National Library of Energy BETA

Sample records for url redirection attacks

  1. EERE Web Domains, URLs, and Redirects

    Broader source: Energy.gov [DOE]

    All Office of Energy Efficiency and Renewable Energy (EERE) office and partnership websites must use domains and URLs that have been approved by the Department of Energy (DOE)’s Chief Information Office, the Office of Management and Budget (OMB), and EERE's domain policies.

  2. Widget:GeneralRedirect | Open Energy Information

    Open Energy Info (EERE)

    GeneralRedirect Jump to: navigation, search This widget will redirect the browser to a URL that mediawiki doesn't know about (such as datasets). This widget will take a URL...

  3. URL | Open Energy Information

    Open Energy Info (EERE)

    search Properties of type "URL" Showing 63 properties using this type. B Property:BuildingsModelIdfFile Property:BuildingsModelXmlFile Property:BuildingsPublicationURL E...

  4. Property:NEPA Url | Open Energy Information

    Open Energy Info (EERE)

    Url Jump to: navigation, search Property Name NEPA Url Property Type URL Description URLs to any other relevant information associated with NEPA Docs that are not appropriate to...

  5. Widget:DocumentURL | Open Energy Information

    Open Energy Info (EERE)

    DocumentURL Jump to: navigation, search This widget will return the URL for the HTML document. Parameters include: none For example: Widget:DocumentURL Retrieved from "http:...

  6. Property:NEPA Application Url | Open Energy Information

    Open Energy Info (EERE)

    Application Url Jump to: navigation, search Property Name NEPA Application Url Property Type URL Description URLs to NEPA application files. All NOIs. Drilling permits are also...

  7. Property:NEPA Extraordinary Url | Open Energy Information

    Open Energy Info (EERE)

    Extraordinary Url Jump to: navigation, search Property Name NEPA Extraordinary Url Property Type URL Description URLs that document extraordinary circumstances checklist or...

  8. Property:NEPA Decision Url | Open Energy Information

    Open Energy Info (EERE)

    Decision Url Jump to: navigation, search Property Name NEPA Decision Url Property Type URL Description URLs to decisions on NEPA Docs This is a property of type URL. Retrieved from...

  9. Property:NEPA FONSI Url | Open Energy Information

    Open Energy Info (EERE)

    FONSI Url Jump to: navigation, search Property Name NEPA FONSI Url Property Type URL Description URLs to FONSI reports for NEPA Docs This is a property of type URL. Retrieved from...

  10. EERE Web Domains and URLs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Process & Approvals EERE Web Domains and URLs EERE Web Domains and URLs For domains and URLs, all Office of Energy Efficiency and Renewable Energy (EERE) office and ...

  11. OutageMapURL Phases Energy Services

    Open Energy Info (EERE)

    OutageMapURL Phases Energy Services County Electric Power Assn http outages county org A N Electric Coop Virginia AEP Generating Company https www aepaccount com zipr...

  12. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerabilities | Department of Energy 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain

  13. Help:Redirects | Open Energy Information

    Open Energy Info (EERE)

    REDIRECT pagename If the pagename as you typed it is not a valid page, it will show in red. Until there is a valid destination page, you should not make the redirect. Viewing a...

  14. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  15. Property:Buildings/PublicationURL | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search This is a property of type URL. Pages using the property "BuildingsPublicationURL" Showing 2 pages using this property. G General Merchandise 50%...

  16. Web Redirect and Bookmark Requirements | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Process & Approvals Web Redirect and Bookmark Requirements Web Redirect and Bookmark Requirements If you archive or move an established Office of Energy Efficiency and ...

  17. name SRSCRO description url http www srscro org namespaces oembed...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    description url http www srscro org namespaces oembed authentication routes namespace methods GET endpoints methods GET args context required false default view links self http...

  18. Twenty Years of Underground Research at Canada's URL

    SciTech Connect (OSTI)

    Chandler, N. A.

    2003-02-27

    Construction of Atomic Energy of Canada Limited's (AECL's) Underground Research Laboratory (URL) began in 1982. The URL was designed to address the needs of the Canadian nuclear fuel waste management program. Over the years, a comprehensive program of geologic characterization and underground hydrogeologic, geotechnical and geomechanical projects have been performed, many of which are ongoing. The scientific work at the URL has evolved through a number of different phases to meet the changing needs of Canada's waste management program. The various phases of the URL have included siting, site evaluation, construction and operation. Collaboration with international organizations is encouraged at the URL, with the facility being a centre of excellence in an International Atomic Energy Agency (IAEA) network of underground facilities. One of AECL's major achievements of the past 20 year program has been the preparation and public defense of a ten-volume Environmental Impact Statement (EIS) for a conceptual deep geologic repository. Completion of this dissertation on the characterization, construction and performance modeling of a conceptual repository in the granite rock of the Canadian Shield was largely based on work conducted at the URL. Work conducted over the seven years since public defense of the EIS has been directed towards developing those engineering and performance assessment tools that would be required for implementation of a deep geologic repository. The URL continues to be a very active facility with ongoing experiments and demonstrations performed for a variety of Canadian and international radioactive waste management organizations.

  19. Device and method for redirecting electromagnetic signals

    DOE Patents [OSTI]

    Garcia, Ernest J.

    1999-01-01

    A device fabricated to redirect electromagnetic signals, the device including a primary driver adapted to provide a predetermined force, a linkage system coupled to the primary driver, a pusher rod rotationally coupled to the linkage system, a flexible rod element attached to the pusher rod and adapted to buckle upon the application of the predetermined force, and a mirror structure attached to the flexible rod element at one end and to the substrate at another end. When the predetermined force buckles the flexible rod element, the mirror structure and the flexible rod element both move to thereby allow a remotely-located electromagnetic signal directed towards the device to be redirected.

  20. Light redirective display panel and a method of making a light redirective display panel

    SciTech Connect (OSTI)

    Veligdan, James T.

    2002-01-01

    An optical display panel which provides improved light intensity at a viewing angle by redirecting light emitting from the viewing screen, and a method of making a light redirective display panel, are disclosed. The panel includes an inlet face at one end for receiving light, and an outlet screen at an opposite end for displaying the light. The inlet face is defined at one end of a transparent body, which body may be formed by a plurality of waveguides, and the outlet screen is defined at an opposite end of the body. The screen includes light redirective elements at the outlet screen for re-directing light emitting from the outlet screen. The method includes stacking a plurality of glass sheets, with a layer of adhesive or epoxy between each sheet, curing the adhesive to form a stack, placing the stack against a saw and cutting the stack at two opposite ends to form a wedge-shaped panel having an inlet face and an outlet face, and forming at the outlet face a plurality of light redirective elements which direct light incident on the outlet face into a controlled light cone.

  1. Light Redirective Display Panel And A Method Of Making A Light Redirective Display Panel

    SciTech Connect (OSTI)

    Veligdan, James T.

    2005-07-26

    An optical display panel which provides improved light intensity at a viewing angle by redirecting light emitting from the viewing screen, and a method of making a light redirective display panel, are disclosed. The panel includes an inlet face at one end for receiving light, and an outlet screen at an opposite end for displaying the light. The inlet face is defined at one end of a transparent body, which body may be formed by a plurality of waveguides, and the outlet screen is defined at an opposite end of the body. The screen includes light redirective elements at the outlet screen for re-directing light emitting from the outlet screen. The method includes stacking a plurality of glass sheets, with a layer of adhesive or epoxy between each sheet, curing the adhesive to form a stack, placing the stack against a saw and cutting the stack at two opposite ends to form a wedge-shaped panel having an inlet face and an outlet face, and forming at the outlet face a plurality of light redirective elements which direct light incident on the outlet face into a controlled light cone.

