Powered by Deep Web Technologies
Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Redirection  

Science Conference Proceedings (OSTI)

... If this page does not automatically redirect you within a few seconds to http://matplotlib.sourceforge.net/api/matplotlib_configuration_api.html, you ...

2

Redirection  

Science Conference Proceedings (OSTI)

... If this page does not automatically redirect you within a few seconds to http://matplotlib.sourceforge.net/api/colors_api.html, you can click on the link ...

3

Redirection  

Science Conference Proceedings (OSTI)

... If this page does not automatically redirect you within a few seconds to http://code.google.com/p/pyamg/, you can click on the link manually to ...

4

Redirection  

Science Conference Proceedings (OSTI)

... If this page does not automatically redirect you within a few seconds to http://www.microsoft.com/windows/, you can click on the link manually to ...

5

Redirection  

Science Conference Proceedings (OSTI)

... If this page does not automatically redirect you within a few seconds to http://git-scm.com/book, you can click on the link manually to complete the ...

6

URL | Open Energy Information  

Open Energy Info (EERE)

URL URL Jump to: navigation, search Properties of type "URL" Showing 58 properties using this type. B Property:Buildings/ModelIdfFile Property:Buildings/ModelXmlFile Property:Buildings/PublicationURL E Property:EnergyAccessWebsite Property:Event/Website F Property:File/SourceURL Property:Foaf/Homepage Property:Foaf/Page G Property:GeoNames URL Property:Geothermal/AwardeeWebsite Property:Geothermal/NewsWebsite Property:Geothermal/Partner10Website Property:Geothermal/Partner11Website Property:Geothermal/Partner1Website Property:Geothermal/Partner2Website Property:Geothermal/Partner3Website Property:Geothermal/Partner4Website Property:Geothermal/Partner5Website Property:Geothermal/Partner6Website G cont. Property:Geothermal/Partner7Website Property:Geothermal/Partner8Website

7

Property:NEPA EA EIS Report Url | Open Energy Information  

Open Energy Info (EERE)

EA EIS Report Url Jump to: navigation, search Property Name NEPA EA EIS Report Url Property Type URL Description URLs to EAEIS Reports for NEPA Docs This is a property of type...

8

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: cURL Lets Remote Users Decrypt SSL/TLS Traffic 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows

9

Property:KML URL | Open Energy Information  

Open Energy Info (EERE)

KML URL KML URL Jump to: navigation, search This is a property of type URL. Pages using the property "KML URL" Showing 25 pages using this property. (previous 25) (next 25) A Afghanistan + http://finder.geocommons.com/overlays/download/7784.kml + Alabama + http://finder.geocommons.com/overlays/download/1198.kml + Alabama's 1st congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 2nd congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 3rd congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 4th congressional district + http://finder.geocommons.com/overlays/download/323810.kml + Alabama's 5th congressional district + http://finder.geocommons.com/overlays/download/323810.kml +

10

Help:Redirects | Open Energy Information  

Open Energy Info (EERE)

Redirects Redirects Jump to: navigation, search Redirects are used to forward users from one page name to another. They can be useful if a particular article is referred to by multiple names, or has alternative punctuation, capitalization or spellings. Contents 1 Creating a redirect 2 Viewing a redirect 3 Deleting a redirect 4 Double redirects 5 A redirect to a page in the category namespace Creating a redirect You may start a new page with the name you want to direct from (see Help:Starting a new page). You can also use an existing page that you are making inactive as a page by going to that page and using the "edit" tab at the top. In either case, you will be inserting the following code at the very first text position of the Edit window for the page: #REDIRECT [[pagename]]

11

V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Struts DefaultActionMapper Redirection and OGNL 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA54118 Apache Security Bulletin S2-16 Apache Security Bulletin S2-17 CVE-2013-2248 CVE-2013-2251 IMPACT ASSESSMENT: High DISCUSSION: 1) Input passed via the "redirect:" and "redirectAction:" prefixing parameters is not properly verified in the DefaultActionMapper class

12

Property:Buildings/PublicationURL | Open Energy Information  

Open Energy Info (EERE)

PublicationURL PublicationURL Jump to: navigation, search This is a property of type URL. Pages using the property "Buildings/PublicationURL" Showing 2 pages using this property. G General Merchandise 50% Energy Savings Technical Support Document 2009 + http://www.nrel.gov/docs/fy09osti/46100.pdf + Grocery Store 50% Energy Savings Technical Support Document 2009 + http://www.nrel.gov/docs/fy09osti/46101.pdf + Retrieved from "http://en.openei.org/w/index.php?title=Property:Buildings/PublicationURL&oldid=269807#SMWResults" What links here Related changes Special pages Printable version Permanent link Browse properties About us Disclaimers Energy blogs Linked Data Developer services OpenEI partners with a broad range of international organizations to grow

