Row and column removalDigital image watermarking resistant to geometric and removal attacks in the wavelet transform watermarking scheme resistant to various commonly used removal attacks. g p y watermark image will still

Qi, Xiaojun

180

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot  

E-Print Network [OSTI]

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

Bencsáth, Boldizsár

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

182

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

183

Rough Set Dependency Analysis in Evaluation Studies An Application in the Study of Repeated Heart Attacks  

E-Print Network [OSTI]

of repeated heart attacks. 1 Introduction In many cases it is not possible to obtain complete ­ or certain analysis can be applied to an investi- gation into the causes of repeated heart attacks con- ductedRough Set Dependency Analysis in Evaluation Studies ­ An Application in the Study of Repeated Heart

Düntsch, Ivo

184

Framework for using grocery data for early detection of bio-terrorism attacks  

E-Print Network [OSTI]

Framework for using grocery data for early detection of bio-terrorism attacks #3; Anna Goldenberg 15213 anya@cmu.edu October 16, 2001 Abstract Early detection of epidemics and bio-terrorism attacks. The main goal of this project is to investigate the possibility of detecting epidemics and bio-terrorism

Goldenberg, Anna

185

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack  

E-Print Network [OSTI]

High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H, the TCP poriion of the bandwidth can be protected. In simulation study, thefilter successfily blocked 99 SYN flooding may be blocked on the server side [1][2][6], the link bandwidth exhaustion attack must

Chao, Jonathan

186

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell  

E-Print Network [OSTI]

A new key recovery attack on the ANSI retail MAC Chris J. Mitchell Information Security Group circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail with the message. 1.1 The ANSI retail MAC The ANSI retail MAC scheme [1], otherwise known as CBC-MAC-Y or ISO

Mitchell, Chris

187

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network [OSTI]

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

188

Incentive-based modeling and inference of attacker intent, objectives, and strategies  

Science Journals Connector (OSTI)

Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predictive or proactive cyber defense, existing AIOS inference techniques are ad ... Keywords: attack prediction, computer security, game theory

Peng Liu; Wanyu Zang

2003-10-01T23:59:59.000Z

189

Real-Time Detection of Packet Drop Attacks on Synchrophasor Data  

E-Print Network [OSTI]

, NY, 12180 Abstract--The importance of phasor measurement unit (PMU) or synchrophasor data towardsReal-Time Detection of Packet Drop Attacks on Synchrophasor Data Seemita Pal, Biplab Sikdar and Joe attack, where the adversary arbitrarily drops packets with synchrophasor data. This paper develops a real

Sikdar, Biplab

190

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

191

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems  

E-Print Network [OSTI]

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-08-03T23:59:59.000Z

192

Scaling property and opinion model for interevent time of terrorism attack  

E-Print Network [OSTI]

The interevent time of terrorism attack events is investigated by empirical data and model analysis. Empirical evidence shows it follows a scale-free property. In order to understand the dynamic mechanism of such statistic feature, an opinion dynamic model with memory effect is proposed on a two-dimension lattice network. The model mainly highlights the role of individual social conformity and self-affirmation psychology. An attack event occurs when the order parameter of the system reaches a critical value. Ultimately, the model reproduces the same statistical property as the empirical data and gives a good understanding of terrorism attack.

Zhu, Jun-Fang; Wang, Bing-Hong

2009-01-01T23:59:59.000Z

193

RECOVERY OF URANIUM FROM ORE CONCENTRATES | OSTI, US Dept of...  

Office of Scientific and Technical Information (OSTI)

Re-direct Destination: Temp Data Fields Sheft, I.; Hyman, H.H.; Katz, J.J. Temp Data Storage 3: Argonne National Lab., Lemont, Ill' Short URL for this Page http:t.osti.gov3r7...

194

EIGEN COUPLING FACTORS AND PRINCIPAL COMPONENTS, THE THERMODYNAMIC...  

Office of Scientific and Technical Information (OSTI)

OF PIEZOELECTRICITY Re-direct Destination: Temp Data Fields Baerwald, H G Temp Data Storage 3: Sandia Corp., Albuquerque, N. Mex. Short URL for this Page http:t.osti.gov3rv...

195

THE MELTING OF HIGH PURITY URANIUM | OSTI, US Dept of Energy...  

Office of Scientific and Technical Information (OSTI)

OF HIGH PURITY URANIUM Re-direct Destination: Temp Data Fields Blumenthal, B. Temp Data Storage 3: Argonne National Lab., Lemont, Ill. Short URL for this Page http:t.osti.gov3rL...

196

A REPORT ON CRITICAL DIMENSIONS OF CYLINDERS | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

DIMENSIONS OF CYLINDERS Re-direct Destination: Temp Data Fields Keen, R. C. Temp Data Storage 3: Oak Ridge National Lab., TN (US) Short URL for this Page http:t.osti.gov3rH...

197

HRP-CP: SUMMARY OF DESIGN CRITERIA AND PURPOSES OF LOOP 3-SOLID...  

Office of Scientific and Technical Information (OSTI)

SEPARATOR LOOP Re-direct Destination: Temp Data Fields Carter, W. L. Temp Data Storage 3: Oak Ridge National Lab., TN (US) Short URL for this Page http:t.osti.gov3r6...

198

STRESS WAVE EMISSION AND FRACTURE OF PRESTRESSED CONCRETE REACTOR...  

Office of Scientific and Technical Information (OSTI)

PRESTRESSED CONCRETE REACTOR VESSEL MATERIALS. Re-direct Destination: Temp Data Fields Green, A.T. Temp Data Storage 3: Aerojet-General Corp., Sacramento, Calif. Short URL for...

199

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

200

E-Print Network 3.0 - attacks cancer cells Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cancer cells Search Powered by Explorit Topic List Advanced Search Sample search results for: attacks cancer cells Page: << < 1 2 3 4 5 > >> 1 Promising new drugs to treat cancer...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Optimal power grid protection through a defender–attacker–defender model  

Science Journals Connector (OSTI)

Abstract Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender–attacker–defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker–defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender–attacker–defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

Wei Yuan; Long Zhao; Bo Zeng

2014-01-01T23:59:59.000Z

202

E-Print Network 3.0 - attack model development Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: for the development of realistic models of DoS traffic, can be packaged as an automated tool to aid in rapid response... to detect and re- spond to attacks quickly....

203

An Attack on CFB Mode Encryption as Used by OpenPGP  

Science Journals Connector (OSTI)

This paper describes an adaptive chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP...15 oracle queries for the initial setup work and 215 oracle queries for each block. S...

Serge Mister; Robert Zuccherato

2006-01-01T23:59:59.000Z

204

E-Print Network 3.0 - acute asthma attack Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Is there a written, asthma action plan for each child in case of a severe asthma episode (attack)? Does the plan make... NatioNal Heart, luNg aNd Blood iNstitute National Asthma...

205

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks  

Science Journals Connector (OSTI)

Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and effective threat against services and applications running over the Internet. Its distributed and cooperative nature makes i...

Angelo Furfaro; Pasquale Pace; Andrea Parise…

2014-01-01T23:59:59.000Z

206

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

207

Antibiosis and Preferences as Factors in the Resistance of Certain Cottons to Pink Bollworm Attack  

E-Print Network [OSTI]

of resistance in this host-parasite relationship. There are sevezal economicaUy important paste attacking cotton. Resistant qualities have been demonstrated 1n certain varieties aga1nst sevezal of these pasta. Isely (1935) reported that cotton bo...

Reed, David Kent

1960-01-01T23:59:59.000Z

208

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Ettringite Fly ash Microstructural studies Sulfate attack a b s t r a c t A conventional solution in reducing of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

209

Proactive Intrusion Prevention and Response via Attack Graphs Steven Noel and Sushil Jajodia  

E-Print Network [OSTI]

triage and after-the-fact remediation. This chapter examines proactive methods of attack risk reduction for optimal countermeasures. This chapter describes the latest advances in an innovative proactive approach

Noel, Steven

210

Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases  

E-Print Network [OSTI]

In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

Won-Ho Kye; M. S. Kim

2005-08-03T23:59:59.000Z

211

A National Survey of Stress Reactions after the September 11, 2001, Terrorist Attacks  

Science Journals Connector (OSTI)

...population represented in the March 2001 Current Population Survey, our sample slightly overrepresented women, non-Hispanic whites, and persons with higher levels of education and household income, which is typical of samples selected by means of random-digit dialing. As a sensitivity analysis, we repeated... After the September 11 terrorist attacks, Americans experienced symptoms of psychological stress. This survey of U.S. adults performed just five days after the attacks quantifies the extent of the stress reactions.

Schuster M.A.; Stein B.D.; Jaycox L.H.

2001-11-15T23:59:59.000Z

212

Trojan-horse attacks threaten the security of practical quantum cryptography  

E-Print Network [OSTI]

A quantum key distribution system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID~Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's secret basis choice, and thus the raw key bit in the Scarani-Ac\\'in-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately in Clavis2 Eve's bright pulses have a side effect of causing high level of afterpulsing in Bob's single-photon detectors, resulting in a high quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

Nitin Jain; Elena Anisimova; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

2014-06-23T23:59:59.000Z

213

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

214

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

215

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

216

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

217

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack  

Science Journals Connector (OSTI)

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-06-24T23:59:59.000Z

218

Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack  

E-Print Network [OSTI]

The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection.

Jing-Zheng Huang; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Hong-Wei Li; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2013-02-01T23:59:59.000Z

219

Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation  

SciTech Connect (OSTI)

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. We show that - for protocols that use quantum channels of any dimension and completely characterize them by state tomography - the noise threshold for classical advantage distillation of a specific kind is substantially lower than the threshold for quantum entanglement distillation if the eavesdropper can perform powerful coherent attacks. In marked contrast, earlier investigations had shown that the thresholds are identical for incoherent attacks on the same classical distillation scheme. It remains an open question whether other schemes for classical advantage distillation have higher thresholds for coherent eavesdropping attacks.

Kaszlikowski, Dagomir; Lim, J.Y.; Englert, Berthold-Georg [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Kwek, L.C. [Department of Physics, National University of Singapore, Singapore 117542 (Singapore); National Institute of Education, Nanyang Technological University, Singapore 639798 (Singapore)

2005-10-15T23:59:59.000Z

220

Predicting the effect of climate change on wildfire behavior and initial attack success  

SciTech Connect (OSTI)

This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

2007-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems  

E-Print Network [OSTI]

Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2007-04-24T23:59:59.000Z

222

Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) f1(1285) IG (JPC ) = 0+(1 + +)  

E-Print Network [OSTI]

1278 ± 2 140 ARMSTRONG 89 OMEG 300 p p K K p p 1278 ± 2 ARMSTRONG 89G OMEG 85 + p 4p, p p 4p p 1280 SPEC 6.6 p p K K X 1285 ± 2 CHUNG 85 SPEC 8 - p N K K 1279 ± 2 604 ARMSTRONG 84 OMEG 85 + p K K p update for the 2012 edition (URL: http://pdg.lbl.gov) 1282 ± 4 ARMSTRONG 93C E760 p p 0 6 1270 ± 6 ±10

223

Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks Lan Wang, Qishi Wu, Yaoqing Liu  

E-Print Network [OSTI]

, yliu6}@memphis.edu Abstract--A recent trend in Internet denial-of-service attacks is to distribute of the Internet makes DoS defense a very challenging task. The goal of our work is to protect legitimate flows on hosts, as those hosts controlled by attackers are going to abuse the trust. In this paper, we flesh out

Wang, Lan

224

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States  

E-Print Network [OSTI]

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2

Wang, Hai

225

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 3, MAY 2014 1183 A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid Shan Liu, Bo Chen, Takis Zourntos, Deepa Kundur, and Karen Butler-Purry Abstract--This paper explores distributed smart grid attack strategies to destabilize power system

Kundur, Deepa

226

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Broader source: Energy.gov (indexed) [DOE]

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

227

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter  

E-Print Network [OSTI]

Combating False Data Injection Attacks in Smart Grid Using Kalman Filter Kebina Manandhar Dept of South Florida Email: yliu@cse.usf.edu Abstract--The security of Smart Grid, being one of the very important aspects of the Smart Grid system, is studied in this paper. We first discuss different pitfalls

Cao, Xiaojun (Matt)

228

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid  

E-Print Network [OSTI]

Risk-aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid Wenkai Wang, Qiao Cai Department, Stevens Institute of Technology, Hoboken, NJ 07030 Abstract--The power grid network is a complex of power grid in terms of cascading failures caused by node failures. Specifically, we define three metrics

Sun, Yan Lindsay

229

Dynamic pharming attacks and locked same-origin policies for web browsers  

Science Journals Connector (OSTI)

We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim's browser malicious Javascript, which then exploits DNS rebinding vulnerabilities and the name-based ... Keywords: pharming, same-origin policy, web authentication

Chris Karlof; Umesh Shankar; J. D. Tygar; David Wagner

2007-10-01T23:59:59.000Z

230

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

231

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

232

A Proposal of QLearning to Control the Attack of a 2D Robot Soccer Simulation Team  

Science Journals Connector (OSTI)

This document presents a novel approach to control the attack behavior of a team of simulated soccer playing robot of the Robocup 2D category. The presented approach modifies the behavior of each player only when in the state "controlling the ball". ... Keywords: Simulated robot soccer, machine learning, learning, Q-Learning algorithm

Jose Rodrigo Ferreira Neri; Maicon Rafael Zatelli; Carlos Henrique Farias dos Santos; Joao Alberto Fabro

2012-10-01T23:59:59.000Z

233

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve  

E-Print Network [OSTI]

Engineering, University College Cork Email: {andrewb,liam,francisc}@rennes.ucc.ie LIRMM, CNRS - Univ, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy. The protected double and add algorithm provides a simple solution to this problem but is costly in terms

Paris-Sud XI, Université de

234

The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC  

E-Print Network [OSTI]

Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

California at Davis, University of

235

"How many zombies do you know?" Using indirect survey methods to measure alien attacks and outbreaks  

E-Print Network [OSTI]

"How many zombies do you know?" Using indirect survey methods to measure alien attacks applicable to zombies or, for that matter, ghosts, aliens, angels, and other hard-to-reach entities; for example, what if your wife2 is actually a zombie or an alien and you are not aware of the fact. This 2