  2. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  3. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Environmental Management (EM)

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September ...

  4. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 9, 2015, 2:00pm to 3:30pm Colloquia MBG Auditorium COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future of Solar Electric Propulsion Dr. John Brophy NASA Jet ...

  5. Active Wake Redirection Control to Improve Energy Yield (Poster)

    SciTech Connect (OSTI)

    Churchfield, M. J.; Fleming, P.; DeGeorge, E.; Bulder, B; White, S. M.

    2014-10-01

    Wake effects can dramatically reduce the efficiency of waked turbines relative to the unwaked turbines. Wakes can be deflected, or 'redirected,' by applying yaw misalignment to the turbines. Yaw misalignment causes part of the rotor thrust vector to be pointed in the cross-stream direction, deflecting the flow and the wake. Yaw misalignment reduces power production, but the global increase in wind plant power due to decreased wake effect creates a net increase in power production. It is also a fairly simple control idea to implement at existing or new wind plants. We performed high-fidelity computational fluid dynamics simulations of the wake flow of the proposed Fishermen's Atlantic City Windfarm (FACW) that predict that under certain waking conditions, wake redirection can increase plant efficiency by 10%. This means that by applying wake redirection control, for a given watersheet area, a wind plant can either produce more power, or the same amount of power can be produced with a smaller watersheet area. With the power increase may come increased loads, though, due to the yaw misalignment. If misalignment is applied properly, or if layered with individual blade pitch control, though, the load increase can be mitigated. In this talk we will discuss the concept of wake redirection through yaw misalignment and present our CFD results of the FACW project. We will also discuss the implications of wake redirection control on annual energy production, and finally we will discuss plans to implement wake redirection control at FACW when it is operational.

  6. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  7. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  8. EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide April 3, 2009 - 5:47pm Addthis Allison Casey Senior Communicator, NREL If you're a regular visitor to EERE's Consumer's Guide to Energy Efficiency and Renewable Energy, you may have noticed some changes this week. The site has moved to EnergySavers.gov and is now called "Energy Savers." The same in-depth information is still

  9. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  10. Modeling Momentum Transfer from Kinetic Impacts: Implications for Redirecting Asteroids

    SciTech Connect (OSTI)

    Stickle, A. M.; Atchison, J. A.; Barnouin, O. S.; Cheng, A. F.; Crawford, D. A.; Ernst, C. M.; Fletcher, Z.; Rivkin, A. S.

    2015-05-19

    Kinetic impactors are one way to deflect a potentially hazardous object headed for Earth. The Asteroid Impact and Deflection Assessment (AIDA) mission is designed to test the effectiveness of this approach and is a joint effort between NASA and ESA. The NASA-led portion is the Double Asteroid Redirect Test (DART) and is composed of a ~300-kg spacecraft designed to impact the moon of the binary system 65803 Didymos. The deflection of the moon will be measured by the ESA-led Asteroid Impact Mission (AIM) (which will characterize the moon) and from ground-based observations. Because the material properties and internal structure of the target are poorly constrained, however, analytical models and numerical simulations must be used to understand the range of potential outcomes. Here, we describe a modeling effort combining analytical models and CTH simulations to determine possible outcomes of the DART impact. We examine a wide parameter space and provide predictions for crater size, ejecta mass, and momentum transfer following the impact into the moon of the Didymos system. For impacts into “realistic” asteroid types, these models produce craters with diameters on the order of 10 m, an imparted Δv of 0.5–2 mm/s and a momentum enhancement of 1.07 to 5 for a highly porous aggregate to a fully dense rock.

  11. Modeling Momentum Transfer from Kinetic Impacts: Implications for Redirecting Asteroids

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stickle, A. M.; Atchison, J. A.; Barnouin, O. S.; Cheng, A. F.; Crawford, D. A.; Ernst, C. M.; Fletcher, Z.; Rivkin, A. S.

    2015-05-19

    Kinetic impactors are one way to deflect a potentially hazardous object headed for Earth. The Asteroid Impact and Deflection Assessment (AIDA) mission is designed to test the effectiveness of this approach and is a joint effort between NASA and ESA. The NASA-led portion is the Double Asteroid Redirect Test (DART) and is composed of a ~300-kg spacecraft designed to impact the moon of the binary system 65803 Didymos. The deflection of the moon will be measured by the ESA-led Asteroid Impact Mission (AIM) (which will characterize the moon) and from ground-based observations. Because the material properties and internal structure ofmore » the target are poorly constrained, however, analytical models and numerical simulations must be used to understand the range of potential outcomes. Here, we describe a modeling effort combining analytical models and CTH simulations to determine possible outcomes of the DART impact. We examine a wide parameter space and provide predictions for crater size, ejecta mass, and momentum transfer following the impact into the moon of the Didymos system. For impacts into “realistic” asteroid types, these models produce craters with diameters on the order of 10 m, an imparted Δv of 0.5–2 mm/s and a momentum enhancement of 1.07 to 5 for a highly porous aggregate to a fully dense rock.« less

  12. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  14. Pointright: a system to redirect mouse and keyboard control among multiple machines

    DOE Patents [OSTI]

    Johanson, Bradley E.; Winograd, Terry A.; Hutchins, Gregory M.

    2008-09-30

    The present invention provides a software system, PointRight, that allows for smooth and effortless control of pointing and input devices among multiple displays. With PointRight, a single free-floating mouse and keyboard can be used to control multiple screens. When the cursor reaches the edge of a screen it seamlessly moves to the adjacent screen and keyboard control is simultaneously redirected to the appropriate machine. Laptops may also redirect their keyboard and pointing device, and multiple pointers are supported simultaneously. The system automatically reconfigures itself as displays go on, go off, or change the machine they display.

  15. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  16. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  17. Use of the Amplatzer Type 2 Plug for Flow Redirection in Failing Autogenous Hemodialysis Fistulae

    SciTech Connect (OSTI)

    Bozkurt, Alper Kırbaş, İsmail; Kasapoglu, Benan; Teber, Mehmet Akif

    2015-08-15

    PurposeTo present our experience with redirecting the outflow of mature arteriovenous fistulae (AVFs) in patients with cannulation and/or suboptimal flow problems by percutaneous intervention using the Amplatzer Vascular Plug II (AVP II).MethodsWe retrospectively reviewed patients who presented with difficulty in cannulation and/or suboptimal flow in the puncture zone of the AVF and who underwent intervention using the AVP II to redirect the outflow through a better cannulation zone from March 2009 to November 2012. The mean survival rate of all AVFs was estimated, and the effects of patient age, sex, and AVF age on the AVF survival time were determined.ResultsIn total, 31 patients (17 male and 14 female) with a mean age of 57.8 years (range, 20–79 years) were included. In 2 patients, the AVF failed within the first 15 days because of rapid thrombosis. In 9 patients, the new AVF route was working effectively until unsalvageable thrombosis developed. One of the 31 patients died 9 months before the last radiologic evaluation. The new AVF route was still being used for dialysis in the remaining 19 patients. The mean AVF survival rate was 1,061.4 ± 139.4 days (range, 788–1,334 days). Patient age, sex, and AVF age did not affect the survival time.ConclusionWe suggest that the AVP II is useful for redirecting the outflow of AVFs with cannulation problems and suboptimal flow. Patency of existing AVFs may be extended, thereby extending surgery-free or catheter intervention-free survival period.

  18. Wind Turbine Wake-Redirection Control at the Fishermen's Atlantic City Windfarm: Preprint

    SciTech Connect (OSTI)

    Churchfield, M.; Fleming, P.; Bulder, B.; White, S.