13

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

14

Twenty Years of Underground Research at Canada's URL  

Science Conference Proceedings (OSTI)

Construction of Atomic Energy of Canada Limited's (AECL's) Underground Research Laboratory (URL) began in 1982. The URL was designed to address the needs of the Canadian nuclear fuel waste management program. Over the years, a comprehensive program of geologic characterization and underground hydrogeologic, geotechnical and geomechanical projects have been performed, many of which are ongoing. The scientific work at the URL has evolved through a number of different phases to meet the changing needs of Canada's waste management program. The various phases of the URL have included siting, site evaluation, construction and operation. Collaboration with international organizations is encouraged at the URL, with the facility being a centre of excellence in an International Atomic Energy Agency (IAEA) network of underground facilities. One of AECL's major achievements of the past 20 year program has been the preparation and public defense of a ten-volume Environmental Impact Statement (EIS) for a conceptual deep geologic repository. Completion of this dissertation on the characterization, construction and performance modeling of a conceptual repository in the granite rock of the Canadian Shield was largely based on work conducted at the URL. Work conducted over the seven years since public defense of the EIS has been directed towards developing those engineering and performance assessment tools that would be required for implementation of a deep geologic repository. The URL continues to be a very active facility with ongoing experiments and demonstrations performed for a variety of Canadian and international radioactive waste management organizations.

Chandler, N. A.

2003-02-27T23:59:59.000Z

15

Property:GeoNames URL | Open Energy Information  

Open Energy Info (EERE)

URL URL Jump to: navigation, search This is a property of type URL. Pages using the property "GeoNames URL" Showing 25 pages using this property. (previous 25) (next 25) A Abbotsford, Australia + http://sws.geonames.org/2178377/ + Abidjan, CĂ´te d'Ivoire + http://sws.geonames.org/2293538/ + Abu Dhabi, United Arab Emirates + http://sws.geonames.org/292968/ + Accra, Ghana + http://sws.geonames.org/2306104/ + Alberta + http://sws.geonames.org/5883102/ + Alger, Algeria + http://sws.geonames.org/2507480/ + Almo, Idaho + http://sws.geonames.org/5583921/ + Anaconda, Montana + http://sws.geonames.org/5637146/ + Animas, New Mexico + http://sws.geonames.org/5455243/ + Ankara, Turkey + http://sws.geonames.org/323786/ + Argonne, Illinois + http://sws.geonames.org/4883533/ +

16

Light redirective display panel and a method of making a light redirective display panel  

DOE Patents (OSTI)

An optical display panel which provides improved light intensity at a viewing angle by redirecting light emitting from the viewing screen, and a method of making a light redirective display panel, are disclosed. The panel includes an inlet face at one end for receiving light, and an outlet screen at an opposite end for displaying the light. The inlet face is defined at one end of a transparent body, which body may be formed by a plurality of waveguides, and the outlet screen is defined at an opposite end of the body. The screen includes light redirective elements at the outlet screen for re-directing light emitting from the outlet screen. The method includes stacking a plurality of glass sheets, with a layer of adhesive or epoxy between each sheet, curing the adhesive to form a stack, placing the stack against a saw and cutting the stack at two opposite ends to form a wedge-shaped panel having an inlet face and an outlet face, and forming at the outlet face a plurality of light redirective elements which direct light incident on the outlet face into a controlled light cone.

Veligdan, James T. (Manorville, NY)

2002-01-01T23:59:59.000Z

17

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service October 1, 2012 -...