Gelman, Andrew

236

Trojan horse attack free fault-tolerant quantum key distribution protocols  

Science Journals Connector (OSTI)

This work proposes two quantum key distribution (QKD) protocols--each of which is robust under one kind of collective noises--collective-dephasing noise and collective-rotation noise. Due to the use of a new coding function which produces error-robust ... Keywords: Collective noise, GHZ state, Quantum cryptography, Quantum key distribution, Trojan horse attack

Chun-Wei Yang; Tzonelih Hwang

2014-03-01T23:59:59.000Z

237

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

238

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

disturbances. I. INTRODUCTION The smart grid promises increased capacity, security and re- liability through smart grid is challenging on several fronts. Asset own- ers must understand how to best prioritize reliability metrics are then employed to characterize the effects of the attack. Such approaches are valuable

Kundur, Deepa

239

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin  

E-Print Network [OSTI]

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O¨urich, Switzerland srdjan.capkun@inf.ethz.ch Abstract Bitcoin is a decentralized payment system that is based on Proof-of-Work. Bitcoin is currently gaining popularity as a digital currency; several businesses

240

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)  

E-Print Network [OSTI]

Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack Abstract A widespread security claim of the Bitcoin system, presented in the original Bitcoin white, as the distributed Bitcoin network is ideally supposed to be. Propagation of the at- tacker's block can

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin  

E-Print Network [OSTI]

Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

242

A Denial of Service Attack against Fair Computations using Bitcoin Deposits  

E-Print Network [OSTI]

A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman July 2014 Abstract Bitcoin supports complex transactions where the recipient of a transaction can") and Bentov and Kumaresan [3] (Protocol "BK") describe multi-party computation schemes in which Bitcoin

243

Quantifying the Attack Surface of a Web Application Thomas Heumann, Jorg Keller Sven Turpe  

E-Print Network [OSTI]

qualitative and quantitative indicators. We propose a multi- dimensional metric for the attack surface of web Introduction Measuring security properties is challenging yet necessary. The need to make informed decisions implies necessity, while the complex and sometimes counter-intuitive nature of security makes measuring

Keller, Jörg

244

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...a powdery form. Once...of poorly crystalline calcium silicate...and well-crystalline phases...containment of nuclear waste. Applying...conducted in accelerated conditions...attack. Chemical Reaction in...matrix, the chemical reactions with...because of aging of the binding...confirming the form of the...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

245

Scaling and saturation laws for the expansion of concrete exposed to sulfate attack  

Science Journals Connector (OSTI)

...was associated with the formation of ettringite crystals [Ca 6 Al 2 (OH) 12 (SO 4 ) 3...bacillus.” During sulfate attack, ettringite is often formed from the monosulfate...the aluminate ions in the formation of ettringite. The reaction to generate ettringite...

Paulo J. M. Monteiro

2006-01-01T23:59:59.000Z

246

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and lim- ited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

247

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen  

E-Print Network [OSTI]

Attacks on Message Stream Encryption Billy Bob Brumley and Jukka Valkonen Department.brumley,jukka.valkonen}@tkk.fi Abstract. Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited penetration rate of BitTorrent clients. Key words: BitTorrent, peer-to-peer protocols, stream ciphers, man

248

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore  

E-Print Network [OSTI]

ROM Design and Evaluation against Power Analysis Attack Huiyun Li, Simon Moore Computer Laboratory consumption of a normal ¢¡£ Read-only Memory(ROM) is simulated in HSPICE. Randomness is later inserted to mask the data-dependent information leakage. A dual-rail version of the ROM is then presented

Moore, Simon

249

Evaluating Network-Based DoS Attacks Under the Energy Consumption Perspective  

E-Print Network [OSTI]

with great opportunities for raising the target facility energy consumption and consequently its green house green, energy- sustainable computing paradigms has gained a lot of attention in both the researchEvaluating Network-Based DoS Attacks Under the Energy Consumption Perspective New security issues

Politècnica de Catalunya, Universitat

250

Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed  

E-Print Network [OSTI]

detection is an essential to minimize the damage of distributed denial of services (DDoS) attacks. However of the flooding traffic [13, 20]. Unfortunately, damages have already been caused when consequences are observed Experimentation and Test, in conjunction with USENIX Security Symposium, Boston, MA. August 6-7, 2007

Chen, Yu

251

Collaborative Change Detection of DDoS Attacks on Community and ISP Networks*  

E-Print Network [OSTI]

can work cooperatively to raise early warning to avoid catastrophic damages. This paper proposes) mechanism to enable early detection of DDoS attacks on community networks. We want to detect flooding. * Manuscript submitted on March 10, 2006 to the IEEE International Symposium on Collaborative Technologies

Chen, Yu

252

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Ning, Peng

253

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

A power grid is a complex system connecting electric power generators to consumers through power transmis the success of these attacks through simulation using IEEE test systems, and also discuss the practicality: K.6.5 [Management of Computing and Information Systems]: Security and Protection General Terms

Reiter, Michael

254

Practical Attacks on Proximity Identification Systems (Short Paper) Gerhard P. Hancke  

E-Print Network [OSTI]

of relay and eavesdropping attacks on RFID de- vices they don't always describe implementations or show 1 a contactless smart card system and simulated the distances achievable for readertoken and tokenreader communication in the context of a relay at- tack. As discussed in section 2, RFID is a general term for any near

Hancke, Gerhard

255

Distributed Internet-based Load Altering Attacks against Smart Power Grids  

E-Print Network [OSTI]

to cause circuite overflow or other malfunctions and damage the power system equipments. To gain insights-intrusion attempt may target any sector in a power system: generation, distribution and control, and consumption as shown in Fig. 1. A Type I cyber-attack targets power plants and aims in disrupting or taking over

Mohsenian-Rad, Hamed

256

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network [OSTI]

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Zhou, Yuanyuan

257

Alcohol Quantity and Type on Risk of Recurrent Gout Attacks: An Internet-based Case-crossover Study  

Science Journals Connector (OSTI)

AbstractObjectives Although beer and liquor have been associated with risk of incident gout, wine has not. Yet anecdotally, wine is thought to trigger gout attacks. Further, how much alcohol intake is needed to increase the risk of gout attack is not known. We examined the quantity and type of alcohol consumed on risk of recurrent gout attacks. Methods We conducted a prospective Internet-based case-crossover study in the US among participants with gout and who had at least one attack during the 1 year of follow-up. We evaluated the association of alcohol intake over the prior 24 hours as well as the type of alcoholic beverage with risk of recurrent gout attack, adjusting for potential time-varying confounders. Results This study included 724 participants with gout (78% men, mean age 54 years). There was a significant dose-response relationship between amount of alcohol consumption and risk of recurrent gout attacks (P gout attack was 1.36 (95% confidence interval [CI], 1.00-1.88) and 1.51 (95% CI, 1.09-2.09) times higher for >1-2 and >2-4 alcoholic beverages, respectively, compared with no alcohol consumption in the prior 24 hours. Consuming wine, beer, or liquor was each associated with an increased risk of gout attack. Conclusions Episodic alcohol consumption, regardless of type of alcoholic beverage, was associated with an increased risk of recurrent gout attacks, including potentially with moderate amounts. Individuals with gout should limit alcohol intake of all types to reduce the risk of recurrent gout attacks.

Tuhina Neogi; Clara Chen; Jingbo Niu; Christine Chaisson; David J. Hunter; Yuqing Zhang

2014-01-01T23:59:59.000Z

258

NRT is currently for adults (18 or older) and not approved for use in pregnancy or for persons with active chest pain or a recent heart attack.  

E-Print Network [OSTI]

with active chest pain or a recent heart attack. Nicotine Replacement Therapy What strength do I use? What

MacAdam, Keith

259

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems  

Science Journals Connector (OSTI)

Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely, the time-shift attack—against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (?4%) to break the security of the system. Eve’s success is due to the well-known detection efficiency loophole in the experimental testing of Bell’s inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.

Yi Zhao; Chi-Hang Fred Fung; Bing Qi; Christine Chen; Hoi-Kwong Lo

2008-10-28T23:59:59.000Z

260

Effect of aerodynamic uncertainties on unconventional lateral control at high angle of attack  

E-Print Network [OSTI]

EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATERAL CONTROL AT HIGH ANGLE OF ATTACK A Thesis by BOB GENSEN ELLER Submitted to the Graduate College of Texas ARM University in partial fulfillment of the requirement for the degree... of MASTER OF SCIENCE December 1987 Major Subject: Aerospace Engineering EFFECT OF AERODYNAMIC UNCERTAINTIES ON UNCONVENTIONAL LATEHAI CONTROL AT HIGH ANGI. E (&F A'I'TACK A Thesis by BOB GENSEN ELLER Approved as to style and content by: Donald T...

Eller, Bob Gensen

1987-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Protecting Buildings From a Biological or Chemical Attack: actions to take  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

262

Project liberty: a public health response to New Yorkers' mental health needs arising fromthe World Trade Center terrorist attacks  

Science Journals Connector (OSTI)

The September 11th terrorist attacks had a dramatic impact on the mental health of millions of Americans. The impact was particularly severe in New York City and surrounding areas within commuting distance of the...

Mr. Chip J. Felton MSW

2002-09-01T23:59:59.000Z

263

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network [OSTI]

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

264

Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking  

E-Print Network [OSTI]

and Ramamohanarao [18] propose a marking scheme wherein routers mark the packets with a adjusted probability. The packet marking probability is inversely proportional to the number of hops of the router from the source of the packet. The marking probability..., Peng, Leckie and Ramamohanarao [18] propose a mark- ing probability, pd = 1/d, where d is the distance (number of hops) of the router from the source of the packet. Assume an attack path of length k. By this we mean that there are k routers...

Dube, Raghav

2005-02-17T23:59:59.000Z

265

Dynamic safeguard assessment of terror attacks using system dynamics method for nuclear power plants  

Science Journals Connector (OSTI)

For the minimisation of the damage in possible terror attacks on the nuclear power plants and other nuclear facilities, a dynamic assessment is performed in the aspects of nuclear safeguard. The incidents against nuclear facilities are modelled by the time-step scenario. Several cases are explained for the illicit trafficking of radioactive material. The dynamic simulation is examined by the system dynamics method. In the modelling, there are three major models that include the nuclear insider terror, the reaction control and the nuclear forensic steps. The risk increases slowly and decreases rapidly in the result. This is the similar pattern of the September 2001 terror where many lives were lost.

Tae-Ho Woo; Un-Chul Lee; Yun-Il Kim

2010-01-01T23:59:59.000Z

266

Prediction of forces and moments on finned bodies at high angle of attack in transonic flow  

SciTech Connect (OSTI)

This report describes a theoretical method for the prediction of fin forces and moments on bodies at high angle of attack in subsonic and transonic flow. The body is assumed to be a circular cylinder with cruciform fins (or wings) of arbitrary planform. The body can have an arbitrary roll (or bank) angle, and each fin can have individual control deflection. The method combines a body vortex flow model and lifting surface theory to predict the normal force distribution over each fin surface. Extensive comparisons are made between theory and experiment for various planform fins. A description of the use of the computer program that implements the method is given.

Oberkampf, W. L.

1981-04-01T23:59:59.000Z

267

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect (OSTI)

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

268

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

Science Journals Connector (OSTI)

Background This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Methods Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. Results After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14–1.30), angina or CHD (OR = 1.29, 95% CI = 1.19–1.39) and heart attack (OR = 1.19, 95% CI = 1.10–1.30). Effects were present for both men and women. Conclusions Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Michael Hendryx; Keith J. Zullig

2009-01-01T23:59:59.000Z

269

Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks  

Science Journals Connector (OSTI)

Abstract Many scholars have applied complex network based models to investigate power grid vulnerability, but how effective are these models to capture the real performance is an interesting topic. This paper selects two typical complex network based models, including a purely topological model (PTM) and a betweenness based model (BBM), as well as a direct current power flow model (DCPFM), to simulate the topology-based and flow-based vulnerability of power grid under degree, betweenness, maximum traffic and importance based intentional attacks. The relationships of vulnerability results from different models are analyzed and discussed for model comparisons. Taking IEEE 300 power grid with line capacity set proportional to tolerant parameter tp as example, the results show that there exists a critical node attack intensity A I = 0.147 , above which the three models produce almost identical topology-based vulnerability results under each attack strategy at any t p ? 1 , while producing identical flow-based vulnerability results from PTM and DCPFM occurs at A I > 0.147 , and A I > 0.73 for BBM and DCPFM, which indicates that the PTM can better approach the DCPFM for flow-based vulnerability analysis under intentional attacks. Similar results are also found for intentional edge attacks and other power grids.

Min Ouyang; Lijing Zhao; Zhezhe Pan; Liu Hong

2014-01-01T23:59:59.000Z

270

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

271

The probability of Mark-I containment failure by melt-attack of the liner  

SciTech Connect (OSTI)

This report is a followup to the work presented in NUREG/CR-5423 addressing early failure of a BWR Mark I containment by melt attack of the liner, and it constitutes a part of the implementation of the Risk-Oriented Accident Analysis Methodology (ROAAM) employed therein. In particular, it expands the quantification to include four independent evaluations carried out at Rensselaer Polytechnic Institute, Argonne National Laboratories, Sandia National Laboratories and ANATECH, Inc. on the various portions of the phenomenology involved. These independent evaluations are included here as Parts II through V. The results, and their integration in Part I, demonstrate the substantial synergism and convergence necessary to recognize that the issue has been resolved.