    2015-05-06

    In this paper, we will present our work towards designing a control strategy to mitigate wind turbine wake effects by redirecting the wakes, specifically applied to the Fishermen’s Atlantic City Windfarm (FACW), proposed for deployment off the shore of Atlantic City, New Jersey. As wind turbines extract energy from the air, they create low-speed wakes that extend behind them. Full wake recovery Full wake recovery to the undisturbed wind speed takes a significant distance. In a wind energy plant the wakes of upstream turbines may travel downstream to the next row of turbines, effectively subjecting them to lower wind speeds, meaning these waked turbines will produce less power.

  19. COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future of Solar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Propulsion | Princeton Plasma Physics Lab April 9, 2015, 2:00pm to 3:30pm Colloquia MBG Auditorium COLLOQUIUM: Dawn, the Asteroid Redirect Mission, and the Future of Solar Electric Propulsion Dr. John Brophy NASA Jet Propulsion Laboratory Abstract: PDF icon COLL.04.09.14.pdf The ongoing Dawn mission has as its goal the exploration of the two most massive main-belt asteroids, 4 Vesta and 1 Ceres. This mission is enabled by an on-board, solar powered, ion propulsion system that will

  20. Redirection of the spherical expanding shock wave on the interface with plasma

    SciTech Connect (OSTI)

    Markhotok, A.; Popovic, S.

    2014-02-15

    We study a strong spherical expanding shock wave interacting with the finite-gradient interface between neutral cold gas and weakly ionized plasma. We want to see how the interaction with the interface can alter the shock structure compared to the case of its free propagation through the media with the exponentially varying density. From our comparative calculations based on the 2D model, we found substantial difference in the shock structure including strong deformation of the shock front followed with its gradual flattening and the redirection in its propagation. There are a number of factors that can be used to control this phenomenon in order to strengthen or lessen the effect. The calculations can be made on any scale, limited with the requirement for the shock wave to be strong. The study points at the possibility in certain applications to avoid the shock wave with its redirection rather than attenuation. The results can be applicable to optimization of the energy deposition into the supersonic flux, the drag reduction in hypersonic flight, in the detonation theory, and combustion through the control of the ignition conditions, and for environmental improvements through sonic boom reduction. Cartesian coordinates were used in order to visualize the phenomenon.

  1. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  2. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  3. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  5. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  6. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  7. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  8. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  9. Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed

    SciTech Connect (OSTI)

    Thanachareonkit, Anothai; Lee, Eleanor S.; McNeil, Andrew

    2013-08-31

    Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-towall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare probability and other metrics used to evaluate visual discomfort. The window film was found to result in perceptible levels of discomfort glare on clear sunny days from the most conservative view point in the rear of the room looking toward the window. Daylight illuminance levels at the rear of the room were significantly increased above the reference window condition, which was defined as the same glazed clerestory window but with an interior Venetian blind (slat angle set to the cut-off angle), for the equinox to winter solstice period on clear sunny days. For partly cloudy and overcast sky conditions, daylight levels were improved slightly. To reduce glare, the daylighting film was coupled with a diffusing film in an insulating glazing unit. The diffusing film retained the directionality of the

  10. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  11. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  12. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  13. IU Webmaster redirect

    U.S. Energy Information Administration (EIA) Indexed Site

  14. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  15. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  16. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  17. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  18. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  19. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  20. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  1. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  2. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  3. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  4. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  5. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  6. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  9. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  10. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  11. Property:KML URL | Open Energy Information

    Open Energy Info (EERE)

    + Andover, Massachusetts + http:finder.geocommons.comoverlaysdownload13475.kml + Angola + http:finder.geocommons.comoverlaysdownload7784.kml + Anguilla + http:...

  12. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  13. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  14. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  15. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  16. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  17. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  18. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  19. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  20. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  1. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  2. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  3. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  4. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  5. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  6. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  7. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  8. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  9. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  10. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  11. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  12. Redirection of metabolism for hydrogen production

    SciTech Connect (OSTI)

    Harwood, Caroline S.

    2011-11-28

    This project is to develop and apply techniques in metabolic engineering to improve the biocatalytic potential of the bacterium Rhodopseudomonas palustris for nitrogenase-catalyzed hydrogen gas production. R. palustris, is an ideal platform to develop as a biocatalyst for hydrogen gas production because it is an extremely versatile microbe that produces copious amounts of hydrogen by drawing on abundant natural resources of sunlight and biomass. Anoxygenic photosynthetic bacteria, such as R. palustris, generate hydrogen and ammonia during a process known as biological nitrogen fixation. This reaction is catalyzed by the enzyme nitrogenase and normally consumes nitrogen gas, ATP and electrons. The applied use of nitrogenase for hydrogen production is attractive because hydrogen is an obligatory product of this enzyme and is formed as the only product when nitrogen gas is not supplied. Our challenge is to understand the systems biology of R. palustris sufficiently well to be able to engineer cells to produce hydrogen continuously, as fast as possible and with as high a conversion efficiency as possible of light and electron donating substrates. For many experiments we started with a strain of R. palustris that produces hydrogen constitutively under all growth conditions. We then identified metabolic pathways and enzymes important for removal of electrons from electron-donating organic compounds and for their delivery to nitrogenase in whole R. palustris cells. For this we developed and applied improved techniques in 13C metabolic flux analysis. We identified reactions that are important for generating electrons for nitrogenase and that are yield-limiting for hydrogen production. We then increased hydrogen production by blocking alternative electron-utilizing metabolic pathways by mutagenesis. In addition we found that use of non-growing cells as biocatalysts for hydrogen gas production is an attractive option, because cells divert all resources away from growth and to hydrogen. Also R. palustris cells remain viable in a non-growing state for long periods of time.

  13. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  14. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  15. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  16. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  17. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  18. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  19. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  20. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  1. Property:NEPA EA EIS Report Url | Open Energy Information

    Open Energy Info (EERE)

    + http:www.blm.govnmstenprogmorelandsrealtysanjuanbasinenergy.html + Sigurd Red Butte No2 + http:www.blm.govutstenfocedarcityplanningsigurdtoredbutte...

  2. Property:GeoNames URL | Open Energy Information

    Open Energy Info (EERE)

    5583921 + Anaconda, Montana + http:sws.geonames.org5637146 + Animas, New Mexico + http:sws.geonames.org5455243 + Ankara, Turkey + http:sws.geonames.org...

  3. Property:OutageMapURL | Open Energy Information

    Open Energy Info (EERE)

    + Agralite Electric Coop + https:pyxis-oms.comOutageMapAgraliteOutageMap.html + Alfalfa Electric Coop, Inc + https:ebill.alfalfaelectric.comwoViewermapviewer.html?config...

  4. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  5. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  6. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  7. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  8. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  9. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  10. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  11. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  12. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  13. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  14. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  15. Regioselectivity of radical attacks on substituted olefins. Application of the SCD model

    SciTech Connect (OSTI)

    Shaik, S.S. ); Canadell, E. )

    1990-02-14

    The SCD model is used to derive regiochemical trends in radical addition to olefins. Regiochemistry is discussed by appeal to two fundamental properties of the radical and the olefin. The first factor is the relative spin density in the {sup 3}{pi}{pi}* state of the olefin. Thus, radical attack is directed toward the olefinic carbon which possesses the highest spin density. The second factor is the relative bond strengths of the radical to the olefinic carbons. This factor directs the regiochemistry toward the olefinic terminus which forms the strongest bond with the radical. When the two effects join up, regioselectivity will be large, e.g., for CH{sub 2}=CHX (X = NR{sub 2}, CR, Cl, CN, Ph). When the two effects oppose one another, regioselectivity will be smaller, and regioselectivity crossovers are expected, e.g., for CF{sub 2}=CHF. The normal regiochemistry is shown to coincide with the spin density rule which makes identical predictions to the HOMO rule.