18

UTask-Web URL http://park.itc.u-tokyo.ac.jp/kyomu/info/zenki/zenki-top/framepage7.htm URL https://zkyomu-m.c.u-tokyo.ac.jp/UTask-m/mobile  

E-Print Network (OSTI)

UTask-Web 1 UTask-Web UTask-Web 12 ID UTask-Web UTask-Web URL http://park.itc.u-tokyo.ac.jp/kyomu/info/zenki/zenki-top/framepage7.htm URL https://zkyomu-m.c.u-tokyo.ac.jp/UTask-m/mobile 2011 10 #12;UTask-Web 2 UTask-WebWeb................................................... 3 UTask-Web

Katsumoto, Shingo

19

Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options -New York Times January 22, 2008  

E-Print Network (OSTI)

toward the annual target of biofuels making up 5.75 percent of transportation fuel. httpEurope, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options - New York Times January 22, 2008 Europe, Cutting Biofuel Subsidies, Redirects Aid to Stress Greenest Options By ELISABETH

20

Article URL  

E-Print Network (OSTI)

PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Relationship between perceived body weight and body mass index based on self- reported height and weight among university students: a cross-sectional study in seven European countries

Rafael T Mikolajczyk; Annette E Maxwell; Walid El Ansari; Christiane Stock; Janina Petkeviciene; Rafael T. Mikolajczyk; Annette E. Maxwell; Walid El Ansari; Christiane Stock; Francisco Guillen-grima

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Article URL  

E-Print Network (OSTI)

This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. New views on the hypothesis of respiratory cancer risk from soluble nickel exposure; and reconsideration of this risk's historical sources in nickel refineries

James G. Heller; Philip G. Thornhill; Bruce R. Conard; James G. Heller; Philip G. Thornhill; Bruce R. Conard

2009-01-01T23:59:59.000Z

22

Article URL  

E-Print Network (OSTI)

PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Genome-wide interval mapping using SNPs identifies new QTL for growth, body composition and several physiological variables in an F2 intercross between fat and lean chicken lines

Olivier Demeure; Michel J Duclos; Nicola Bacciu; Guillaume Le Mignon; Olivier Filangi; Frédérique Pitel; Anne Boland; Sandrine Lagarrigue; Larry A Cogburn; Jean Simon; Pascale Le Roy

2013-01-01T23:59:59.000Z

23

Article URL  

E-Print Network (OSTI)

This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. A phase II clinical trial to assess the safety of clonidine in acute organophosphorus pesticide poisoning

Shaluka F Jayamanna; Raja Hettiarachchi; Chandana Abeysinghe; Harindra Karunatilake; Andrew H. Dawson; Nick A Buckley; Polwattage M. S. Perera; Shaluka F. Jayamanna; Raja Hettiarachchi; Harindra Karunatilake; Andrew H. Dawson; Nick A. Buckley

2008-01-01T23:59:59.000Z

24

Article URL  

E-Print Network (OSTI)

PDF corresponds to the article as it appeared upon acceptance. Copyedited and fully formatted PDF and full text (HTML) versions will be made available soon. Genomic and small RNA sequencing of Miscanthus x giganteus shows the utility of sorghum as a reference genome sequence for Andropogoneae grasses

Kankshita Swaminathan; Magdy Alabady; Kranthi Varala; Isaac Ho; Dan S Rokhsar; Aru K Arumuganathan; Ray Ming; Pamela J Green; Blake C Meyers; Stephen P Moose; Kankshita Swaminathan; Magdy Alabady; Kranthi Varala; Emanuele De Paoli; Isaac Ho; Dan Rokhsar; Aru K Arumuganathan; Ray Ming; Pamela J Green; Blake C Meyers; Stephen P Moose; Matthew E Hudson

2009-01-01T23:59:59.000Z

25

Article URL  

E-Print Network (OSTI)

PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Endometrial cancer in Puerto Rico: incidence, mortality and survival (1992-2003)

Ana P Ortiz; Javier Perez; Katherine Svensson; Karen Ortiz; Mariela Torres; José L. Vergara-arroyo; Karen Ortiz; Mariela Torres; Guillermo Tortolero-luna

2009-01-01T23:59:59.000Z

26

Article URL  

E-Print Network (OSTI)

PDF corresponds to the article as it appeared upon acceptance. Copyedited and fully formatted PDF and full text (HTML) versions will be made available soon. Retrospective genomic analysis of sorghum adaptation to temperate-zone grain production

Carrie S Thurber; Justin M Ma; Race H Higgins; Patrick J Brown; Carrie S Thurber; Justin M Ma; Race H Higgins; Patrick J Brown

2013-01-01T23:59:59.000Z

27

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide April 3, 2009 - 5:47pm Addthis Allison Casey Senior Communicator, NREL If you're a regular visitor to EERE's Consumer's Guide to Energy Efficiency and Renewable Energy, you may have noticed some changes this week. The site has moved to EnergySavers.gov and is now called "Energy Savers." The same in-depth information is still available, and we hope this new address will make the site easier for people to find. Along with this move came a home page facelift. Visit the site at EnergySavers.gov and let us know what you think! In the spirit of spring renewal, we've also refreshed our seasonal Web site; the winter "Stay Warm, Save Money" site is now " Stay Cool, Save