Theofanous, T.G.; Yan, H. [California Univ., Santa Barbara, CA (United States). Dept. of Chemical and Nuclear Engineering; Podowski, M.Z. [Rensselaer Polytechnic Inst., Troy, NY (United States). Dept. of Nuclear Engineering and Engineering Physics] [and others

1993-11-01T23:59:59.000Z

272

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer (Agrilus planipennis Fairmaire) by Don Cipollini, a professor at Wright State University in Ohio  

E-Print Network [OSTI]

Issue: White fringetree (Chionanthus virginicus) has been found attacked by emerald ash borer been collected in areas where the abundance of dead ash trees suggest that local populations of EAB were high. · Widespread attack of white fringe trees have not been reported. · These findings indicate

Ginzel, Matthew

273

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, and Wenke Lee  

E-Print Network [OSTI]

Take This Personally: Pollution Attacks on Personalized Services Xinyu Xing, Wei Meng, Dan Doozan Web services depends on advertisement: they charge for prime screen real estate, and focus a great a pollution attack, that allows third parties to alter the customized content the services return to users who

Snoeren, Alex

274

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS -MANUSCRIPT 1 Taxonomy of Attacks for Agent-based Smart  

E-Print Network [OSTI]

, distributed and dynamic environment. Taxonomy of attacks is an effective tool in systematically classifying fuels or the energy is retrieved from the nuclear reaction, wind, water dams, the solar radiation, etc of agent-based smart grids as an effective tool to provide a structured framework. The proposed idea

Pota, Himanshu Roy

275

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

SciTech Connect (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

276

1460 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 7, JULY 2014 Data Framing Attack on State Estimation  

E-Print Network [OSTI]

attack, cyber security, smart grid. I. INTRODUCTION AFEATURE of any future smart grid is the promise such that the control center will remove useful measurements that would otherwise be used by the state estimator degree controlling only half of a critical set of measurements that are needed to make a system

Tong, Lang

277

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 645 Malicious Data Attacks on the Smart Grid Oliver Kosut, Member, IEEE, Liyan Jia, Robert J. Thomas, Life Fellow, IEEE, and Lang Tong grid security. I. INTRODUCTION F UTURE smart grids will likely to be more tightly inte- grated

Tong, Lang

278

Energy Losses Due to Vortex Shedding from the Lower Edge of a Vertical Plate Attacked by Surface Waves  

Science Journals Connector (OSTI)

...Vertical Plate Attacked by Surface Waves M. Stiassnie E. Naheer Irina Boguslavsky...The ratio between the flux of the energy taken out by the vortex generation process , and the incoming wave energy flux , is shown to be given by where...

1984-01-01T23:59:59.000Z

279

A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks  

SciTech Connect (OSTI)

The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

2008-02-01T23:59:59.000Z

280

Protecting grids from cross-domain attacks using security alert sharing mechanisms  

Science Journals Connector (OSTI)

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to as multi-administrative domain networks. Each domain might have its own security policy and may not want to share its security data with less-protected networks, making it more complex to ensure the security of such networks and protecting them from cross-domain attacks. We propose a Security Event Manager (SEM) called the Grid Security Operation Center (GSOC), which facilitates IT security managers in giving a view of the security of the whole grid network without compromising confidentiality of security data. To do so, GSOC provides a security evaluation of each administrative domain (AD) and a parametric security alert sharing scheme. Alert sharing can then be tuned in order to meet local security policy rules.

Raheel Hassan Syed; Maxime Syrame; Julien Bourgeois

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Surface attack on metals in the presence of liquid metals. Final report  

SciTech Connect (OSTI)

A study was undertaken to evaluate liquid metals as electrical collectors in contact with solid metal alloys. Surface attack of the liquid metal on the solid metal is expected to be a major challenge to the development of a credible system. Low-melting-temperature metals and alloys of the fusible type are to be utilized for a collector that will operate in the 200-500 F range, with emphasis towards the lower end. Solid metals have been selected for experimental work based on their electrical properties and minimal potential reaction with the candidate liquid-metal alloys. Material properties of both liquid and solid metals were reviewed to identify initial material combinations for evaluation. Thorough literature searches were conducted to obtain as much pertinent physical-property and metallurgical data as possible, prior to actual experimental work. Process and material modelling was adopted to select candidate materials for both solids and liquids. Consideration of practical requirements for the eventual collectors is an integral part of the study. Work effort has concentrated on apparatus construction, evaluation and a program of testing to obtain screening data on materials selected and the chosen test method. Results have identified limitations of the test unit design and maximum current loads under test conditions with experimental current collectors. Candidate electrode materials have been exposed in low-melting fusible alloys for direct-dissolution data.

Beal, R.E.

1986-04-10T23:59:59.000Z

282

Computational fluid dynamics study of wind turbine blade profiles at low Reynolds numbers for various angles of attack  

Science Journals Connector (OSTI)

Airfoil data are rarely available for Angles Of Attack (AOA) over the entire range of ±180°. This is unfortunate for the wind turbine designers because wind turbine airfoils do operate over this entire range. In this paper an attempt is made to study the lift and drag forces on a wind turbine blade at various sections and the effect of angle of attack on these forces. Aerodynamic simulations of the steady flow past two-dimensional wind-turbine blade-profiles developed by the National Renewable Energy Laboratory (NREL) at low Reynolds number will be performed. The aerodynamic simulation will be performed using Computational Fluid Dynamics (CFD) techniques. The governing equations used in the simulations are the Reynolds-Average-Navier-Stokes (RANS) equations. The simulations at different wind speeds will be performed on the S809 and the S826 blade profiles. The S826 blade profile is considered in this study because it is the most suitable blade profile for the wind conditions in Egypt in the site of Gulf El-Zayt on the red sea. Lift and drag forces along with the angle of attack are the important parameters in a wind turbine system. These parameters determine the efficiency of the wind turbine. The lift and drag forces are computed over the entire range of AOA of ±180° at low Reynolds numbers. The results of the analysis showed that the AOA between 3° and 8° have high Lift/Drag ratio regardless of the wind speed and the blade profile. The numerical results are compared with wind tunnel measurements at the available limited range of the angle of attack. In addition the numerical results are compared with the results obtained from the equations developed by Viterna and Janetzke for deep stall. The comparisons showed that the used CFD code can accurately predict the aerodynamic loads on the wind-turbine blades.

2012-01-01T23:59:59.000Z

283

PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY  

SciTech Connect (OSTI)

Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

Flach, G.

2009-12-11T23:59:59.000Z

284

Conclusions of the International RILEM TC 186-ISA Workshop on Internal Sulfate Attack and Delayed Ettringite Formation (4–6 September 2002, Villars, Switzerland)  

Science Journals Connector (OSTI)

A RILEM technical committee on Internal Sulfate Attack (TC 186-ISA) was established in 1996. In the ensuing years considerable research was carried out, which helped to clarify the scientific knowledge surroundin...

K. Scrivener; J. P. Skalny

2005-07-01T23:59:59.000Z

285

Appears in WEWoRC 2005 -Western European Workshop on Research in Cryptology, Lecture Notes in Informatics (LNI) P-74 (2005) 53-63. Gesellschaft fur Informatik. State Recovery Attacks on Pseudorandom Generators  

E-Print Network [OSTI]

Generators Andrey Sidorenko and Berry Schoenmakers Eindhoven University of Technology P.O. Box 513, 5600 MB an important class of attacks on pseudo- random generators. In this paper we analyze resistance of pseudorandom generators against these attacks in terms of concrete security. We show that security of the Blum- Micali

Schoenmakers, Berry

286

Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes  

SciTech Connect (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hall, Dr. Linda [ENVIRON International Corporation; Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

287

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect (OSTI)

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

288

Patterns of heart attacks  

E-Print Network [OSTI]

Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

Shenk, Kimberly N

2010-01-01T23:59:59.000Z

289

The Attack on Mead  

Science Journals Connector (OSTI)

...Kroeber was in such state-ments proposing the...and ultra-paradoxical states ofbrain activity, these...Studies in Polynesia and Micronesia: Stability and Change...physical anthropology in the United States-Hrdlicka, based at...

ROBERT I. LEVY

1983-05-20T23:59:59.000Z

290

Insects Attacking Vegetable Crops.  

E-Print Network [OSTI]

-brown or brownish- gray moths with wing expanse of about 1% inches and a small but prominent white dot near the center of each forewing. Larva. Young worms are pale green and have looping habits; older worms do not loop while crawling. The mature larva... hosts. Description: Adult. Forewings are grayish- brown with a pale spot near the middle of the front margin and have an expanse of about 1% inches. Hind wings are silvery-white with a darker front margin. Larva. Bright green with dark lateral...

Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

1964-01-01T23:59:59.000Z

291

Cementitious Barriers Partnership (CBP): Using the CBP Software Toolbox to Simulate Sulfate Attack and Carbonation of Concrete Structures - 13481  

SciTech Connect (OSTI)

The Cementitious Barriers Partnership (CBP) Project is a multi-disciplinary, multi-institutional collaboration supported by the U.S. Department of Energy Office of Tank Waste Management. The CBP project has developed a set of integrated modeling tools and leaching test methods to help improve understanding and prediction of the long-term hydraulic and chemical performance of cementitious materials used in nuclear applications. State-of-the-art modeling tools, including LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R}, were selected for their demonstrated abilities to simulate reactive transport and degradation in cementitious materials. The new U.S. Environmental Protection Agency leaching test methods based on the Leaching Environmental Assessment Framework (LEAF), now adopted as part of the SW-846 RCRA methods, have been used to help make the link between modeling and experiment. Although each of the CBP tools has demonstrated utility as a standalone product, coupling the models over relevant spatial and temporal solution domains can provide more accurate predictions of cementitious materials behavior over relevant periods of performance. The LeachXS{sup TM}/ORCHESTRA and STADIUM{sup R} models were first linked to the GoldSim Monte Carlo simulator to better and more easily characterize model uncertainties and as a means to coupling the models allowing linking to broader performance assessment evaluations that use CBP results for a source term. Two important degradation scenarios were selected for initial demonstration: sulfate ingress / attack and carbonation of cementitious materials. When sufficient sulfate is present in the pore solution external to a concrete barrier, sulfate can diffuse into the concrete, react with the concrete solid phases, and cause cracking that significantly changes the transport and structural properties of the concrete. The penetration of gaseous carbon dioxide within partially saturated concrete usually initiates a series of carbonation reactions with both dissolved ions and the hydrated cement paste. The carbonation process itself does not have a negative effect, per se, on the paste physical properties and can even result in reduced porosity and can help form a protective layer at the surface of concrete. However, carbonation has been shown to increase leaching of some constituents and can potentially have a detrimental effect on reinforced concrete structures by lowering pH to ca. 9 and de-passivating embedded steel (e.g. rebar) and accelerating corrosion, which are important processes related to high-level waste tank integrity and closure evaluations. The use of the CBP Software Toolbox to simulate these important degradation phenomena for both concrete vaults and high-level waste tanks are demonstrated in this paper. (authors)

Brown, K.G.; Kosson, D.S.; Garrabrants, A.C.; Sarkar, S. [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States)] [Vanderbilt University, School of Engineering, CRESP, Nashville, TN 37235 (United States); Flach, G.; Langton, C.; Smith, F.G.III; Burns, H. [Savannah River National Laboratory, Aiken, SC 29808 (United States)] [Savannah River National Laboratory, Aiken, SC 29808 (United States); Van der Sloot, H. [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands)] [Hans Van der Sloot Consultancy, Dorpsstraat 216, 1721BV Langedijk (Netherlands); Meeussen, J.C.L. [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands)] [Nuclear Research and Consultancy Group, Westerduinweg 3, Petten (Netherlands); Seignette, P.F.A.B. [Energy Research Center of The Netherlands, Petten (Netherlands)] [Energy Research Center of The Netherlands, Petten (Netherlands); Samson, E. [SIMCO Technologies, Inc., Quebec (Canada)] [SIMCO Technologies, Inc., Quebec (Canada); Mallick, P.; Suttora, L. [U.S. Department of Energy, Washington, DC (United States)] [U.S. Department of Energy, Washington, DC (United States); Esh, D.; Fuhrmann, M.; Philip, J. [U.S. Nuclear Regulatory Commission, Washington, DC (United States)] [U.S. Nuclear Regulatory Commission, Washington, DC (United States)

2013-07-01T23:59:59.000Z

292

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

SciTech Connect (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

293

The effect of walking speed and avatars on Redirected Walking Master Thesis  

E-Print Network [OSTI]

.1 Method 18 3.2 Experiment 19 3.2.1 Hardware & Software 19 3.2.2 Visual Setup 20 3.2.3 Experiment Design 22.1 Method 56 5.2 Experiment 57 5.2.1 Hardware & Software 57 5.2.2 Visual Setup 59 5.2.3 Specific avatars life when passing people. To evaluate these effects, we first had to develop a free-walking controller

294

Service Portability Why http redirect is the model for the future  

E-Print Network [OSTI]

address of sally@company.com will be de- livered to a mail server controlled by company.com, and if Sally moves to a new company there is no way for this email address to follow her there. Second, despite years. Search services do an amazing job with web pages, but for other services they perfor

295

Phage auxiliary metabolic genes and the redirection of cyanobacterial host carbon metabolism  

Science Journals Connector (OSTI)

...pnas.1102164108 Luke R. Thompson Qinglu Zeng Libusha Kelly Katherine H. Huang Alexander U. Singer JoAnne Stubbe Sallie W. Chisholm...Benson DA, Karsch-Mizrachi I, Lipman DJ, Ostell J, Wheeler DL (2008) GenBank. Nucleic Acids Res 36(database issue...

Luke R. Thompson; Qinglu Zeng; Libusha Kelly; Katherine H. Huang; Alexander U. Singer; JoAnne Stubbe; Sallie W. Chisholm

2011-01-01T23:59:59.000Z

296

PDGF-Receptor ?-Targeted Adenovirus Redirects Gene Transfer from Hepatocytes to Activated Stellate Cells  

Science Journals Connector (OSTI)

Department of Gastroenterology and Hepatology, Department of Therapeutic Gene Modulation, and Department of Pharmacokinetics and Drug Delivery, University of Groningen and University Medical Center Groningen, Groningen, The Netherlands ... Mailing address: Department of Therapeutic Gene Modulation, University of Groningen, Ant. ... Deusinglaan 1, 9713 AV Groningen, The Netherlands. ...

Marieke H. Schoemaker; Marianne G. Rots; Leonie Beljaars; Arjen Y. Ypma; Peter L. M. Jansen; Klaas Poelstra; Han Moshage; Hidde J. Haisma

2008-01-25T23:59:59.000Z

297

Redirecting Specificity of T-Cell Populations For CD19 Using the Sleeping Beauty System  

Science Journals Connector (OSTI)

...operating in compliance with current good manufacturing practice (cGMP) for phase I/II trials...to both do not generally seem to be additive. In preliminary experiments, we too...Ausubel L, Gutierrez M, et al. Manufacturing of gene-modified cytotoxic T lymphocytes...