  16. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other

  17. Intergranular attack of alloy 600: Simulation and remedial action tests: Final report

    SciTech Connect (OSTI)

    Daret, J.; Feron, D.

    1989-02-01

    The intergranular attack (IGA) that affects alloy 600 tubes in the tube sheet crevices of PWR steam generators is hard to simulate in laboratory studies. For this study, a special apparatus was designed with a range of representative materials, mechanical conditions and geometry. The design also took account of sludge piles, thermal fluxes and water chemistry. During a first series of seven model boiler tests, chemical parameters and test procedures were adjusted to finally obtain a field prototypical degradation of tubing over a significant length within the tube sheet crevice for the case of caustic pollution. IGA was not produced for the river water in-leakage case. A second series of model boiler tests also showed the possibility of producing a representative IGA by initially filling the tube sheet crevices with concentrated caustic solutions. A third series of five model boiler tests aimed at studying in the effectiveness of remedial actions on either virgin of IGA affected tubing. Tube sheet crevice flushing operations using the natural circulation procedure showed a poor efficiency for moving concentrated contaminants, but they succeeded in forcing chemicals additives (acetic acid or boric acid) within the non-occluded portions of crevices. This off-line treatment resulted in a reduction in the progression rate of the pre-existing IGA by a factor of 2 to 3. Simulation of this treatment on virgin material showed that this result was obtained because acetate or borate shifted the cation-to-anion equivalent ratio to well under one. However this off-line treatment could not prevent the occurrence of intergranular stress corrosion cracking (IGSCC) near the top of crevices, since caustic continued to hideout under full power operation. The best remedial action consisted of a combination of off-line and on-line boric acid treatment. IGSCC was prevented both on virgin and IGA affected tubes. 3 figs., 3 tabs.

  18. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  19. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  20. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  1. Document Splash Screen for Redirecting to Updated Document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Document Imaging Document Imaging Converting Paper Documents into Electronic Files Converting paper documents into electronic files helps us manage, store, access and archive the organizational information we have "locked up" in paper documents. Utilizing high-quality document scanners, a top-end six-engine Optical Character Recognition (OCR) system and maintaining Quality Controls to provide a successful Imaging solution. Once converted, these electronic files can be indexed and

  2. Simple modification of Compton polarimeter to redirect synchrotron radiation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Benesch, Jay F.; Franklin, Gregg B.; Quinn, Brian P.; Paschke, Kent D.

    2015-11-30

    Synchrotron radiation produced as an electron beam passes through a bending magnet is a significant source of background in many experiments. Using modeling, we show that simple modifications of the magnet geometry can reduce this background by orders of magnitude in some circumstances. Specifically, we examine possible modifications of the four dipole magnets used in Jefferson Labs Hall A Compton polarimeter chicane. This Compton polarimeter has been a crucial part of experiments with polarized beams and the next generation of experiments will utilize increased beam energies, up to 11 GeV, requiring a corresponding increase in Compton dipole field to 1.5moreT. In consequence, the synchrotron radiation (SR) from the dipole chicane will be greatly increased. Three possible modifications of the chicane dipoles are studied; each design moves about 2% of the integrated bending field to provide a gentle bend in critical regions along the beam trajectory which, in turn, greatly reduces the synchrotron radiation within the acceptance of the Compton polarimeter photon detector. Each of the modifications studied also softens the SR energy spectrum at the detector sufficiently to allow shielding with 5 mm of lead. Simulations show that these designs are each capable of reducing the background signal due to SR by three orders of magnitude. The three designs considered vary in their need for vacuum vessel changes and in their effectiveness.less

  3. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  4. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  5. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  6. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  7. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  8. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  9. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  10. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  11. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick; Hauschild, Veronique; Hall, Dr. Linda; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  12. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  13. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and provide new insights into the basic biology of viralhost dynamics of infection. ... "Through this study we now better understand the biology that defines that resilience." ...

  14. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  15. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  16. Synthesis and subsequent rearrangement of chloro(pentafluorophenyl)-1,5-cyclooctadienepalladium(II), an illustrative example of endo attack to a coordinated double bond

    SciTech Connect (OSTI)

    Albeniz, A.C.; Espinet, P. ); Jeannin, Y.; Philoche-Levisalles, M. ); Mann, B.E. )

    1990-08-29

    Pd(C{sub 6}F{sub 5})Cl(1,5-cyclooctadiene) has been prepared in high yield and characterized crystallographically: monoclinic space group P2{sub 1}/c, a = 8.313 (1) {angstrom}, b = 7.7800 (6) {angstrom}, c = 22.292 (4) {angstrom}, {beta} = 95.77 (1){degree} (Z = 4), final R of 0.024 for 2,080 independent reflections. The x-ray structure reveals a high trans influence of the C{sub 6}F{sub 5} groups that weakens the opposite palladium-olefin bond. This complex rearranges slowly in solution by intramolecular double bond insertion into the Pd-C{sub 6}F{sub 5} bond to give an allyl complex Pd{sub 2}({mu}-Cl){sub 2}(6-C{sub 6}F{sub 5}-1-3-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2} and {sigma},{pi}-complex Pd{sub 2}({mu}-Cl){sub 2}(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2}. A derivative of the latter, Pd(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12})(F6-acac), has been characterized crystallographically: triclinic space group P{anti 1}, a = 10.360 (3) {angstrom}, b = 11.051 (2) {angstrom}, c = 11.084 (4) {angstrom}, {alpha} = 73.70 (2){degree}, {beta} = 61.41 (2){degree}, {gamma} = 66.08 (2){degree}, final R of 0.036 for 3,341 independent reflections. The rearrangement of Pd(C{sub 6}F{sub 5})Cl(1,5-COD) is catalyzed by its products and slowed down in coordinating solvents. Both products are the result of an endo attack of C{sub 6}F{sub 5} to COD and are formed competitively from a common intermediate.

  17. Demonstration of a light-redirecting skylight system at the Palm Springs Chamber of Commerce

    SciTech Connect (OSTI)

    Lee, E.S.; Beltran, L.O.; Selkowitz, S.E. [Lawrence Berkeley National Lab., CA (United States); Lau, H.; Ander, G.D. [Southern California Edison, San Dimas, CA (United States)

    1996-05-01

    As part of a demonstration project to provide a comprehensive energy upgrade to a 294 m{sup 2} (3168 ft{sup 2}) commercial building, an advanced skylight design was developed using optical light control materials and geometry to provide daylight to two adjoining offices. The skylight system was developed using outdoor physical model tests and simulation tools Limited on-site measurements and occupant polls were conducted. Market issues were addressed. The skylight systems were found to improve lighting quality and to control excessive daylight illuminance levels compared to a conventional diffusing bubble skylight. Daylighting principles developed in earlier work for vertical glazing systems (light shelves and light pipes) were shown to be applicable in skylight designs at full-scale.

  18. V-200: Apache Struts DefaultActionMapper Redirection and OGNL...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    tcher.mapper.DefaultActionMapper) can be exploited to e.g. inject and execute arbitrary Java code via OGNL (Object-Graph Navigation Language) expressions. IMPACT: Security Bypass...

  19. RAPID/Overview/Geothermal/Exploration/Montana | Open Energy Informatio...

    Open Energy Info (EERE)

    Montana < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationMontana) Redirect page Jump to: navigation, search REDIRECT...

  20. RAPID/Overview/Geothermal/Exploration/Idaho | Open Energy Information

    Open Energy Info (EERE)

    Idaho < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationIdaho) Redirect page Jump to: navigation, search REDIRECT...

  1. RAPID/Overview/Geothermal/Exploration/Utah | Open Energy Information

    Open Energy Info (EERE)

    Utah < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationUtah) Redirect page Jump to: navigation, search REDIRECT...