28

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide EnergySavers.gov: A New Season, a New URL for the Consumer's Guide April 3, 2009 - 5:47pm Addthis Allison Casey Senior Communicator, NREL If you're a regular visitor to EERE's Consumer's Guide to Energy Efficiency and Renewable Energy, you may have noticed some changes this week. The site has moved to EnergySavers.gov and is now called "Energy Savers." The same in-depth information is still available, and we hope this new address will make the site easier for people to find. Along with this move came a home page facelift. Visit the site at EnergySavers.gov and let us know what you think! In the spirit of spring renewal, we've also refreshed our seasonal Web site; the winter "Stay Warm, Save Money" site is now " Stay Cool, Save

29

University of Regina -Student Counts as of AUCC National Fall Count Data URL: http://www.uregina.ca/orp/facts.shtml  

E-Print Network (OSTI)

University of Regina - Student Counts as of AUCC National Fall Count Data URL: http://www.uregina.ca/orp

Argerami, Martin

30

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

31

Probabilistic algebraic attacks  

Science Conference Proceedings (OSTI)

This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the ... Keywords: algebraic attack, algebraic immunity, annihilator, combination and filter generator, walsh spectrum

An Braeken; Bart Preneel

2005-12-01T23:59:59.000Z

32

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

33

Seven Deadliest Network Attacks  

Science Conference Proceedings (OSTI)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

2010-05-01T23:59:59.000Z

34

Attacking the Kad network  

Science Conference Proceedings (OSTI)

The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network and has over 1 million concurrent nodes. We describe several attacks that exploit critical design weaknesses in Kad to allow ... Keywords: Kad, P2P, attack, security

Peng Wang; James Tyra; Eric Chan-Tin; Tyson Malchow; Denis Foo Kune; Nicholas Hopper; Yongdae Kim

2008-09-01T23:59:59.000Z

35

URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1  

E-Print Network (OSTI)

URL: http://www.elsevier.nl/locate/entcs/volume68.html 18 pages Timed CSP = Closed Timed Automata 1 70118, USA Abstract We study the expressive power of an augmented version of Timed CSP and show constraints. We also show that this new version of Timed CSP is expressive enough to capture the most widely

Ouaknine, Joël

36

../fusion/templates/mapguide/maroon/css/maroon_fusion.css background-image: url(../images/background.gif);  

E-Print Network (OSTI)

../fusion/templates/mapguide/maroon/css/maroon_fusion.css body { background-image: url(../images/background.gif); ../fusion/templates/mapguide/maroon/css/ maroon_fusion.css body { background-color: #3e5c5f; ../fusion/templates/mapguide/maroon/css/ maroon_fusion.css #ToolbarVertical { background: #500000; maroon_fusion.css #Toolbar { background

Ahmad, Sajjad

37

Titel Autor Jahr URL Accounting in a Nutshell Janet Walker 2009 http://www.sciencedirect.com/science/book/9780750687386  

E-Print Network (OSTI)

Titel Autor Jahr URL Accounting in a Nutshell Janet Walker 2009 http://www.sciencedirect.com/science/book/9780750687386 Benefits of e-business performance measurement systems, The Hinton, Matthew 2008 http://www.sciencedirect.com/science/book/9781856175258 Controlling Collaboration between Firms Angelo Ditillo, Ariela Caglio 2009 http://www.sciencedirect.com/science/book

OsnabrĂĽck, University of

38

Introduction to side channel attacks and non invasive attacks  

Science Conference Proceedings (OSTI)

... FIPS conference side channel attacks and perturbation attacks 7 Pow er analysis Pow er leakage usec m A Instruction fetch Instruction processing ...

2007-09-21T23:59:59.000Z

39

Extending the resynchronization attack  

Science Conference Proceedings (OSTI)

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their ...

Frederik Armknecht; Joseph Lano; Bart Preneel

2004-08-01T23:59:59.000Z

40

Beware of BGP attacks  

Science Conference Proceedings (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. ...