Harjeet Singh; Pallavi R. Manuri; Simon Olivares; Navid Dara; Margaret J. Dawson; Helen Huls; Perry B. Hackett; Donald B. Kohn; Elizabeth J. Shpall; Richard E. Champlin; and Laurence J.N. Cooper

2008-04-15T23:59:59.000Z

298

Redirecting Reductant Flux into Hydrogen Production via Metabolic Engineering of Fermentative Carbon Metabolism in a Cyanobacterium  

Science Journals Connector (OSTI)

...observed to evolve hydrogen in the dark at maximum rates approaching...activity. Int. J. Hydrogen Energy 33: 2014-2022. 4 Carrieri...by biological processes: a survey of literature. Int. J. Hydrogen Energy 26: 13-28. 9 Datta, R...

Kelsey McNeely; Yu Xu; Nick Bennette; Donald A. Bryant; G. Charles Dismukes

2010-06-11T23:59:59.000Z

299

Aerodynamic characteristics of seven symmetrical airfoil sections through 180-degree angle of attack for use in aerodynamic analysis of vertical axis wind turbines  

SciTech Connect (OSTI)

When work began on the Darrieus vertical axis wind turbine (VAWT) program at Sandia National Laboratories, it was recognized that there was a paucity of symmetrical airfoil data needed to describe the aerodynamics of turbine blades. Curved-bladed Darrieus turbines operate at local Reynolds numbers (Re) and angles of attack (..cap alpha..) seldom encountered in aeronautical applications. This report describes (1) a wind tunnel test series conducted at moderate values of Re in which 0 less than or equal to ..cap alpha.. less than or equal to 180/sup 0/ force and moment data were obtained for four symmetrical blade-candidate airfoil sections (NACA-0009, -0012, -0012H, and -0015), and (2) how an airfoil property synthesizer code can be used to extend the measured properties to arbitrary values of Re (10/sup 4/ less than or equal to Re less than or equal to 10/sup 7/) and to certain other section profiles (NACA-0018, -0021, -0025).

Sheldahl, R E; Klimas, P C

1981-03-01T23:59:59.000Z

300

Nitric Oxide and Oxygen Radical Attack on GDP-Dissociation Inhibitor 2 (GDI-2) in Spinal Cord Injury of the Rat  

Science Journals Connector (OSTI)

Nitric Oxide and Oxygen Radical Attack on GDP-Dissociation Inhibitor 2 (GDI-2) in Spinal Cord Injury of the Rat ... Herein, mass spectrometry unambiguously identified GDP-dissociation inhibitor-2 (GDI-2) in SCI with post-translational modifications of 3-aminotyrosine (8 h post-injury) and an acrolein adduct of GDI-2 (72 h post-injury). ... Protein profiling in SCI of the rat revealed that, at 8 h following the traumatic lesion, levels of a signalling protein, GDP-dissociation inhibitor-2 protein (GDI-2) (synonym:? Rab GDP dissociation inhibitor beta), were increased about 3-fold, and we therefore decided to use this potentially important signalling structure to study the presence of oxidation- and nitration-induced PTMs in SCI. ...

Julius Paul Pradeep John; Oliver Pintsov; Alexander Petter-Puchner; Heinz Redl; Arnold Pollak; Wei-Qiang Chen; Gert Lubec

2007-02-22T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Coddington, J. and C. Sobrevila. 1987. Web manipulation and two stereotyped attack behaviors in the ogre-faced spider Deinopis spinosus Marx (Araneae, Deinopidae). J. Arachnol.. 15:213-225.  

E-Print Network [OSTI]

Coddington, J. and C. Sobrevila. 1987. Web manipulation and two stereotyped attack behaviors in the ogre-faced spider Deinopis spinosus Marx (Araneae, Deinopidae). J. Arachnol.. 15:213-225. WEB" strikes the spider expands the web downward and forward against the substrate; these strikes capture

Mathis, Wayne N.

302

IEEE Computer Society URL htt // k h d j /  

E-Print Network [OSTI]

grain tasks acro-tasks (MTs) Block of Pseudo Assignments (BPA): Basic Block (BB)Block of Pseudo Assignments (BPA): Basic Block (BB) Repetition Block (RB) : natural loop Subroutine Block (SB): subroutine( ) BPA Near fine grain parallelization BPA RB SB Program RB Loop level parallelization Near fine grain

Kasahara, Hironori

303

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

304

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

305

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M.R. Albrecht1, P. Farshim2, K.G. Paterson2, and G.J. Watson3  

E-Print Network [OSTI]

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M.R. Albrecht1, P. Farshim2, K.G. Paterson2, and G.J. Watson3 1 INRIA, Paris-Rocquencourt Center, SALSA Project UPMC Univ Paris 06, UMR 7606, Canada T2N 1N4 gjwatson@ucalgary.ca Abstract. Bellare and Kohno introduced a formal framework

306

RAPID/Overview/Geothermal/Exploration/Idaho | Open Energy Information  

Open Energy Info (EERE)

< RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationIdaho) Redirect page Jump to: navigation, search REDIRECT RAPID...

307

RAPID/Overview/Geothermal/Exploration/Oregon | Open Energy Information  

Open Energy Info (EERE)

Oregon < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationOregon) Redirect page Jump to: navigation, search REDIRECT...

308

RAPID/Overview/Geothermal/Exploration/Colorado | Open Energy...  

Open Energy Info (EERE)

Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationColorado) Redirect page Jump to: navigation, search REDIRECT RAPIDGeothermal...

309

RAPID/Overview/Geothermal/Exploration/Nevada | Open Energy Information  

Open Energy Info (EERE)

< RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationNevada) Redirect page Jump to: navigation, search REDIRECT RAPID...

310

RAPID/Overview/Geothermal/Exploration/Texas | Open Energy Information  

Open Energy Info (EERE)

< RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationTexas) Redirect page Jump to: navigation, search REDIRECT RAPID...

311

RAPID/Overview/Geothermal/Exploration/Montana | Open Energy Informatio...  

Open Energy Info (EERE)

Montana < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationMontana) Redirect page Jump to: navigation, search REDIRECT...

312

Insect Pests Attacking Truck Crops  

E-Print Network [OSTI]

country store can sell him anything fro111 , a sprinliling pot to a squirt gun, with the fullest assurance that "they will do just as well." Let is be understood once for all that this Dcpart- ment urges and recommends spraying and not sprinkling... or kerosene emulsion, must be used and actually sprayed upon their bodies to be effective. Hence in any proposed insect warfare it is important to first determine the character of the mouth parts, which, therefore, also largely determine the manner...

Mally, Frederick W. (Frederick William)

1902-01-01T23:59:59.000Z

313

Smart Grid Data Integrity Attack  

E-Print Network [OSTI]

Measurement Units Placement for Power System State Estimation: A Greedy Approach,” IEEE Power and Energy

Poolla, Kameshwar

2012-01-01T23:59:59.000Z

314

PUBLISHED ONLINE: 26 FEBRUARY 2012 | DOI: 10.1038/NPHYS2239 Multistep redirection by cross-beam power  

E-Print Network [OSTI]

demonstrated this in a hohlraum plasma at the National Ignition Facility (NIF) at Lawrence Livermore National perturbation, which allows control of its proximity to the ion-acoustic wave resonance 1Lawrence Livermore ranging from around 0.2 PW cm-2 (such as encountered on the NIF)2 and above. One example

Loss, Daniel

315

A Geographic Redirection Service for On-line Games Chris Chambers Wu-chi Feng Wu-chang Feng  

E-Print Network [OSTI]

@OHSU {chambers,wuchi,wuchang}@cse.ogi.edu Debanjan Saha IBM Research dsaha@us.ibm.com ABSTRACT For many on Shooters, fre- quently utilize a widely distributed server model. For the most popular FPS at this time, Counter-Strike (a variant of Half-Life), there are more than 30,000 registered servers running at any

316

LEDSGP/sector/Agriculture | Open Energy Information  

Open Energy Info (EERE)

LEDSGP(Redirected from Agriculture Work Space) Redirect page Jump to: navigation, search REDIRECT LEDSGPsectorAFOLU Retrieved from "http:en.openei.orgwindex.php?titleLEDSGP...

317

RAPID/Overview/BulkTransmission/Siting/Colorado | Open Energy...  

Open Energy Info (EERE)

Colorado < RAPID | Overview | BulkTransmission | Siting(Redirected from RAPIDAtlasBulkTransmissionSitingColorado) Redirect page Jump to: navigation, search REDIRECT...

318

RAPID/Overview/Geothermal/Exploration/Utah | Open Energy Information  

Open Energy Info (EERE)

Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationUtah) Redirect page Jump to: navigation, search REDIRECT RAPIDGeothermalExploration...

319

Engineering On-Chip Thermal Attacks  

E-Print Network [OSTI]

we make it? · Temperature profile on an FPGA over 1 day · On-chip temperature measurement · We 2006 #12;Can information be more covert? · Detecting Temperature events on an FPGA · SNR of 24-hour ­Processing load · Digital RO cannot be alias-free tTs fs 2fs f #12;Our communications system f f Heat Source

Schaumont, Patrick

320

An online attack against Wiesner's quantum money  

E-Print Network [OSTI]

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Andrew Lutomirski

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Virus structure: Crystallography attacks the cold  

Science Journals Connector (OSTI)

... unique reflections, were collected using a synchrotron X-ray source - the Cornell High Energy Synchroton Source. Synchrotron radiation is an extremely bright source of X rays. X-ray exposure ...

Don C. Wiley

1985-09-12T23:59:59.000Z

322

Optimal Interdiction of Attack Plans Joshua Letchford  

E-Print Network [OSTI]

Economics, Security, Algorithms Keywords Game theory, security, planning, plan interdiction 1. INTRODUCTION

Vorobeychik, Eugene

323

Analysis and Defense of Emerging Malware Attacks  

E-Print Network [OSTI]

propose a new scheme, which is named as informed active probing, for large-scale P2P malware analysis and detection. In further, our internet-wide evaluation shows our active probing scheme can successfully detect malicious P2P malware and its...

Xu, Zhaoyan

2014-05-28T23:59:59.000Z

324

WINTER 2009 WhenFungiAttack  

E-Print Network [OSTI]

DepartmentofAppliedEconomics DepartmentHead:BrianBuhr Division of Bioresources and Bioenergy DepartmentofHead:CarolIshimaru Department of Agricultural Education (jointlywithCollegeofEducationandHumanDevelopment) Division for

Weiblen, George D

325

Bomb tests attack the food chain  

SciTech Connect (OSTI)

Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

Ruff, T. (Monash Medical School, Melbourne (Australia))

1990-03-01T23:59:59.000Z

326

Japan Prize: Dutch winner attacks US policy  

Science Journals Connector (OSTI)

... a memorial lecture on artificial organs by one of this year's winners of the Japan Prize, ... Prize, Japan's answer to the Nobel Prize, would one expect to see pictures of aircraft ...

David Swinbanks

1986-05-22T23:59:59.000Z

327

Performance Evaluation of URL Routing for Content Distribution Networks Zornitza Genova Prodanoff  

E-Print Network [OSTI]

, and Dr. Miguel Labrador. I would also like to thank Loraine Christensen for spending the time to help me

Prodanoff, Zornitza Genova

328

Escala de Clima Espacial de NOAA URL: www.sec.noaa.gov January 10, 2001  

E-Print Network [OSTI]

redes de trasmisión pueden colapsar, y los transformadores pueden llegar a sufrir daños. Operaciones de, problemas con los enlaces y el seguimiento de satélites. Otros sistemas: La corriente inducida en las redes eléctrica en las redes de distribución de combustibles afecta las medidas preventivas, hay bloqueos

329

URL-Enhanced Adaptive Page-Refresh Models Robert Warren, Dana Wilkinson, Alejandro Lopez-Ortiz  

E-Print Network [OSTI]

, such as web page mirroring [5] and unreachable portions of the net (Dark-Net [23]), compound the problem of a web page. This has appli- cations for more efficient and frequent crawling, in the case of search, refresh rate, rate of change, web evolution, web pages 1 Introduction The web continues to grow at a rapid

Waterloo, University of

330

ESAIM: Control, Optimisation and Calculus of Variations URL: http://www.emath.fr/cocv/  

E-Print Network [OSTI]

, pollution detection, estimation and map-building of partially known or unknown environments. A fundamental Department of Mechanical and Environmental Engineering, University of California, Santa Barbara, Engineering Building II, Santa Barbara, California, 93106, USA; e-mail: {smartine,bullo}@engr.ucsb.edu c EDP Sciences

Bullo, Francesco

331

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

332

V-053: Adobe Shockwave player installs Xtras without prompting | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe Shockwave player installs Xtras without prompting 3: Adobe Shockwave player installs Xtras without prompting V-053: Adobe Shockwave player installs Xtras without prompting December 24, 2012 - 12:15am Addthis PROBLEM: Adobe Shockwave player installs Xtras without prompting PLATFORM: Adobe Shockwave Player ABSTRACT: A vulnerability was reported in Adobe Shockwave. REFERENCE LINKS: Vulnerability Note VU#519137 SecurityTracker Alert ID: 1027903 Bugtraq ID: 56972 CVE-2012-6271 IMPACT ASSESSMENT: Medium DISCUSSION: Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra. IMPACT: By convincing a user to view a specially crafted Shockwave content, an attacker may be able to execute arbitrary code with the privileges of the

333

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

334

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2011 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle filenames with meta characters during tab expansions. This may allow a context-dependent attacker to use a crafted filename to trick another user to execute arbitrary commands, which may allow the attacker to gain elevated privileges. April 4, 2011 T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

335

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

336

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

337

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

338

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

339

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

340

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-596: 0-Day Windows Network Interception Configuration Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: 0-Day Windows Network Interception Configuration 6: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. reference LINKS: InfoSec Institute - SLAAC Attack Cisco Threat Comparison and Best-Practice White Paper IMPACT ASSESSMENT: High

342

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

343

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

11 - 920 of 29,416 results. 11 - 920 of 29,416 results. Article U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. http://energy.gov/cio/articles/u-222-apple-safari-bugs-let-remote-users-execute-arbitrary-code-spoof-url-address-bar Download EA-1523: Finding of No Significant Impact Modifications at the Strategic Petroleum Reserve's West Hackberry Raw Water Intake Structure Site, Calcasieu Parish, Louisiana http://energy.gov/nepa/downloads/ea-1523-finding-no-significant-impact Page EA-1211: Relocation and Storage of Isotopic Heat Sources, Hanford Site, Richland, Washington This EA evaluates the environmental impacts for the proposal for relocation

344

A note aboutWeb sites All URLs in this document were current at the time of publication.  