  2. RAPID/Overview/Geothermal/Exploration/Oregon | Open Energy Information

    Open Energy Info (EERE)

    Oregon < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationOregon) Redirect page Jump to: navigation, search REDIRECT...

  3. RAPID/Overview/Geothermal/Exploration/Colorado | Open Energy...

    Open Energy Info (EERE)

    Colorado < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationColorado) Redirect page Jump to: navigation, search REDIRECT...

  4. RAPID/Overview/Geothermal/Exploration/Texas | Open Energy Information

    Open Energy Info (EERE)

    Texas < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationTexas) Redirect page Jump to: navigation, search REDIRECT...

  5. RAPID/Overview/Geothermal/Exploration/Hawaii | Open Energy Information

    Open Energy Info (EERE)

    Hawaii < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationHawaii) Redirect page Jump to: navigation, search REDIRECT...

  6. Intergranular attack of alloy 600: laboratory investigations

    SciTech Connect (OSTI)

    Pinard-Legry, G.; Plante, G.

    1985-08-01

    In order to define some of the parameters of the IGA phenomenon, chemical and electrochemical corrosion tests were performed on alloy 600 C-ring samples in caustic media at high temperature. Metallographic examinations showed that temperature and the composition of the solution has a marked effect on the occurrence of IGA. In 36% caustic solution, silicate did not inhibit corrosion as was the case in more dilute solution. The presence of magnetite had an adverse effect probably because it changed the local chemistry. The electrochemical potential effect was not significant on IGA morphology in the range E/sub corr/ +- 20 mV. Tensile stress increased the rate of IGA but was not necessary in order to produce IGA in an already aggressive environment. The presence of oxides did not change the alloy 600 corrosion potential significantly, except for Cr/sub 2/O/sub 3/. Borate ions had an inhibiting effect on IGA in 10 % caustic. The addition of boric acid to 10 % caustic produced changes in pH at high temperatures which were measured as part of this report. 6 refs., 30 figs., 12 tabs.

  7. Attack optimization at moderate force levels

    SciTech Connect (OSTI)

    Canavan, G.H.

    1997-04-01

    Optimal offensive missile allocations for moderate offensive and defensive forces are derived and used to study their sensitivity to force structure parameters levels. It is shown that the first strike cost is a product of the number of missiles and a function of the optimum allocation. Thus, the conditions under which the number of missiles should increase or decrease in time is also determined by this allocation.

  8. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  9. New tools attack Permian basin stimulation problems

    SciTech Connect (OSTI)

    Ely, J.W.; Schubarth, S.K.; Wolters, B.C.; Kromer, C. )

    1992-06-08

    This paper reports that profitable stimulation treatments in the Permian basin of the southwestern U.S. combine new tools with technology and fluids previously available. This paper reports that a wide selection of fracturing fluids and techniques needs to be considered to solve the varied problems associated with stimulating hydrocarbon reservoirs that are at diverse depths, temperatures, pressures, and lithologies. The Permian basin of West Texas and New Mexico is the most fertile ground in the U.S. for some of the newer stimulation technologies. In this basin, these new tools and techniques have been applied in many older producing areas that previously were treated with more conventional stimulation techniques, including acidizing and conventional fracturing procedures.

  10. Bomb tests attack the food chain

    SciTech Connect (OSTI)

    Ruff, T. )

    1990-03-01

    Ciguatera poisoning, the most common type of fish poisoning in the world, has become a major public health problem in some parts of the South Pacific. This area has always been the site of periodic outbreaks, especially after severe storms or natural disasters that damage core reefs. But since World War II it has become evident that military activities and major construction projects that wreak havoc on corals also lead to ciguatera outbreaks. Extraordinarily high rates of ciguatera poisoning have occurred on the small Pacific islands that have been used for nuclear tests and on the islands that host the military infrastructures and activities that accompany the tests. This is true for both the Marshall Islands near Bikini and Eniwetok, where U.S. tests took place, and in French Polynesia, in the area around Moruroa Atoll where the French government continues to test. Ciguatera poisoning has a disastrous effect on people who depend on fishing as a way of life and on fish as the major source of protein. 10 refs.

  11. RAPID/Bulk Transmission | Open Energy Information

    Open Energy Info (EERE)

    Page Edit History RAPIDBulk Transmission < RAPID(Redirected from RAPIDOverviewBulkTransmission) Redirect page Jump to: navigation, search REDIRECT RAPIDBulkTransmission...

  12. Indonesia Development Policy Operation (DPO) Financing | Open...

    Open Energy Info (EERE)

    Policy Operation (DPO) Financing (Redirected from Colombian Low Carbon Development Strategy (CLCDS)) Redirect page Jump to: navigation, search REDIRECT Indonesia-Development...

  13. United States Environmental Protection Agency | Open Energy Informatio...

    Open Energy Info (EERE)

    United States Environmental Protection Agency (Redirected from U.S. Environmental Protection Agency) Redirect page Jump to: navigation, search REDIRECT EPA Retrieved from "http:...

  14. United States Environmental Protection Agency | Open Energy Informatio...

    Open Energy Info (EERE)

    United States Environmental Protection Agency (Redirected from Environmental Protection Agency) Redirect page Jump to: navigation, search REDIRECT EPA Retrieved from "http:...

  15. LEDSGP/sector/Agriculture | Open Energy Information

    Open Energy Info (EERE)

    LEDSGPsectorAgriculture < LEDSGP(Redirected from Agriculture Work Space) Redirect page Jump to: navigation, search REDIRECT LEDSGPsectorAFOLU Retrieved from "http:...

  16. Water-Gas Sampling | Open Energy Information

    Open Energy Info (EERE)

    Water-Gas Sampling (Redirected from Water-Gas Samples) Redirect page Jump to: navigation, search REDIRECT Downhole Fluid Sampling Retrieved from "http:en.openei.orgw...

  17. LEDSGP/about/Latin America and Caribbean Regional Platform |...

    Open Energy Info (EERE)

    Latin America and Caribbean Regional Platform < LEDSGP | about(Redirected from Latin America and Caribbean Regional Platform) Redirect page Jump to: navigation, search REDIRECT...

  18. LEDSGP | Open Energy Information

    Open Energy Info (EERE)

    LEDSGP (Redirected from LEDS Working Group) Redirect page Jump to: navigation, search REDIRECT LEDSGP.org notice Retrieved from "http:en.openei.orgwindex.php?titleLEDSGP&oldi...

  19. LEDSGP | Open Energy Information

    Open Energy Info (EERE)

    LEDSGP (Redirected from LEDS Global Partnership) Redirect page Jump to: navigation, search REDIRECT LEDSGP.org notice Retrieved from "http:en.openei.orgwindex.php?titleLEDSGP...

  20. RAPID/Overview/Geothermal/Exploration/Nevada | Open Energy Information

    Open Energy Info (EERE)

    Nevada < RAPID | Overview | Geothermal | Exploration(Redirected from RAPIDAtlasGeothermalExplorationNevada) Redirect page Jump to: navigation, search REDIRECT RAPID...

  1. RAPID/Overview/BulkTransmission/Siting/Colorado | Open Energy...

    Open Energy Info (EERE)

    Colorado < RAPID | Overview | BulkTransmission | Siting(Redirected from RAPIDAtlasBulkTransmissionSitingColorado) Redirect page Jump to: navigation, search REDIRECT...

  2. United States Department of Energy | Open Energy Information

    Open Energy Info (EERE)

    United States Department of Energy (Redirected from US DOE) Redirect page Jump to: navigation, search REDIRECT DOE Retrieved from "http:en.openei.orgwindex.php?titleUnitedSt...