Ola Nordström; Constantinos Dovrolis

2004-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Empirical assessment of a prismatic daylight-redirecting window film in a  

NLE Websites -- All DOE Office Websites (Extended Search)

Empirical assessment of a prismatic daylight-redirecting window film in a Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed Title Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed Publication Type Conference Paper LBNL Report Number LBNL-6496E Year of Publication 2013 Authors Thanachareonkit, Anothai, Eleanor S. Lee, and Andrew McNeil Conference Name Illuminating Engineering Society (IES) Annual Conference 2013 Date Published 10/2013 Conference Location Huntington Beach, California Keywords building energy efficiency., daylighting, microstructure film, prismatic film, windows Abstract Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing windows as a retrofit measure or installed as a replacement insulating glass unit in the clerestory portion of the window wall. A clear film patterned with linear, 50-250 micrometer high, four-sided asymmetrical prisms was fabricated and installed in the south-facing, clerestory low-e, clear glazed windows of a full-scale testbed facility. Views through the film were distorted. The film was evaluated in a sunny climate over a two-year period to gauge daylighting and visual comfort performance. The daylighting aperture was small (window-to-wall ratio of 0.18) and the lower windows were blocked off to isolate the evaluation to the window film. Workplane illuminance measurements were made in the 4.6 m (15 ft) deep room furnished as a private office. Analysis of discomfort glare was conducted using high dynamic range imaging coupled with the evalglare software tool, which computes the daylight glare= probability and other metrics used to evaluate visual discomfort.

42

GPS software attacks  

Science Conference Proceedings (OSTI)

Since its creation, the Global Positioning System (GPS) has grown from a limited purpose positioning system to a ubiquitous trusted source for positioning, navigation, and timing data. To date, researchers have essentially taken a signal processing approach ... Keywords: gps, rf attacks, security

Tyler Nighswander; Brent Ledvina; Jonathan Diamond; Robert Brumley; David Brumley

2012-10-01T23:59:59.000Z

43

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

44

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

45

Using multi-disciplinary strategic master facilities planning for organizations experiencing programmatic re-direction  

SciTech Connect

Facility master planning is critical to the future productivity of a laboratory and the quality of worklife for the laboratory staff. For organizations undergoing programmatic re-direction, a master facility planning approach linked to the organization`s strategic planning process is even more important. Major changes in an organization such as programmatic re-direction can significantly impact a broad range of variables which exceed the expertise of traditional planning teams, e.g., capacity variability, work team organization, organizational culture, and work process simplification. By expanding the diversity of the participants of the planning team, there is a greater likelihood that a research organization`s scientific, organizational, economic, and employees` needs can be meshed in the strategic plan and facility plan. Recent recommendations from facility planners suggest drawing from diverse fields in building multi-disciplinary planning teams: Architecture, engineering, natural science, social psychology, and strategic planning (Gibson,1993). For organizations undergoing significant operational or culture change, the master facility planning team should also include members with expertise in organizational effectiveness, industrial engineering, human resources, and environmental psychology. A recent planning and design project provides an example which illustrates the use of an expanded multi-disciplinary team engaged in planning laboratory renovations for a research organization undergoing programmatic re-direction. The purpose of the proposed poster session is to present a multi-disciplinary master facility planning process linked to an organization`s strategic planning process or organizational strategies.

Heubach, J.G.; Weimer, W.C.; Bruce, W.A.

1993-12-01T23:59:59.000Z

46

Beware of BGP Attacks  

E-Print Network (OSTI)

This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and mechanisms, assuming that one or more BGP routers have been compromised. Then, we review the existing and proposed countermeasures, showing that they are either generally ineffective (route filtering), or probably too heavyweight to deploy (S-BGP). We also review several recent proposals, and conclude by arguing that a significant research effort is urgently needed in the area of routing security.

Ola Nordström; Constantinos Dovrolis

2004-01-01T23:59:59.000Z

47

Redirecting carbon flux through exogenous pyruvate kinase to achieve high ethanol yields in Clostridium thermocellum  

NLE Websites -- All DOE Office Websites (Extended Search)

Redirecting Redirecting carbon flux through exogenous pyruvate kinase to achieve high ethanol yields in Clostridium thermocellum Yu Deng a,c , Daniel G. Olson a,c , Jilai Zhou a,c , Christopher D. Herring a,b,c , A. Joe Shaw d , Lee R. Lynd a,b,c,n a Thayer School of Engineering, Dartmouth College, Hanover, NH 03755, USA b Mascoma Corporation, Lebanon, NH 03766, USA c BioEnergy Science Center, Oak Ridge, TN 37830, USA d Novogy, Inc. Cambridge, MA 02138, USA a r t i c l e i n f o Article history: Received 24 August 2012 Received in revised form 6 November 2012 Accepted 16 November 2012 Available online 29 November 2012 Keywords: Clostridium thermocellum Ethanol yield Pyruvate kinase Malate shunt a b s t r a c t In Clostridium thermocellum, a thermophilic anaerobic bacterium able to rapidly ferment cellulose to ethanol, pyruvate kinase (EC 2.7.1.40) is absent based on both the genome sequence and enzymatic