E-Print Network [OSTI]

on the basis of age, race, color, religion, sex, national origin or ancestry, sexual orientation, arrest trade names, commercial products, or companies constitute endorsement or recom mendation for use information system database laye

Sheridan, Jennifer

345

ARPKI: Attack Resilient Public-Key Infrastructure David Basin  

E-Print Network [OSTI]

proposals include Certificate Transparency (CT) [18], which adds ac- countability by using log servers

Basin, David

346

Optimal counterfeiting attacks and generalizations for Wiesner's quantum money  

E-Print Network [OSTI]

We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank's test for validity, is (3/4)^n for n being the number of qubits used for each note. Generalizations in which other ensembles of states are substituted for the one considered by Wiesner are also discussed, including a scheme recently proposed by Pastawski, Yao, Jiang, Lukin, and Cirac, as well as schemes based on higher dimensional quantum systems. In addition, we introduce a variant of Wiesner's quantum money in which the verification protocol for bank notes involves only classical communication with the bank. We show that the optimal probability with which a counterfeiter can succeed in two independent verification attempts, given access to a single valid n-qubit bank note, is (3/4+sqrt(2)/8)^n. We also analyze extensions of this variant to higher-dimensional schemes.

Abel Molina; Thomas Vidick; John Watrous

2012-02-17T23:59:59.000Z

347

Optimal counterfeiting attacks and generalizations for Wiesner's quantum money  

E-Print Network [OSTI]

We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank's test for validity, is (3/4)^n for n being the number of qubits used for each note. Generalizations in which other ensembles of states are substituted for the one considered by Wiesner are also discussed, including a scheme recently proposed by Pastawski, Yao, Jiang, Lukin, and Cirac, as well as schemes based on higher dimensional quantum systems. In addition, we introduce a variant of Wiesner's quantum money in which the verification protocol for bank notes involves only classical communication with the bank. We show that the optimal probability with which a counterfeiter can succeed in two independent verification attempts, given access to a single valid n-qubit bank note, is (3/4+sqrt(2)/8)^n. We...

Molina, Abel; Watrous, John

2012-01-01T23:59:59.000Z

348

A Study on Wi-Fi Hacking Attack Using Web  

Science Journals Connector (OSTI)

Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. The...

Jin-Young Song; Dea-Woo Park

2011-01-01T23:59:59.000Z

349

The Attack Back Mechanism: An Efficient Back-Hacking Technique  

Science Journals Connector (OSTI)

In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations ... espionage. The global losses due to internet hacking

Abhishek Joshi; Rayan H. Goudar

2014-01-01T23:59:59.000Z

350

Vulnerability analysis of biometric systems using attack trees.  

E-Print Network [OSTI]

??Designing a secure authentication system is a challenging task, as many factors must be taken into consideration. Applications of biometric systems typically require robust system… (more)

Speicher, Denis.

2006-01-01T23:59:59.000Z

351

The Middle East under Malware Attack Dissecting Cyber Weapons  

E-Print Network [OSTI]

on Natanz uranium enrichment facilities is believed to be the main reason of the (at least) 3 years delay

Almulhem, Ahmad

352

Attacks on computers: Congressional hearings and pending legislation  

SciTech Connect (OSTI)

During the First Session of the 98th Congress, several days of hearings were held on the activities of computer enthusiasts including the Milwaukee 414s and others. The First Session also saw the introduction in the House of six bills dealing with various aspects and computer crime. A summary of those hearings, along with a summary of the pending computer crime bills, will be presented.

Bailey, D.

1984-01-01T23:59:59.000Z

353

Stealthy Poisoning Attacks on PCA-based Anomaly Detectors  

E-Print Network [OSTI]

, Principal Components Analysis, Adversarial Learning 1. INTRODUCTION We explore vulnerabilities associated. Ringberg et al. showed that routing outages can pollute the normal subspace [4]; a kind of non-adversarial anomalies in backbone networks. To assess these detectors' susceptibility to adversaries wishing to evade

Tygar, Doug

354

Defense against Primary User Emulation Attacks in Cognitive Radio Networks  

E-Print Network [OSTI]

--Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands while causing of the spectrum is allocated to licensed users for exclusive use. Recognizing the significance of the spectrum

355

Denial-of-Service Attacks on Dynamic Spectrum Access Networks  

E-Print Network [OSTI]

radios was opportunistic utilization of licensed spec- trum bands. Traditionally, the spectrum has been Abstract-- Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wire- less applications since cognitive radios have the potential to utilize the idle licensed

Subbalakshmi , K.P. "Suba"

356

Banking Security: Attacks and Defences Steven J. Murdoch  

E-Print Network [OSTI]

is still a serious problem in the UK Initially (2005), PEDs were tampered on a small scale and installed;Counterfeit fraud mainly exploited backwards compatibility features · Upgrading to Chip & PIN was too complex a full copy of the magstrip · Simplifies issuer upgrade · Chip transactions can be processed by systems

Doran, Simon J.

357

Attacks in Stream Ciphers: A Survey Gustavo Banegas  

E-Print Network [OSTI]

: ECB(Eletronic codebook, CBC(Cipher-block Chaining), CFB(Cipher feedback) and OFB(Output feedback). We

358

Anatomy of an Attack Securing the eCampus 2011  

E-Print Network [OSTI]

of Crimeware: Bakasoftware Hack · Pandora Software = Bakasoftware ­ A Russian "company of Crimeware: Bakasoftware Hack · Bakasoftware Administration site hacked · One affiliate

359

A Practical Attack against Knapsack based Hash Functions  

E-Print Network [OSTI]

and Louis Granboulan 2 1 DGA/CELAR 2 ENS/LIENS Abstract. In this paper, we show that lattice reduction­Zolatarev algorithm [7]. This approach, which enables us to focus on the reduction of collision search to lattice knapsacks of compression rate ø . These knapsack are then considered modulo 2 m . In order to search

Granboulan, Louis

360

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network [OSTI]

the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical...

Liu, Shan

2013-02-11T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Attacking Tor through Unpopular Ports Muhammad Aliyu Sulaiman  

E-Print Network [OSTI]

Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia muhalisu@kfupm.edu.sa Sami Zhioua Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran of relays (Tor node and Tor relay are used interchangeably in this paper). No one of these The authors would

Almulhem, Ahmad

362

Optimal Response to Epidemics and Cyber Attacks in Networks  

E-Print Network [OSTI]

Jan 18, 2012 ... Keywords: Nonlinear integer programming, cutting planes, network optimization, probability bounds, cybersecurity, epidemiology. Category 1: ...

Noam Goldberg

2012-01-18T23:59:59.000Z

363

Cache Timing Attacks on eStream Finalists Erik Zenner  

E-Print Network [OSTI]

Workings (1) Motivation: Loading data from cache is much faster than loading data from RAM (by a factor mod n). If not, load data into cache address (a mod n). Load data item directly from cache. Similarly loading a piece of data to cache, load the whole block that surrounds it. Erik Zenner (DTU-MAT) Cache

Zenner, Erik

364

Physics and Calculus of Countercity and Counterforce Nuclear Attacks  

Science Journals Connector (OSTI)

...lerc tin the citv. isuich warhead It lands. a few tens of Although01...proportional to the size of the warhead, extend to great distances...thermal effects, it will remain intact unless the weapon lands in...Con-sequently, the ability of a warhead to destroy a silo depends strongly...

Kosta Tsipis

1975-02-07T23:59:59.000Z

365

A Security Attack and Defense in the Grid Environment  

Science Journals Connector (OSTI)

Programs in execution have long been considered to be immutable objects. Object code and libraries are emitted by the compiler, linked and then executed; any changes to the program require revisiting the compile ...

Barton P. Miller

2002-01-01T23:59:59.000Z

366

The Mastermind Attack on Genomic Data Michael T. Goodrich  

E-Print Network [OSTI]

]. Moreover, a project to fully sequence 1,000 human genomes in the next few years is already under way [24 diploid human genomes will be economically affordable. The milestone of the first human genome sequence draft in 2001 [12], [39] has recently been followed by the first diploid human genome sequence [26

Goodrich, Michael T.

367

Automated Detection of Persistent Kernel Control-Flow Attacks  

E-Print Network [OSTI]

enforcement as part of the Xen and VMware vir- tual machine monitors. Our implementation detected all directly, e.g., by using a virtual machine monitor or a separate card to examine kernel memory [14, 38, 23's main goal is to add surreptitious functionality to the system, then either this functionality

Hicks, Michael

368

Automated Detection of Persistent Kernel Control-Flow Attacks  

E-Print Network [OSTI]

machine monitors. Our implementation detected all the control-flow modifying rootkits we could install.g., by using a virtual machine monitor or a separate card to examine kernel memory [14, 37, 23], or may's main goal is to add surreptitious functionality to the system, then either this functionality

Hicks, Michael

369

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures  

E-Print Network [OSTI]

(e.g., duty-cycled sensor networks). In DTNs, pack- ets are not transferred along a connected multi DTN models available, such as IPN (Inter- PlaNetary Internet) [6], DakNet [7], and DieselNet [8]. Exam and there are generally no guaranteed sequences for forwarding packets (akin to traditional paths in connected networks

Caesar, Matthew

370

HAN Attack Surface and the Open Smart Energy Gateway Project  

E-Print Network [OSTI]

can  move  forward  with  acceptable  risks.    Given  the  risks,  while  difficult  to  quantify  exactly,  can  be  minimized  and,  ultimately,   deemed  acceptable.  risk  would  be  reduced.    And,  while  the  attendant  constraints  on  SEP   functionality  may  not  be  acceptable  

Searle, Justin

2014-01-01T23:59:59.000Z

371

Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization  

E-Print Network [OSTI]

(GDI) as information describing the dynamic membership of a group application, such as the number the service during a time interval. In many multicast applications, GDI is confidential and should of the GDI to competitors could enable them to analyze the statistical behavior of the audience and help them

Sun, Yan Lindsay

372

CDKN-CARICOM-Trinidad and Tobago-A Regional Implementation Plan...  

Open Energy Info (EERE)

A Regional Implementation Plan for CARICOM's Regional Climate Change Resilience Framework Redirect page Jump to: navigation, search REDIRECT Regional Implementation Plan for...

373

Low Emissions Asian Development (LEAD) Program - Bangladesh ...  

Open Energy Info (EERE)

Redirect page Jump to: navigation, search REDIRECT Low Emissions Asian Development (LEAD) Program Retrieved from "http:en.openei.orgwindex.php?titleLowEmissionsAsianDevel...

374

Help:Linked images | Open Energy Information  

Open Energy Info (EERE)

Redirect page Jump to: navigation, search REDIRECT Manual:Linked images Retrieved from "http:en.openei.orgwindex.php?titleHelp:Linkedimages&oldid58478"...

375

Transmission/Resource Library/Enviromental Resources and Mitigation...  

Open Energy Info (EERE)

Enviromental Resources and Mitigation < Transmission | Resource Library(Redirected from TransmissionResource LibraryMitigation) Redirect page Jump to: navigation, search...

376

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

377

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

378

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

379

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

380

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

April 11, 2011 April 11, 2011 T-599: Microsoft April 2011 Security Bulletin Release Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. April 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

382

Property:Geothermal/NewsWebsite | Open Energy Information  

Open Energy Info (EERE)

search Property Name GeothermalNewsWebsite Property Type URL Description News Web URL Retrieved from "http:en.openei.orgwindex.php?titleProperty:Geothermal...

383

International Collaborations on Engineered Barrier Systems: Experiment...  

Energy Savers [EERE]

modeling of field experiments at the Mont Terri URL, Switzerland, and the Horonobe URL, Japan. Modeling of coupled THM processes in the EBS is part of the international...

384

Supplemental Note 1. Access to datasets.................................................................pg. 5 Table S1: Accession IDs and internet URLs for access to datasets  

E-Print Network [OSTI]

statistics of barley HICF map S2.2 Selection of "gene-bearing" BAC clones Supplemental Note 3. Genomic and assembly statistics S3.3 Genomic shotgun sequencing and assembly Table S5: Summary of barley WGS sequencing: Statistics of whole genome shotgun sequence assembly Figure S2: Coverage of barley full length cDNAs (fl

Lonardi, Stefano

385

To link to this article : DOI: 10.1051/meca/2009061 URL : http://dx.doi.org/10.1051/meca/2009061  

E-Print Network [OSTI]

-linear rheological models of the blood are performed on realistic three-dimensional micro-vascular networks segregation lead to very distinct hematocrit distributions in the micro-vacular network. Nevertheless that the micro-vacular network structure mainly controls the pressure distribution in micro-circul

Paris-Sud XI, Université de

386

To link to this article : DOI: 10.1126/science.1213003 URL : http://dx.doi.org/10.1126/science.1213003  

E-Print Network [OSTI]

the relation between energy density (how far an electric car can go on a single charge) and power den- sity

Paris-Sud XI, Université de

387

To link to this article: DOI:10.1039/C1CC10749F URL: http://dx.doi.org/10.1039/C1CC10749F  

E-Print Network [OSTI]

-dot intermediate band solar cells,1 hybrid cells2 and involve the use of semi- conducting inorganic nanocrystals

Mailhes, Corinne

388

Electronic Notes in Theoretical Computer Science 82 No. 6 (2004) URL: http://www.elsevier.nl/locate/entcs/volume82.html 12 pages  

E-Print Network [OSTI]

according to the service-oriented architecture (SOA), the conceptual model underlying platforms like Web Ser Description Service Client Bind PublishFind Fig. 1. Service Oriented Architecture The mechanisms to achieve- vices [3] or Jini [17]. As shown in Fig. 1 (cf. [3]), service-oriented architec- tures involve three

Heckel, Reiko

389

To link to this article : DOI:10.1016/j.fuel.2011.11.066 URL : http://www.sciencedirect.com/science/article/pii/S0016236111007800#  

E-Print Network [OSTI]