  3. Mcgee Mountain Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    Mcgee Mountain Geothermal Area (Redirected from Mcgee Mountain Area) Redirect page Jump to: navigation, search REDIRECT McGee Mountain Geothermal Area Retrieved from "http:...

  4. T-620: Microsoft Security Bulletin Advance Notification for May 2011

    Broader source: Energy.gov [DOE]

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker set up a malicious Web page that invokes the Indexing Service through a call to its ActiveX component. This call could include a malicious URL and exploit the vulnerability, granting the attacker access to the client system with the privileges of the user browsing the Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

  5. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    SciTech Connect (OSTI)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in future work.

  6. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  7. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... National SCADA Test Bed Screenshot from NESSUS Vulnerability Scanner Technical Objectives ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  8. Attacking a practical quantum-key-distribution system withwavelength...

    Office of Scientific and Technical Information (OSTI)

    Authors: Li, Hong-Wei 1 ; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 2 ; Wang, Shuang ; Huang, Jing-Zheng ; Chen, Wei ; Yin, Zhen-Qiang ; Li, ...

  9. Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks

    SciTech Connect (OSTI)

    Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

    2009-01-31

    This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

  10. Sandia Energy - Study Rebuts Hypothesis That Comet Attacks Ended...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Clovis comet hypothesis in 2007, proponents showed a National Geographic animation based on one of Boslough's simulations as inspiration for their idea. Confronted by...

  11. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs (Conference...

    Office of Scientific and Technical Information (OSTI)

    Resource Relation: Conference: IEEE International Symposium on Technologies for Homeland Security (HST 2015), April 14-16, 2015, Waltham, Massachusetts, 1-6 Publisher: IEEE, ...

  12. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  13. Terra-Gen Power | Open Energy Information

    Open Energy Info (EERE)

    Terra-Gen Power (Redirected from Terra-Gen) Redirect page Jump to: navigation, search REDIRECT Terra-Gen Power LLC Retrieved from "http:en.openei.orgwindex.php?titleTerra-Gen...

  14. Geothermal/Land Use | Open Energy Information

    Open Energy Info (EERE)

    GeothermalLand Use < Geothermal(Redirected from Land Use) Redirect page Jump to: navigation, search REDIRECT GeothermalLand Use Planning Retrieved from "http:en.openei.orgw...

  15. Water-Gas Samples At Fenton Hill Hdr Geothermal Area (Goff &...

    Open Energy Info (EERE)

    Water-Gas Samples At Fenton Hill Hdr Geothermal Area (Goff & Janik, 2002) Redirect page Jump to: navigation, search REDIRECT Surface Gas Sampling At Fenton Hill Hdr Geothermal...

  16. Isotopic Analysis At Fenton Hill Hdr Geothermal Area (Goff, Et...

    Open Energy Info (EERE)

    Isotopic Analysis At Fenton Hill Hdr Geothermal Area (Goff, Et Al., 1981) Redirect page Jump to: navigation, search REDIRECT Isotopic Analysis- Fluid At Fenton Hill Hdr Geothermal...

  17. Water-Gas Samples At Long Valley Caldera Area (Goff & Janik,...

    Open Energy Info (EERE)

    Area (Goff & Janik, 2002) Redirect page Jump to: navigation, search REDIRECT Surface Gas Sampling At Long Valley Caldera Area (Goff & Janik, 2002) Retrieved from "http:...

  18. Global Green Growth Institute | Open Energy Information

    Open Energy Info (EERE)

    Growth Institute Redirect page Jump to: navigation, search REDIRECT Green Growth Strategy Support Retrieved from "http:en.openei.orgwindex.php?titleGlobalGreenGrowthIn...

  19. ClimateWorks-Egypt-Low Carbon Growth Planning Support | Open...

    Open Energy Info (EERE)

    ClimateWorks-Egypt-Low Carbon Growth Planning Support Redirect page Jump to: navigation, search REDIRECT ClimateWorks Low Carbon Growth Planning Support Retrieved from "http:...

  20. Low Emissions Asian Development (LEAD) Program - Bangladesh ...

    Open Energy Info (EERE)

    Low Emissions Asian Development (LEAD) Program - Bangladesh Redirect page Jump to: navigation, search REDIRECT Low Emissions Asian Development (LEAD) Program Retrieved from...

  1. Low Emission Asian Development (LEAD) Program | Open Energy Informatio...

    Open Energy Info (EERE)

    Low Emission Asian Development (LEAD) Program Redirect page Jump to: navigation, search REDIRECT Low Emissions Asian Development (LEAD) Program Retrieved from "http:...

  2. LEDSGP/about/African Climate and Development Society | Open Energy...

    Open Energy Info (EERE)

    LEDSGPaboutAfrican Climate and Development Society < LEDSGP | about(Redirected from African Climate and Development Society) Redirect page Jump to: navigation, search...

  3. GRR | Open Energy Information

    Open Energy Info (EERE)

    from Geothermal Regulatory Roadmap) Redirect page Jump to: navigation, search REDIRECT RAPIDRoadmapGeo Retrieved from "http:en.openei.orgwindex.php?titleGRR&oldid704770...

  4. Help:Linked images | Open Energy Information

    Open Energy Info (EERE)

    Linked images Redirect page Jump to: navigation, search REDIRECT Manual:Linked images Retrieved from "http:en.openei.orgwindex.php?titleHelp:Linkedimages&oldid58478" ...

  5. UNEP-Ethiopia-Facilitating Implementation and Readiness for Mitigation...

    Open Energy Info (EERE)

    UNEP-Ethiopia-Facilitating Implementation and Readiness for Mitigation (FIRM) Redirect page Jump to: navigation, search REDIRECT Facilitating Implementation and Readiness for...

  6. UNDP/EC-China-Climate Change Capacity Building Program | Open...

    Open Energy Info (EERE)

    UNDPEC-China-Climate Change Capacity Building Program Redirect page Jump to: navigation, search REDIRECT EU-UNDP Low Emission Capacity Building Programme (LECBP) Retrieved from...

  7. CDKN-CARICOM-Trinidad and Tobago-A Regional Implementation Plan...

    Open Energy Info (EERE)

    CDKN-CARICOM-Trinidad and Tobago-A Regional Implementation Plan for CARICOM's Regional Climate Change Resilience Framework Redirect page Jump to: navigation, search REDIRECT...

  8. United States Department of Energy | Open Energy Information

    Open Energy Info (EERE)

    Department of Energy) Redirect page Jump to: navigation, search REDIRECT DOE Retrieved from "http:en.openei.orgwindex.php?titleUnitedStatesDepartmentofEnergy&oldid79705...

  9. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    ... R Note: If Electronic Document is hosted at the submitting site, the URL for the PDF ... O Site URL If Electronic Document is hosted at the submitting site, the URL for the PDF ...

  10. Benzo[a]pyrene affects Jurkat T cells in the activated state via the antioxidant response element dependent Nrf2 pathway leading to decreased IL-2 secretion and redirecting glutamine metabolism

    SciTech Connect (OSTI)

    Murugaiyan, Jayaseelan; Rockstroh, Maxie; Wagner, Juliane; Baumann, Sven; Schorsch, Katrin; Trump, Saskia; Lehmann, Irina; Bergen, Martin von; Tomm, Janina M.

    2013-06-15

    There is a clear evidence that environmental pollutants, such as benzo[a]pyrene (B[a]P), can have detrimental effects on the immune system, whereas the underlying mechanisms still remain elusive. Jurkat T cells share many properties with native T lymphocytes and therefore are an appropriate model to analyze the effects of environmental pollutants on T cells and their activation. Since environmental compounds frequently occur at low, not acute toxic concentrations, we analyzed the effects of two subtoxic concentrations, 50 nM and 5 μM, on non- and activated cells. B[a]P interferes directly with the stimulation process as proven by an altered IL-2 secretion. Furthermore, B[a]P exposure results in significant proteomic changes as shown by DIGE analysis. Pathway analysis revealed an involvement of the AhR independent Nrf2 pathway in the altered processes observed in unstimulated and stimulated cells. A participation of the Nrf2 pathway in the change of IL-2 secretion was confirmed by exposing cells to the Nrf2 activator tBHQ. tBHQ and 5 μM B[a]P caused similar alterations of IL-2 secretion and glutamine/glutamate metabolism. Moreover, the proteome changes in unstimulated cells point towards a modified regulation of the cytoskeleton and cellular stress response, which was proven by western blotting. Additionally, there is a strong evidence for alterations in metabolic pathways caused by B[a]P exposure in stimulated cells. Especially the glutamine/glutamate metabolism was indicated by proteome pathway analysis and validated by metabolite measurements. The detrimental effects were slightly enhanced in stimulated cells, suggesting that stimulated cells are more vulnerable to the environmental pollutant model compound B[a]P. - Highlights: • B[a]P affects the proteome of Jurkat T cells also at low concentrations. • Exposure to B[a]P (50 nM, 5 μM) did not change Jurkat T cell viability. • Both B[a]P concentrations altered the IL-2 secretion of stimulated cells. • 608 different protein spots of Jurkat T cells were quantified using 2-DE-DIGE. • Pathway analysis identified Nrf2 and AhR pathway as regulated.

  11. Property:Geothermal/Partner3Website | Open Energy Information

    Open Energy Info (EERE)

    Partner3Website Jump to: navigation, search Property Name GeothermalPartner3Website Property Type URL Description Partner 3 Website (URL) Pages using the property "Geothermal...

  12. Property:Geothermal/NewsWebsite | Open Energy Information

    Open Energy Info (EERE)

    search Property Name GeothermalNewsWebsite Property Type URL Description News Web URL Retrieved from "http:en.openei.orgwindex.php?titleProperty:Geothermal...

  13. Template:FacebookLike | Open Energy Information

    Open Energy Info (EERE)

    FacebookLike Jump to: navigation, search This template puts a Facebook "Like" button onto the current page. Parameters Parameter Type Required? Example Description url URL Y...

  14. Property:Geothermal/Partner7Website | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search Property Name GeothermalPartner7Website Property Type URL Description Partner 7 Website (URL) Pages using the property "GeothermalPartner7Website"...

  15. Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    redirects to http://www-ssrl.slac.stanford.edu/spps/index.html

  16. RAPID/Best Practices/Memorandums of Understanding (MOUs) | Open...

    Open Energy Info (EERE)

    Practices(Redirected from RAPIDBest PracticesMemorandums of Understanding (MOUs) for Interstate Transmission Projects)...

  17. Philippines-Measuring, Reporting, and Verifying (MRV) of Transport...

    Open Energy Info (EERE)

    (Redirected from Measuring, Reporting, and Verifying (MRV) of Transport Nationally Appropriate Mitigation Actions (NAMAs) Phase II)...

  18. A tamper-indicating quantum seal

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Brian P.; Britt, Keith A.; Humble, Travis S.

    2016-01-04

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through amore » fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of 10–9 for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. As a result, these tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.« less

  19. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  20. V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters

  1. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  2. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  3. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  4. Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.

    SciTech Connect (OSTI)

    Clem, John; Urias, Vincent; Atkins, William Dee; Symonds, Christopher J.

    2015-12-08

    Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.

  5. PERFLUOROCARBON GAS TRACER STUDIES TO SUPPORT RISK ASSESSMENT MODELING OF CRITICAL INFRASTRUCTURE SUBJECTED TO TERRORIST ATTACKS.

    SciTech Connect (OSTI)

    SULLIVAN, T.M.; HEISER, J.; WATSON, T.; ALLWINE, K.J.; FLAHERTY, J.E.

    2006-05-06

    Development of real-time predictive modeling to identify the dispersion and/or source(s) of airborne weapons of mass destruction including chemical, biological, radiological, and nuclear material in urban environments is needed to improve response to potential releases of these materials via either terrorist or accidental means. These models will also prove useful in defining airborne pollution dispersion in urban environments for pollution management/abatement programs. Predicting gas flow in an urban setting on a scale of less than a few kilometers is a complicated and challenging task due to the irregular flow paths that occur along streets and alleys and around buildings of different sizes and shapes, i.e., ''urban canyons''. In addition, air exchange between the outside and buildings and subway areas further complicate the situation. Transport models that are used to predict dispersion of WMD/CBRN materials or to back track the source of the release require high-density data and need defensible parameterizations of urban processes. Errors in the data or any of the parameter inputs or assumptions will lead to misidentification of the airborne spread or source release location(s). The need for these models to provide output in a real-time fashion if they are to be useful for emergency response provides another challenge. To improve the ability of New York City's (NYC's) emergency management teams and first response personnel to protect the public during releases of hazardous materials, the New York City Urban Dispersion Program (UDP) has been initiated. This is a four year research program being conducted from 2004 through 2007. This paper will discuss ground level and subway Perfluorocarbon tracer (PFT) release studies conducted in New York City. The studies released multiple tracers to study ground level and vertical transport of contaminants. This paper will discuss the results from these tests and how these results can be used for improving transport models needed for risk assessment.

  6. Summary Document: Restoration Plan for Major Airports after a Bioterrorist Attack

    SciTech Connect (OSTI)

    Raber, E

    2007-01-11

    This document provides general guidelines for developing a Restoration Plan for a major airport following release of a biological warfare agent. San Francisco International Airport was selected as the example airport during development of the Plan to illustrate specific details. The spore forming bacterium Bacillus anthracis was selected as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the agents most likely to be used as a biological weapon. The focus of the Plan is on activities associated with the Characterization, Remediation, and Clearance Phases that are defined herein. Activities associated with the Notification and First-Response Phases are briefly discussed in Appendixes A and B, respectively. In addition to the main text of this Plan and associated appendixes, a data supplement was developed specifically for San Francisco International Airport. Requests for the data supplement must be made directly to the Emergency Planning Operations Division of San Francisco International Airport.

  7. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  8. T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input before displaying the input.

  9. AZALIA: an A to Z Assessment of the Likelihood of Insider Attack

    SciTech Connect (OSTI)

    Bishop, Matt; Gates, Carrie; Frincke, Deborah A.; Greitzer, Frank L.

    2009-05-12

    Recent surveys indicate that the ``financial impact and operating losses due to insider intrusions are increasing'' . Within the government, insider abuse by those with access to sensitive or classified material can be particularly damaging. Further, the detection of such abuse is becoming more difficult due to other influences, such as out-sourcing, social networking and mobile computing. This paper focuses on a key aspect of our enterprise-wide architecture: a risk assessment based on predictions of the likelihood that a specific user poses an increased risk of behaving in a manner that is inconsistent with the organizations stated goals and interests. We present a high-level architectural description for an enterprise-level insider threat product and we describe psychosocial factors and associated data needs to recognize possible insider threats.

  10. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  11. Statement on the Eighth Anniversary of the 9/11 Attacks | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    "The families of the victims are in all of our thoughts and prayers today." Media ... of the Savannah River Special Emphasis Planning Committee, meets with Dot Harris at the ...

  12. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C.

    2010-08-24

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  13. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  14. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    SciTech Connect (OSTI)

    Langton, C

    2008-08-19

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM{reg_sign} code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM{reg_sign} code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is underway to validate the predicted results. Samples of saltstone were also prepared and will be evaluated for durability using the STADIUM{reg_sign} code and SIMCO methodology. Results available as of August 15 are included in this draft report. A complete set of results for saltstone will be available by December 31, 2008.