, alexandre and Debenest, Gérald Modelling of non-consolidated oil shale semi- coke forward combustion : 10.1016/j.fuel.2011.11.066 #12;Modelling of non-consolidated oil shale semi-coke forward combustion

Paris-Sud XI, Université de

390

Electronic Notes in Theoretical Computer Science 7 (1997) URL: http://www.elsevier.nl/locate/entcs/volume7.html 21 pages  

E-Print Network [OSTI]

important applications. The duality of locally compact abelian groups, which in the finite case reduces to the self­duality of finite abelian groups, plays a central role in the complementarity principle of quantum lattices, is a cornerstone of modern model theory. And the self­ duality of finite­dimensional vector

Pratt, Vaughan

391

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) K2(2250) I(JP) = 1  

E-Print Network [OSTI]

AVERAGE2247±17 OUR AVERAGE 2200±40 1 ARMSTRONG 83C OMEG - 18 K- p p X 2235±50 1 BAUBILLIER 81 HBC - 8 K ARMSTRONG 83C OMEG - 18 K- p p X 210±30 2 CLELAND 81 SPEC ± 50 K+ p p X · · · We do not use the following et al. Translated from YAF 66 860. ARMSTRONG 83C NP B227 365 T.A. Armstrong et al. (BARI, BIRM, CERN

392

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f1(1285) IG (JPC ) = 0+(1 + +)  

E-Print Network [OSTI]

8.95 - p + - n 1278 ± 2 140 ARMSTRONG 89 OMEG 300 p p K K p p 1278 ± 2 ARMSTRONG 89G OMEG 85 + p ± 2 420 REEVES 86 SPEC 6.6 p p K K X 1285 ± 2 CHUNG 85 SPEC 8 - p N K K 1279 ± 2 604 ARMSTRONG 84 p p p 2(+ -) 1282 ± 4 ARMSTRONG 93C E760 p p 0 6 1270 ± 6 ±10 ARMSTRONG 92C OMEG 300 p p p p

393

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) K3(2320) I(JP) = 1  

E-Print Network [OSTI]

ARMSTRONG 83C OMEG - 18 K- p p X 2320±30 1 CLELAND 81 SPEC ± 50 K+ p p X 1 JP = 3+ from moments analysis 150±30150±30150±30150±30 2 ARMSTRONG 83C OMEG - 18 K- p p X · · · We do not use the following data(2320) REFERENCESK3(2320) REFERENCESK3(2320) REFERENCESK3(2320) REFERENCES ARMSTRONG 83C NP B227 365 T.A. Armstrong

394

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) K1(1650) I(JP) = 1  

E-Print Network [OSTI]

. · · · 1840 ARMSTRONG 83 OMEG - 18.5 K- p 3K p 1800 DAUM 81C CNTR - 63 K- p K- 2p K1(1650) WIDTHK1 FRAME 86 NP B276 667 D. Frame et al. (GLAS) ARMSTRONG 83 NP B221 1 T.A. Armstrong et al. (BARI, BIRM

395

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) f1(1420) IG (JPC ) = 0+(1 + +)  

E-Print Network [OSTI]

GAM4 100 - p 0 0 n 1430 ± 4 2 ARMSTRONG 92E OMEG 85,300 + p, p p + p , p p (K K ) 1462 ±20 3 ARMSTRONG 89 OMEG 300 p p K K p p 1425 ± 2 1520 ARMSTRONG 84 OMEG 85 + p, p p (+ ,p)(K K )p 1420 BITYUKOV ARMSTRONG 84, ARMSTRONG 89. 3 From fit to the K(892)K 1 + + partial wave. 4 Mass error increased to account

396

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) K1(1650) I(JP) = 1  

E-Print Network [OSTI]

. · · · 1840 ARMSTRONG 83 OMEG - 18.5 K- p 3K p 1800 DAUM 81C CNTR - 63 K- p K- 2p K1(1650) WIDTHK1 FRAME 86 NP B276 667 D. Frame et al. (GLAS) ARMSTRONG 83 NP B221 1 T.A. Armstrong et al. (BARI, BIRM

397

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) K2(2250) I(JP) = 1  

E-Print Network [OSTI]

AVERAGE2247±17 OUR AVERAGE 2200±40 1 ARMSTRONG 83C OMEG - 18 K- p p X 2235±50 1 BAUBILLIER 81 HBC - 8 K ARMSTRONG 83C OMEG - 18 K- p p X 210±30 2 CLELAND 81 SPEC ± 50 K+ p p X · · · We do not use the following et al. Translated from YAF 66 860. ARMSTRONG 83C NP B227 365 T.A. Armstrong et al. (BARI, BIRM, CERN

398

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f2(1565) IG (JPC ) = 0+(2 + +)  

E-Print Network [OSTI]

30 ,0 1502± 9 ADAMO 93 OBLX np + + - 1488±10 7 ARMSTRONG 93C E760 pp 0 6 1508±10 7 ARMSTRONG 93D E760 pp 30 6 1525±10 7 ARMSTRONG 93D E760 pp 0 0 6 1504 8 WEIDENAUER 93 ASTE 0.0 pN 3- 2+ 1540 OBLX np + + - 148± 27 17 ARMSTRONG 93C E760 pp 0 6 103± 15 17 ARMSTRONG 93D E760 pp 30 6 111± 10

399

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) f2(1565) IG (JPC ) = 0+(2 + +)  

E-Print Network [OSTI]

30 ,0 1502± 9 ADAMO 93 OBLX np + + - 1488±10 7 ARMSTRONG 93C E760 pp 0 6 1508±10 7 ARMSTRONG 93D E760 pp 30 6 1525±10 7 ARMSTRONG 93D E760 pp 0 0 6 1504 8 WEIDENAUER 93 ASTE 0.0 pN 3- 2+ 1540 OBLX np + + - 148± 27 17 ARMSTRONG 93C E760 pp 0 6 103± 15 17 ARMSTRONG 93D E760 pp 30 6 111± 10

400

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f1(1420) IG (JPC ) = 0+(1 + +)  

E-Print Network [OSTI]

GAM4 100 - p 0 0 n 1430 ± 4 2 ARMSTRONG 92E OMEG 85,300 + p, p p + p , p p (K K ) 1462 ±20 3 ARMSTRONG 89 OMEG 300 p p K K p p 1425 ± 2 1520 ARMSTRONG 84 OMEG 85 + p, p p (+ ,p)(K K )p 1420 BITYUKOV ARMSTRONG 84, ARMSTRONG 89. 3 From fit to the K(892)K 1 + + partial wave. 4 Mass error increased to account

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) K3(2320) I(JP) = 1  

E-Print Network [OSTI]

ARMSTRONG 83C OMEG - 18 K- p p X 2320±30 1 CLELAND 81 SPEC ± 50 K+ p p X 1 JP = 3+ from moments analysis 150±30150±30150±30150±30 2 ARMSTRONG 83C OMEG - 18 K- p p X · · · We do not use the following data(2320) REFERENCESK3(2320) REFERENCESK3(2320) REFERENCESK3(2320) REFERENCES ARMSTRONG 83C NP B227 365 T.A. Armstrong

402

Electronic Notes in Theoretical Computer Science 29 (1999) URL: http://www.elsevier.nl/locate/entcs/volume29.html 18 pages  

E-Print Network [OSTI]

, and by the Information Technology Promotion Agency, Japan, as part of the In­ dustrial Science and Technology Frontier Program `New Models for Software Architecture' sponsored by NEDO (New Energy and Industrial Technology in Computer Science, Centre of the Danish National Research Foundation. c fl1999 Published by Elsevier Science

Bruni, Roberto

403

To link to this article : DOI:10.1557/JMR.1999.0344 URL: http://dx.doi.org/10.1557/JMR.1999.0344  

E-Print Network [OSTI]

­16 that are related to their unidimensional nature. Carbon nanotubes are commonly prepared by arc-discharge be- tween the arc- discharge to favor the formation of single-shell nano- tubes and also to increase their quantity since they exhibit excellent mechanical properties2­8 and interesting electrical characteristics9

Mailhes, Corinne

404

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) Higgs Bosons --H0  

E-Print Network [OSTI]

://pdg.lbl.gov) Higgs Bosons -- H0 and H± , Searches for A REVIEW GOES HERE ­ Check our WWW List of Reviews STANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITSSTANDARD MODEL H0 (Higgs Boson) MASS LIMITS These limits apply to the Higgs boson

405

To link to this article : DOI:10.1039/c2ra21645k URL : http://dx.doi.org/10.1039/c2ra21645k  

E-Print Network [OSTI]

to develop a wide range of applications concerning these components, for example, dye-sensitized solar cells with organic backbones.1,2 More recently, inorganic complexes were employed to stabilize, to study and to form available modified oligonucleotides and chemical products. This synthetic strategy relies on the use

Boyer, Edmond

406

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f0(2100) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

/ + - + - 2122 HASAN 94 RVUE pp 1 Includes the data of ANISOVICH 00B indicating to exotic decay pattern. 2± 14 80k 4 UMAN 06 E835 5.2 p p 0 203 BUGG 95 J/ + - + - 273 HASAN 94 RVUE pp 3 Includes 95 PL B353 378 D.V. Bugg et al. (LOQM, PNPI, WASH) HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM

407

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) f0(2330) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

, limits, etc. · · · 2314±25 1 BUGG 04A RVUE 2337±14 ANISOVICH 00J SPEC 2.0 pp , 2321 HASAN 94 RVUE p p for averages, fits, limits, etc. · · · 144±20 2 BUGG 04A RVUE 217±33 ANISOVICH 00J SPEC 2.0 pp , 223 HASAN.V. Anisovich et al. BARNES 00 PR C62 055203 P.D. Barnes et al. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM

408

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) 3(2250) IG (JPC ) = 1+(3 --)  

E-Print Network [OSTI]

, limits, etc. · · · 2232 HASAN 94 RVUE p p 2090 1 OAKDEN 94 RVUE 0.36­1.55 pp 2250 2 MARTIN 80B HASAN 94 RVUE p p 60 10 OAKDEN 94 RVUE 0.36­1.55 pp 250 11 MARTIN 80B RVUE 200 11 MARTIN 80C RVUE.) ANISOVICH 00J PL B491 47 A.V. Anisovich et al. KLOET 96 PR D53 6120 W.M. Kloet, F. Myhrer (RUTG, NORD) HASAN

409

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) f0(2100) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

/ + - + - 2122 HASAN 94 RVUE pp 1 Includes the data of ANISOVICH 00B indicating to exotic decay pattern. 2± 14 80k 4 UMAN 06 E835 5.2 p p 0 203 BUGG 95 J/ + - + - 273 HASAN 94 RVUE pp 3 Includes 95 PL B353 378 D.V. Bugg et al. (LOQM, PNPI, WASH) HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM

410

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) 3(2250) IG (JPC ) = 1+(3 --)  

E-Print Network [OSTI]

, limits, etc. · · · 2232 HASAN 94 RVUE p p 2090 1 OAKDEN 94 RVUE 0.36­1.55 pp 2250 2 MARTIN 80B HASAN 94 RVUE p p 60 10 OAKDEN 94 RVUE 0.36­1.55 pp 250 11 MARTIN 80B RVUE 200 11 MARTIN 80C RVUE.) ANISOVICH 00J PL B491 47 A.V. Anisovich et al. KLOET 96 PR D53 6120 W.M. Kloet, F. Myhrer (RUTG, NORD) HASAN

411

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) 3(1990) IG (JPC ) = 1+(3 --)  

E-Print Network [OSTI]

, limits, etc. · · · 1982±14 1 ANISOVICH 02 SPEC 0.6­1.9 p p 0, 0, + - 2007 HASAN 94 RVUE p p 1 From HASAN 94 RVUE p p 2 From the combined analysis of ANISOVICH 00J, ANISOVICH 01D, ANISOVICH 01E.V. Anisovich et al. ANISOVICH 00J PL B491 47 A.V. Anisovich et al. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg

412

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f0(2200) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

for averages, fits, limits, etc. · · · 2122 HASAN 94 RVUE pp 2321 HASAN 94 RVUE pp 1 First solution, PWA for averages, fits, limits, etc. · · · 273 HASAN 94 RVUE pp 223 HASAN 94 RVUE pp 3 First solution, PWA. Translated from YAF 68 998. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM) BARU 89 ZPHY C42 505 S.E. Baru et

413

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) f0(2330) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

, limits, etc. · · · 2314±25 1 BUGG 04A RVUE 2337±14 ANISOVICH 00J SPEC 2.0 pp , 2321 HASAN 94 RVUE p p for averages, fits, limits, etc. · · · 144±20 2 BUGG 04A RVUE 217±33 ANISOVICH 00J SPEC 2.0 pp , 223 HASAN.V. Anisovich et al. BARNES 00 PR C62 055203 P.D. Barnes et al. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM

414

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) f0(2200) IG (JPC ) = 0+(0 + +)  

E-Print Network [OSTI]

for averages, fits, limits, etc. · · · 2122 HASAN 94 RVUE pp 2321 HASAN 94 RVUE pp 1 First solution, PWA for averages, fits, limits, etc. · · · 273 HASAN 94 RVUE pp 223 HASAN 94 RVUE pp 3 First solution, PWA. Translated from YAF 68 998. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg (LOQM) BARU 89 ZPHY C42 505 S.E. Baru et

415

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) 3(1990) IG (JPC ) = 1+(3 --)  

E-Print Network [OSTI]

, limits, etc. · · · 1982±14 1 ANISOVICH 02 SPEC 0.6­1.9 p p 0, 0, + - 2007 HASAN 94 RVUE p p 1 From HASAN 94 RVUE p p 2 From the combined analysis of ANISOVICH 00J, ANISOVICH 01D, ANISOVICH 01E.V. Anisovich et al. ANISOVICH 00J PL B491 47 A.V. Anisovich et al. HASAN 94 PL B334 215 A. Hasan, D.V. Bugg

416

To link to this article: DOI: 10.1088/0957-4484/22/26/265613 URL: http://dx.doi.org/10.1088/0957-4484/22/26/265613  

E-Print Network [OSTI]

-mail: msarno@unisa.it and arurault@chimie.ups-tlse.fr Abstract Anodic aluminium oxide (RAAO) membranes and chemically characterized by a wide range of experimental techniques. Commercial anodic aluminium oxide (CAAO meso-or microstructured anodic aluminium oxide (AAO) as the templating matrix. Previous works mainly

Mailhes, Corinne

417

To link to this article: DOI:10.1051/meca:2008021 URL : http://dx.doi.org/10.1051/meca:2008021  

E-Print Network [OSTI]

/ stratospheric balloons 1 Introduction Le CNES con¸coit et d´eveloppe des ballons pressuris´es stratosph

Mailhes, Corinne

418

To link to this article : DOI:10.1063/1.4863724 URL: http://dx.doi.org/10.1063/1.4863724  

E-Print Network [OSTI]

(bioremediation) or of carbon dioxide (CO2 sequestration). However, they can also have the undesirable effect

Mailhes, Corinne

419

In: Speech Communication 26(4), pp. 259-282 (December 1998) URL: http://www.dcs.shef.ac.uk/~miguel/papers/dim red epg.html  

E-Print Network [OSTI]

://www.dcs.shef.ac.uk/~miguel/papers/dim red epg.html Dimensionality Reduction of Electropalatographic Data Using Latent Variable Models Miguel: electropalatography (EPG), articulatory modelling, data reduction methods, dimensionality reduction, latent variable of finding such a dimensionality reduction mapping, not from a physical point of view, but from a machine

Carreira-Perpiñán, Miguel Á.