  15. 404 Not Found

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    URL /projects/science_requirements/BES/doc/BES-NERSC-Process.pdf was not found on

  16. 404 Not Found

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    URL /projects/science_requirements/HEP/HEP-Szalay.pdf was not found on

  17. test1 | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    test1 Subscribe to test1 feed URL: https://nnsa.energy.gov/ Updated: 3 min

  18. Fenton Hill Hdr Area | Open Energy Information

    Open Energy Info (EERE)

    Hill Hdr Area Redirect page Jump to: navigation, search REDIRECT Fenton Hill Hdr Geothermal Area Retrieved from "http:en.openei.orgwindex.php?titleFentonHillHdrArea&oldid...

  19. Help:Deleting a page | Open Energy Information

    Open Energy Info (EERE)

    helpfully redirect to the information. See Help:Redirects The page is out-of-date -- Re-word sentences to be in the past tense, to make the page an historical record....

  20. JCP&L | Open Energy Information

    Open Energy Info (EERE)

    JCP&L Redirect page Jump to: navigation, search REDIRECT Jersey Central Power & Lt Co Retrieved from "http:en.openei.orgwindex.php?titleJCP%26L&oldid324276" Feedback...

  1. RAPID/Geothermal/Exploration/California | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalExplorationCalifornia < RAPID | Geothermal | Exploration(Redirected from RAPIDOverviewGeothermalExplorationCalifornia) Jump to: navigation, search RAPID...

  2. C.R.S. 37-90.5-107 Relationship to water - when permit required...

    Open Energy Info (EERE)

    (Redirected from Colorado CRS 37-90.5-107, Water Rights and Irrigation Permiting for Geothermal Resources)...

  3. Fast Out of the Gate: How Developing Asian Countries can Prepare...

    Open Energy Info (EERE)

    (Redirected from Fast Out of the Gate: How Developing Asian Countries can Prepare to Access International Green Growth Financing)...

  4. Rwanda-Project to Develop a National Strategy on Climate Change...

    Open Energy Info (EERE)

    (Redirected from SSEE-Project to Develop a Rwandan National Strategy on Climate Change and Low Carbon Development)...

  5. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates (Redirected from EMA Associates) Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website:...

  6. PNNL Electricity Infrastructure Operations Center | Open Energy...

    Open Energy Info (EERE)

    PNNL Electricity Infrastructure Operations Center (Redirected from Electricity Infrastructure Operations Center) Jump to: navigation, search Logo: Electricity Infrastructure...

  7. H. R. S. 182 - Reservation and Disposition of Government Mineral...

    Open Energy Info (EERE)

    (Redirected from Hawaii Revised Statute 182-1, Definitions for Reservation and Disposition of Government Mineral Rights)...

  8. Peru-GEF Nationally Appropriate Mitigation Actions in the Energy...

    Open Energy Info (EERE)

    (Redirected from UNDP-Peru GEF Nationally Appropriate Mitigation Actions in the Energy Generation and End-Use Sectors)...

  9. Generalized Comprehensive Mitigation Assessment Process (GCOMAP...

    Open Energy Info (EERE)

    Generalized Comprehensive Mitigation Assessment Process (GCOMAP) (Redirected from GCOMAP) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Generalized Comprehensive...

  10. Geothermal Energy | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Energy (Redirected from Geothermal) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Overview Technologies Resources Market Data Geothermal Topics Data...

  11. Hydrodynamic Testing Facilities Database | Open Energy Information

    Open Energy Info (EERE)

    Hydrodynamic Testing Facilities Database (Redirected from Hydrodynamic Testing Facilities) Jump to: navigation, search Facility Operators By viewing Hydrodynamic Testing Facilities...

  12. Philippines-Ortigas Greenways: Demonstrating Innovation in Walkable...

    Open Energy Info (EERE)

    Philippines-Ortigas Greenways: Demonstrating Innovation in Walkable Districts (Redirected from Ortigas Greenways: Demonstrating Innovation in Walkable Districts) Jump to:...

  13. TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft

    SciTech Connect (OSTI)

    1980-12-31

    The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

  14. Modeling of Damage, Permeability Changes and Pressure Responses...

    Office of Scientific and Technical Information (OSTI)

    the TSX Tunnel in Granitic Rock at URL, Canada Citation Details In-Document Search ... the TSX Tunnel in Granitic Rock at URL, Canada This paper presents numerical modeling of ...

  15. Error 404 - Document not found

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govErrors ERROR 404 - URL Not Found We are sorry but the URL that you have requested cannot be found or it is linked to a file that no longer exists. Please check the spelling or...

  16. Property:FacebookPage | Open Energy Information

    Open Energy Info (EERE)

    search Property Name FacebookPage Property Type URL Description The URL for a Facebook page. It should start with https:www.facebook.com Pages using the property...

  17. Property:Incentive/Auth7Link | Open Energy Information

    Open Energy Info (EERE)

    Auth7Link Jump to: navigation, search Property Name IncentiveAuth7Link Property Type URL Description Url link to authority. Pages using the property "IncentiveAuth7Link" Showing...

  18. Property:Incentive/Auth9Link | Open Energy Information

    Open Energy Info (EERE)

    Auth9Link Jump to: navigation, search Property Name IncentiveAuth9Link Property Type URL Description Url link to authority. Pages using the property "IncentiveAuth9Link" Showing...

  19. Property:Incentive/Auth11Link | Open Energy Information

    Open Energy Info (EERE)

    1Link Jump to: navigation, search Property Name IncentiveAuth11Link Property Type URL Description Url link to authority Pages using the property "IncentiveAuth11Link" Showing 20...

  20. Methodology for comparing a standoff weapon with current conventional munitions in a runway attack scenario. Master's thesis

    SciTech Connect (OSTI)

    Coulter, D.M.; Fry, D.W.

    1986-03-01

    This research developed a SLAM discrete-event simulation model to support a methodology for comparing a standoff weapon with current conventional weapons. This study is limited to the defensive threats within a 20-NM terminal area surrounding a generic Warsaw Pact airfield. The emphasis of the study was simulation of the standoff weapon interactions with the terminal threats. Previous models have not attempted to model the threat reactions to the standoff-weapons. The resulting simulation enables the analyst to study the effects of weapon release conditions on weapon attrition, runway damage effectiveness, and aircraft attrition.

  1. King has no clothes: The role of the military in responding to a terrorist chemical/biological attack. Final report

    SciTech Connect (OSTI)

    Osterman, J.L.

    1996-06-14

    The United States has begun a program of counterproliferation in order to preempt the use of WMD by such elements, however, the ability to respond to the terrorist employment of biological/chemical weapons is absent. Given the structure, capability and technical expertise in the Federal Emergency Management Agency (FEMA) and the Federal Bureau of Investigation (FBI), the Department of Defense (DoD) will be tasked to conduct the response to such an incident. The geographical Commander in Chief (CINC) and the appointed Joint Task Force (JTF) commander will ultimately be assigned the response mission. Planning, training and coordination is required to develop a force capable of responding in a timely and coordinated manner.

  2. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation.

  3. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement...

    Office of Scientific and Technical Information (OSTI)

    Resource Relation: Journal Name: International Journal of Greenhouse Gas Control; Journal Volume: 27 Publisher: Elsevier Research Org: National Energy Technology Laboratory - ...

  4. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  5. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  6. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  7. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-04-30

    {alpha} - Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}). The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor.

  8. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect (OSTI)

    Scott X. Mao

    2004-08-31

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray onto to the surface of YSZ coating. Oxidation at high temperature and hot corrosion tests showed that Al{sub 2}O{sub 3} overlay deposited on the YSZ TBCs surface can not only reduce the hot corrosion rate, but also significantly prevents the bond coat from oxidation.

  9. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect (OSTI)

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  10. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.