420

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) hc(1P) IG (JPC ) = ??(1 + -)  

E-Print Network [OSTI]

.4 ±0.6 ±0.4 168 ± 40 2 ROSNER 05 CLEO (2S) 0 c 3527 ±8 42 ANTONIAZZI 94 E705 300 ±, p Li J/0 X 3526

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) hc(1P) IG (JPC ) = ??(1 + -)  

E-Print Network [OSTI]

3527 ±8 42 ANTONIAZZI 94 E705 300 ±, p Li J/0 X 3526.28±0.18±0.19 59 3 ARMSTRONG 92D E760 p p J/0

422

To link to this article :DOI :10. 1063/1.4804552 URL : http://dx.doi.org/10.1063/1.4804552  

E-Print Network [OSTI]

, 31400 Toulouse, France The stability properties of the wake past an oblate spheroidal bubble held fixed and stability properties of the flow past bubbles rising in water. I. INTRODUCTION The dynamics of isolated this version : Tchoufag, Joel and Magnaudet, Jacques and Fabre, David Linear stability and sensitivity

Paris-Sud XI, Université de

423

Electronic Notes in Theoretical Computer Science 13(1998) URL: http://www.elsevier.nl/locate/entcs/volume13.html 34 pages  

E-Print Network [OSTI]

interesting bounds from proofs. In a sequel of appendices to this paper we indicate the expressive power, Centre of the Danish National Research Foundation. c 1998 Published by Elsevier Science B. V. #12 of convergence of some iterative algorithm. Typically such algorithms compute solutions x" of "-weakenings A

Haller-Dintelmann, Robert

424

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. August 28, 2013 V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

425

untitled  

Broader source: Energy.gov (indexed) [DOE]

Phone 609-452-8060 Fax 609-452-9550 URL www.nerc.com Phone 609-452-8060 Fax 609-452-9550 URL www.nerc.com N O R T H A M E R I C A N E L E C T R I C R E L I A B I L I T Y C O U N C I L P r i n c e t o n F o r r e s t a l V i l l a g e , 1 1 6 - 3 9 0 V i l l a g e B o u l e v a r d , P r i n c e t o n , N e w J e r s e y 0 8 5 4 0 - 5 7 3 1 FOR IMMEDIATE RELEASE Contact: Ellen P. Vancko evancko@nerc.com August 14, 2003 Power Outages ⎯ Update 8/15/2003 ⎯ 12:00 a.m. Starting at about 4:11 p.m. EDT, major losses of electric load occurred in the northeastern United States and Canada in the Eastern Interconnection. Although the exact cause is not known at present, the outages are not the result of a terrorist attack. The areas most affected center around the Great Lakes: Michigan, Ohio, New York City, Ontario, Quebec, northern New Jersey, Massachusetts, and Connecticut. The following load was lost (approximate numbers):

426

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 1, 2012 August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. July 26, 2012 U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability ISC BIND is prone to a denial-of-service vulnerability. July 24, 2012

427

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

428

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

429

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

430

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

431

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

432

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

433

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Broader source: Energy.gov (indexed) [DOE]

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

434

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

23, 2012 23, 2012 U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. January 20, 2012 U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. January 19, 2012 U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges The system does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 17, 2012 U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

435

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

436

The response of fatty acids and pigments to variations in temperature and irradiance in the Marine Diatom Thalassiosira pseudonana :  

E-Print Network [OSTI]

light for engineered algae: redirecting metabolism to fuel aof Algae for Bioenergy Pro- duction Alternative fuels are

Shang, Frank F.

2011-01-01T23:59:59.000Z

437

Thermal Barrier Coatings Chemically and Mechanically Resistant to High Temperature Attack by Molten Ashes.  

E-Print Network [OSTI]

?? Thermal barrier coatings (TBCs) are ceramic coatings used on component in the hottest sections of gas turbine engines, used for power generation and aviation.… (more)

Gledhill, Andrew Dean

2011-01-01T23:59:59.000Z

438

Secure Memories Resistant to Both Random Errors and Fault Injection Attacks Using Nonlinear Error Correction Codes  

E-Print Network [OSTI]

University, Boston , USA shizunge@bu.edu, wang.zhen.mtk@gmail.com, luopei@bu.edu, markkar@bu.edu Abstract and internal memories in em- bedded systems. Non-volatile memories like EEPROM and Flashes are often used author now works for Mediatek Wireless, Inc. The work of the fourth author is sponsored by the NSF grant

439

A Data-Centric Approach to Insider Attack Detection in Database Systems  

E-Print Network [OSTI]

Petropoulos2 , Hung Q. Ngo2 , and Shambhu Upadhyaya2 1 Information Security, Amazon.com Inc., Seattle WA 98104, USA, smathew@amazon.com, 2 Computer Science and Engineering, University at Buffalo, Buffalo NY 14260, USA, (mpertropo, hungngo, shambhu)@buffalo.edu Abstract. The insider threat against database

Ngo, Hung Q.

440

Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding  

E-Print Network [OSTI]

Quantum zero-knowledge proofs and quantum proofs of knowledge are inherently difficult to analyze because their security analysis uses rewinding. Certain cases of quantum rewinding are handled by the results by Watrous (SIAM J Comput, 2009) and Unruh (Eurocrypt 2012), yet in general the problem remains elusive. We show that this is not only due to a lack of proof techniques: relative to an oracle, we show that classically secure proofs and proofs of knowledge are insecure in the quantum setting. More specifically, sigma-protocols, the Fiat-Shamir construction, and Fischlin's proof system are quantum insecure under assumptions that are sufficient for classical security. Additionally, we show that for similar reasons, computationally binding commitments provide almost no security guarantees in a quantum setting. To show these results, we develop the "pick-one trick", a general technique that allows an adversary to find one value satisfying a given predicate, but not two.

Andris Ambainis; Ansis Rosmanis; Dominique Unruh

2014-04-28T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

E-Print Network 3.0 - attack complex inhibitor Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

25 Pesq. agropec. bras., Braslia, v.39, n.3, p.201-208, mar. 2004 Mutants of common bean alpha-amylase inhibitor-2 201 Summary: structural modeling, the conclusion is that the...

442

Paint for detection of corrosion and warning of chemical and radiological attack  

DOE Patents [OSTI]

A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

Farmer, Joseph C. (Tracy, CA)

2010-08-24T23:59:59.000Z

443

E-Print Network 3.0 - attacks outcomes lessons Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of - Department of Electrical and Computer Engineering, Performability Engineering Research Group Collection: Computer Technologies and Information Sciences 4 Manuscript....

444

Comparative toxicity of several sulphurs to two species of spider mites attacking cotton  

E-Print Network [OSTI]

and color as furnished by the Texas Gulf Sulphur Co. 12 Laboratory toxicity tests for control of T. desertorum using acaricides as indicated SuemeLry of data presented in Table 2 24 Analysis of variance of the data presented in Table 2 and 3 on control... and color as furnished by the Texas Gulf Sulphur Co. 12 Laboratory toxicity tests for control of T. desertorum using acaricides as indicated SuemeLry of data presented in Table 2 24 Analysis of variance of the data presented in Table 2 and 3 on control...

Arrese, Luis Humberto

2012-06-07T23:59:59.000Z

445

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......Radioisotope thermoelectric generator (up to 5,000 TBq...In the context of atmospheric dispersion over larger...radioisotope thermoelectric generators. These have in recent...doses received from the atmospheric dispersion of contaminant...26), when hosing water on a street contaminated......

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

446

The Primary User Emulation Attack in Dynamic Spectrum Access Networks: A Game Theoretic  

E-Print Network [OSTI]

Cognitive radio enabled dynamic spectrum access networks are designed to detect and opportunistically utilize the unused or under-utilized spectrum bands. However, due to the open paradigm of cognitive radio Communication Commission (FCC). This new policy would allow unused, licensed spectrum bands (white spaces

Subbalakshmi, K.P. "Suba"

447

Technology Challenges in Responding to Biological or Chemical Attacks in the Civilian Sector  

Science Journals Connector (OSTI)

...instrumentation. Fully automated detection...precomputed CFD simulations of the mean wind...agent requires rapid estimation of...operational aerosol-modeling capability to address...precomputed CFD simulations of the mean wind...agent requires rapid estimation of...operational aerosol-modeling capability to...

J. Patrick Fitch; Ellen Raber; Dennis R. Imbro

2003-11-21T23:59:59.000Z

448

Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit  

E-Print Network [OSTI]

that are widely used (CBC, CTR, CFB) are secure up to the birthday bound; that is, if w2w or fewer bits of data with CBC, CFB, or OFB. We also introduce impossible plain- text cryptanalysis, which can recover-or).The Cipher Block Chaining (CBC), Ciphertext Feedback (CFB), and Counter (CTR) modes [5] are used in practice

449

Analysis of chosen plaintext attacks on the WAKE Stream Cipher Marina Pudovkina  

E-Print Network [OSTI]

, and relies on repeated table use and having a large state space. WAKE works in CFB mode; the previous is a family of algorithms indexed by a positive integer n (in practice n=8). It works in CFB mode

450

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack  

E-Print Network [OSTI]

of Encryption, CBC, OFB, CFB, ABC, CTR, Infinite Garble Exten- sion, HCBC, HPCBC, XCBC. Abstract Blockwise is general enough to cover many modes currently in use, including ECB, CBC, CTR, OFB, CFB, ABC, IGE, XCBC, HCBC and HPCBC. An immediate result of the theorems in this paper is that CTR, OFB, CFB, HCBC and HPCBC

451

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC  

E-Print Network [OSTI]

, the distin- guisher on Alred construction is also applicable to the MACs based on CBC and CFB encryption mode

452

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel  

E-Print Network [OSTI]

. At company scale, a look at the search history of competitors can be used to predict their future actions can be used on search engines such as Google or Bing to retrieve the client's search query to uniquely map a search query to a web traffic signature and hence stochastic algorithms must be used

Rioul, Olivier

453

THE ANALYSYS OF INFORMATION IMPACTS IN COORDINATING DEFENCE AGAINST MALICIOUS ATTACKS FOR INTERCONNECTED  

E-Print Network [OSTI]

and the physical behaviors of power systems. Secondly, system operators are assumed able to perform certain-ordination of Transmission of Electricity) operation handbook [6]. Meanwhile, multi-agent systems (MAS) have been widely FOR INTERCONNECTED POWER SYSTEMS Ettore Bompard George Gross Roberto Napoli Fei Xue Politecnico di Torino University

Gross, George

454

Network Attack Detection and Defense Manifesto of the Dagstuhl Perspective Workshop  

E-Print Network [OSTI]

and the critical infrastructures, e.g. the health care system, the traffic system, power supply, trade (in , 2008 Editors: Georg Carle University of Tuebingen, Germany Falko Dressler University Erlangen-Nuremberg, Germany Richard A. Kemmerer University of California, Santa Barbara, USA Hartmut Koenig Brandenburg

Breu, Ruth

455

Chemical Combinatorial Attacks on Keyboards Eric Brier David Naccache, Pascal Paillier  

E-Print Network [OSTI]

on key 4, CaCl2 on key 5...). As the user enters his PIN, salts get mixed and leave the keyboard, some KCl on key 1, LiCl on key 2, SrCl2 on key 3, BaCl2 on key 4, CaCl2 on key 5...). As the user

456

StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks  

E-Print Network [OSTI]

Mellon University Pittsburgh, PA 15213 Abstract Today's Internet hosts are threatened by IP spoofing are realized even if only one third of Internet routers implement StackPi marking. We show these results through analysis and simulations based on several real Internet topologies. #12; Keywords: DDoS, Denial

457

StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks  

E-Print Network [OSTI]

Mellon University Pittsburgh, PA 15213 Abstract Today's Internet hosts are threatened by IP spoofing are realized even if only one third of Internet routers implement StackPi marking. We show these results through analysis and simulations based on several real Internet topologies. #12;Keywords: DDoS, Denial

458

Ravaging the wine dark sea: attacks on Crete by sea raiders during the Bronze Age  

E-Print Network [OSTI]

and kept the sea free of pirates. The first archaeological excavations on Crete early this century revealed many unfortified sites lying close to the coasts. In seemed inconceivable that unprotected settlements could have existed on the Cretan coast unless...

Stewart, David James

2012-06-07T23:59:59.000Z

459

The effect of resveratrol on the recurrent attacks of gouty arthritis  

Science Journals Connector (OSTI)

Gouty arthritis is characterized by inflammation induced by monosodium urate (MSU) crystal deposition, which is resulted by an increase of serum urate concentration. The management of gout, especially the recurre...

Haiyan Chen; Shucong Zheng; Yuankai Wang; Huiqing Zhu; Qiong Liu…

2014-12-01T23:59:59.000Z

460

The effects of sound on the boundary layer of an airfoil at high angles of attack  

E-Print Network [OSTI]

* Numbers in parentheses refer to the References. introducing sound waves into the airstream by means of a variable-frequency oscillator and a loudspeaker mounted near the leading edge of a flat plate. Eventually, another method of producing... these disturbances was settled upon, but several interesting results caused by the use of sound were noted. Laminar boundary layer oscillations could be induced, depending upon the proper combination of sound frequency, speaker position, and free stream velocity...

Hutchinson, Thomas Ira

1963-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Regional Recovery Framework for a Biological Attack in the Seattle Urban Area  

E-Print Network [OSTI]

County Office of Emergency Management City of Seattle, Office of Emergency Management Pierce County Office of Emergency Management City of Bellevue, Emergency Preparedness Division Joint Base Lewis of Defense, Defense Threat Reduction Agency, and the Department of Homeland Security, Science & Technology

462

Impact of interspecific interactions among parasitoids on inoculative biological control of leafminers attacking chrysanthemum  

E-Print Network [OSTI]

. sibirica only and the simultaneous release treatments.............. 52 6. Leafminer population density over time in the no parasitoid release control (A, B), the individual releases (C, D), and the combination releases (E, F) in 2003 and 2004... respectively....................... 54 7. Observed and expected levels of leafminer suppresion in the treatment where D. isaea and D. sibirica were released simultaneously in (A) 2003 and (B) 2004.......................... 59 8. Observed and expected...

Bader, Amy Elaine

2007-09-17T23:59:59.000Z

463

NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES Strengthening U.S. Intelligence  

E-Print Network [OSTI]

the 1947 National Security Act established the Central Intelligence Agency (CIA). During the subsequent over the CIA but has no executive authority over any of the other intelligence ag

Deutch, John

464

Instantaneous energetics of puma kills reveal advantage of felid sneak attacks  

Science Journals Connector (OSTI)

...carnivores. (A) Total energy expended during the pre-kill...statistics. (B) Minimum (green line from Fig. 1), predicted...pouncing. This high-energy activity, along with...locomotion. I. Metabolic energy consumption as a function...Quintana F. Gomez Laich A. Green J. A. Wilson R. P...

Terrie M. Williams; Lisa Wolfe; Tracy Davis; Traci Kendall; Beau Richter; Yiwei Wang; Caleb Bryce; Gabriel Hugh Elkaim; Christopher C. Wilmers

2014-10-03T23:59:59.000Z

465

E-Print Network 3.0 - attack wastewater utilities Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the contribution... . Policymakers and planners can maintain or increase the benefits of wastewater irrigation, while minimizing Source: Scott, Christopher - School Geography and...

466

Feeling the heat: Ground squirrels heat their tails to discourage rattlesnake attack  

Science Journals Connector (OSTI)

...They are able to assess the relative risk of rattlesnakes by listening to their rattles (7, 8). Large snakes produce lower-frequency...sensitive to these thermal signals. Using a thermal-imaging device, Rundus et al. discovered that squirrels only heat their...

Daniel T. Blumstein

2007-01-01T23:59:59.000Z

467

The Resaerch Value of Publishing Attacks David Basin and Srdjan Capkun  

E-Print Network [OSTI]

as on IT-enhanced systems, such as cars, implantable medical devices, voting systems, and smart meters,884 defects in ca. 37.5 million lines of source code from well-managed open source projects, which is approximately 0.45 bugs per 1000 lines of code. These were medium to high risk defects, including typical

Basin, David

468

Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators  

Science Journals Connector (OSTI)

The shrinking generator is a very popular sequence generator with cryptographic applications. Nowadays, it is still considered as a secure keystream generator. In this work, it is shown...A ·2(S???2)?

A. Fúster-Sabater; P. Caballero-Gil

2008-01-01T23:59:59.000Z

469

Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking  

E-Print Network [OSTI]

and use malicious webpages to inject a large amount of junk or spam data into the form history database the form is submitted, the form field data are simply saved to the history database as name- value pairs and matching field value pattern with the current input field will be selected from the history database

Yue, Chuan

470

INFORMATION SECURITY ATTACK TREE MODELING An Effective Approach for Enhancing Student Learning  

E-Print Network [OSTI]

the engineering principle of Failure Mode and Effect Analysis (FMEA). The main goal of this principle, the project plan can be created more realistically. FMEA techniques [1] help to identify failure potential

471

E-Print Network 3.0 - angioedema hae attacks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nd that HAE... -term variation of HAEs is related to the solar cycle. HAEs occur in all solar wind ... Source: Richardson, John - Kavli Institute for Astrophysics and Space...

472

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

473

Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach  

E-Print Network [OSTI]

-physical security is a topic of primary concern in the envisioned smart power grid [1]­[3]. Besides failures the smart grid vision. Related work. While the security of the electricity network has always been-physical security in smart power grids. Traditionally, state estimation and detection procedures have been designed

Bullo, Francesco

474

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network [OSTI]

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may… (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

475

E-Print Network 3.0 - attack aircraft Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: effects on aircraft performance. Although anti-icing devices such as de-icing boots and heating strips... help, ice accretions can still build up and affect the aircraft...

476

Energy Vampires are Attacking Your Home – Here’s How to Stop Them  

Office of Energy Efficiency and Renewable Energy (EERE)

Stop energy vampires from sucking your wallet dry by switching off power strips and unplugging appliances when not in use.

477

For New Challenges, Revisit Old Rules: Cyber Attacks and the Law of Armed Conflict  

E-Print Network [OSTI]

has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, Allies and interests." The Senate

Singh, Jaswinder Pal

478

The History and Application of Christian Just War Theory as Related to Preemptive Attack  

E-Print Network [OSTI]

Abstract Galen Michener Turner, B.A. Department of Religious Studies, April 2010 University of Kansas The Christian Just War tradition was created around the central principle that war was part of human existence, but that ...

Turner, Galen Michener

2010-04-28T23:59:59.000Z

479

E-Print Network 3.0 - abdool karim attacking Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Polymers Division has established several capa-bilities for structural measurements of polymer and Summary: associations. Alamgir Karim (301) 975-6588 alamgir.karim@.nist.gov...

480

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic  

E-Print Network [OSTI]

systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry is evaluated at packet level (e.g., packet send/delivery ratio [8], the number of jammed packets [11 metrics cannot be readily adapted to measure the jamming impact on time-critical appli- cations. Further

Wang, Wenye

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Author Retains Full Rights AD Attacks Against The Mechanical Pin Tumbler Lock  

E-Print Network [OSTI]

This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.

Craig Kagawa

482

Science Under Attack! Public Policy, Science Education, and the Emperor's New Clothes  

SciTech Connect (OSTI)

The popular debate about the teaching of intelligent design in public schools is but one quandary for scientists and policy makers. Given recent developments which have worked to breed a general distrust of science, it is evident that researchers and politicians alike should be wary of using popular opinion as a guide for policy and pedagogy when it comes to science in public education. Dr. Krauss will qualify this complex issue and will address how educators, policy makers and scientists can work effectively to prevent public misconceptions of science.

Krauss, Lawrence (Case Western Reserve University) [Case Western Reserve University

2005-12-05T23:59:59.000Z

483

Alkali attack on a mullite refractory in the Grand Forks Energy Technology Center slagging gasifier  

Science Journals Connector (OSTI)

A mullite refractory lining in the Grand Forks Energy Technology Center slagging gasifier cracked and spoiled after intermittent exposure to...

C. R. Kennedy

1981-06-01T23:59:59.000Z

484

What Should We Expect After the Next Attack? Roxane Cohen Silver University of California, Irvine  

E-Print Network [OSTI]

shoes (in 2001), another by a man hiding a bomb in his underwear (on Christmas Day in 2009). Many fewer up a sport utility vehicle in Times Square, and the vague plan to bomb a Portland, Oregon, Christmas tree lighting event in 2010. Fewer still know about attempts that were not highly publicized (and

Fischhoff, Baruch

485

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......envisaged in connection with nuclear power plant accidents, but would be...Decision Support System for Nuclear Emergency Management...EKO-5(96)18 (Nordic Nuclear Safety Research (NKS...Factors Skin radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

486

Estimation of health hazards resulting from a radiological terrorist attack in a city  

Science Journals Connector (OSTI)

......connection with nuclear power plant accidents...and complex assessment tool, it...System for Nuclear Emergency...Nordic Nuclear Safety Research...dosimetric assessment. (1999...Hazard Release Risk Factors Skin...radiation effects Terrorism...

K. G. Andersson; T. Mikkelsen; P. Astrup; S. Thykier-Nielsen; L. H. Jacobsen; L. Schou-Jensen; S. C. Hoe; S. P. Nielsen

2008-09-01T23:59:59.000Z

487

A Putative Polyketide Synthase/Peptide Synthetase from Magnaporthe grisea Signals Pathogen Attack to Resistant Rice  

Science Journals Connector (OSTI)

...resistance gene Pi33. These rice cultivars were grown in the greenhouse as described (Dioh et al., 2000). Spray infections and...Ciufetti, L.M. (2001). Green fluorescent protein is lighting up fungal biology. Appl. Environ. Microbiol. 67, 1987-1994...

Heidi U. Böhnert; Isabelle Fudal; Waly Dioh; Didier Tharreau; Jean-Loup Notteghem; Marc-Henri Lebrun

2004-08-19T23:59:59.000Z

488

REVIEW ARTICLE Strategies of attack and defence in woody plantPhytophthora interactions  

E-Print Network [OSTI]

and Consultancy, Brannenburg, Germany; 15 Institute of Horticulture, Skierniewice, Poland; 16 Julius Kuhn Institut � Federal Research Centre for Cultivated Plants, Institute for Plant Protection in Horticulture and Forests. The overall goal is to shed light on the sequences of pathogenesis to better understand how Phytophthora

Grünwald, Niklaus J.

489

Technology Challenges in Responding to Biological or Chemical Attacks in the Civilian Sector  

Science Journals Connector (OSTI)

...decontamination and remediation). During the...Dugway Proving Ground, Utah. The...interfaces for water, soil, and clinical...Dugway Proving Ground, Utah...decontamination and remediation...Dugway Proving Ground (29), and...Dissolved in water, this lemon-scented...

J. Patrick Fitch; Ellen Raber; Dennis R. Imbro

2003-11-21T23:59:59.000Z

490

Examining the influence of civilian casualties on insurgent attacks in Iraq  

E-Print Network [OSTI]

Although there have been several attempts to tabulate civilian casualties in the Iraq War, the effect of these casualties on the Iraqi population and insurgent organizations has not been thoroughly examined. From the ...

Karnis, Jessica Eve

2006-01-01T23:59:59.000Z

491

E-Print Network 3.0 - attacks avian flu Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is seasonal flu? Happens every year between November and March... or progressive cough Understand 12;What is avian flu? An illness caused by influenza viruses occurring...

492

An investigation in the wake of a symmetric airfoil with riblets at zero angle of attack  

E-Print Network [OSTI]

riblet are presented in half wake forin in Figures 25 1. 0 0. 6 Clean Airfcn Rn = 25 x 10 U/U. 0. 6 0. 4 0. 2 OOOOO coo o 00000 * a ** p + s x/c 0. 8'3 1. 67 3. 33 10. 00 16. 67 33. 33 51. 17 88. 33 133. 33 200. 00 0. il 0. 00 0.... 03 0. 06 0. 09 0. 12 0. 15 X/c Fig. 9 Mean velocity profiles in the wake- clean airfoil, Rn = 2. 5 x 10s. 1. 0 0. 8 U/U. 0. 6 0. 4 0. 2 OOOoO 0 e O 00 OO a*axe a+ e++ s x/c 0. 83 1. 67 3. 33 10. 00 16. 87 33. 33 51. 17 88. 33...

Caram, Jose Miguel

2012-06-07T23:59:59.000Z

493

Multi-parameter study of external sulfate attack in blended cement materials A. Bonakdar, B. Mobasher *  

E-Print Network [OSTI]

Accepted 5 August 2009 Available online xxxx Keywords: Cementitious materials Expansion Ettringite Fly ash of ettringite crystals and consequent volu- metric strains in the hardened material are also considered

Mobasher, Barzin

494

A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies  

E-Print Network [OSTI]

In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

Kindy, Diallo Abdoulaye

2012-01-01T23:59:59.000Z

495

Managed Phishing Employees continue to be fertile ground for attackers wishing to establish a  

E-Print Network [OSTI]

with innovative point-of-click "teachable moments" to reinforce security awareness and learning, and ultimately a combination of testing, learning reinforcement and remediation as depicted in the process below. Organizations that only captures the pass or fail of each employee. Auto-enrollment and remediation In addition

McQuade, D. Tyler

496

Business Under Threat, Technology Under Attack, Ethics Under Fire: The Experience of Google in China  

Science Journals Connector (OSTI)

The situation became substantially more complicated when the U.S. government reacted with strong political support for Google’s decision, leading to a series of high-level exchanges between Washington, DC, and Be...

Justin Tan; Anna E. Tan

2012-11-01T23:59:59.000Z

497

Defending against Path-based DoS Attacks in Wireless Sensor Networks  

E-Print Network [OSTI]

, and Shivakant Mishra Department of Computer Science University of Colorado Boulder, Colorado, USA Jing, an adversary overwhelms sensor nodes a long distance away by flooding a multi- hop end-to-end communication against a WSN is to overwhelm nodes that are many hops away by flooding packets, which will quickly

Han, Richard Y.

498

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions  

Science Journals Connector (OSTI)

......2Department of Computer Science, University of Colorado at Colorado Springs, Colorado Springs, CO 80933-7150, USA Corresponding...Trinoo was deployed in at least 227 systems, to flood a single University of Minnesota computer, which......

Monowar H. Bhuyan; H. J. Kashyap; D. K. Bhattacharyya; J. K. Kalita

2014-04-01T23:59:59.000Z

499

Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers  

Science Journals Connector (OSTI)

Mobile devices are evolving as the dominant computing platform and consequently application repositories and app markets are becoming the prevalent paradigm for deploying software. Due to their central and trusted position in the software ecosystem, ... Keywords: android, apps, market, nsa, security, transparency

Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith

2014-11-01T23:59:59.000Z

500

False Data Injection Attacks against State Estimation in Electric Power Grids  

E-Print Network [OSTI]

using IEEE test systems. Our results indicate that security protection of the electric power grid must@cs.unc.edu ABSTRACT A power grid is a complex system connecting electric power generators to consumers through power A power grid is a complex system connecting a variety of electric power generators to customers through

Reiter, Michael