48

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

49

Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR97-306.ps.Z AGDB: A Debugger for Agent Tcl  

E-Print Network (OSTI)

Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR97-306.ps.Z AGDB: A Debugger for Agent Tcl Melissa, dfkg@dartmouth.edu Technical Report PCS-TR97-306 February 4, 1997 Abstract The Agent Tcl language is an extension of Tcl/Tk that supports distributed programming in the form of transportable agents. AGDB

50

Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR97306.ps.Z AGDB: A Debugger for Agent Tcl  

E-Print Network (OSTI)

Available at URL ftp://ftp.cs.dartmouth.edu/TR/TR97­306.ps.Z AGDB: A Debugger for Agent Tcl Melissa, dfkg@dartmouth.edu Technical Report PCS­TR97­306 February 4, 1997 Abstract The Agent Tcl language is an extension of Tcl/Tk that supports distributed programming in the form of transportable agents. AGDB

51

Empirical assessment of a prismatic daylight-redirecting window film in a full-scale office testbed  

NLE Websites -- All DOE Office Websites (Extended Search)

for presentation to the IESNA 2013 Annual Conference, Huntington Beach, CA, for presentation to the IESNA 2013 Annual Conference, Huntington Beach, CA, October 26-29, 2013 and for publication in Leukos, the journal of the IESNA. Empirical assessment of a prismatic daylight- redirecting window film in a full-scale office testbed Anothai Thanachareonkit, Eleanor S. Lee, Andrew McNeil Building Technologies and Urban Systems Department, Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Mailstop 90-3111, 1 Cyclotron Road, Berkeley, CA 94720 USA Abstract Daylight redirecting systems with vertical windows have the potential to offset lighting energy use in deep perimeter zones. Microstructured prismatic window films can be manufactured using low-cost, roll-to-roll fabrication methods and adhered to the inside surface of existing

52

Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada  

SciTech Connect

This paper presents numerical modeling of excavation-induced damage, permeability changes, and fluid-pressure responses during excavation of the TSX tunnel at the underground research laboratory (URL) in Canada. Four different numerical models were applied, using a wide range of approaches to model damage and permeability changes in the excavation disturbed zone (EDZ) around the tunnel. Using in situ calibration of model parameters the modeling could reproduce observed spatial distribution of damage and permeability changes around the tunnel, as a combination of disturbance induced by stress redistribution around the tunnel and by the drill-and-blast operation. The modeling showed that stress-induced permeability increase above the tunnel is a result of micro and macrofracturing under high deviatoric (shear) stress, whereas permeability increases alongside the tunnel as a result of opening of existing microfractures under decreased mean stress. The remaining observed fracturing and permeability changes around the periphery of the tunnel were attributed to damage from the drill-and-blast operation. Moreover, a reasonably good agreement was achieved between simulated and observed excavation-induced pressure responses around the TSX tunnel for 1 year following its excavation. The simulations showed that these pressure responses are caused by poroelastic effects as a result of increasing or decreasing mean stress, with corresponding contraction or expansion of the pore volume. The simulation results for pressure evolution were consistent with previous studies, indicating that the observed pressure responses could be captured in a Biot model using a relatively low Biot-Willis coefficient, {alpha} {approx} 0.2, a porosity of n {approx} 0.007, and a relatively low permeability of k {approx} 2 x 10{sup -22} m{sup 2}, which is consistent with the very tight, unfractured granite at the site.

Rutqvist, Jonny; Borgesson, Lennart; Chijimatsu, Masakazu; Hernelind, Jan; Jing, Lanru; Kobayashi, Akira; Nguyen, Son

2008-08-01T23:59:59.000Z

53

Mobile Malware Attacks and Defense  

Science Conference Proceedings (OSTI)

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian ... Keywords: Applied, Computer Science, Computers, Handheld Computing, Macintosh, Security, Viruses

Ken Dunham

2008-10-01T23:59:59.000Z

54

Attacking Automatic Wireless Network Selection  

E-Print Network (OSTI)

Wireless 802.11 networking is becoming so prevalent that many users have become accustomed to having available wireless networks in their workplace, home, and many public places such as airports and coffee shops. Modern client operating systems implement automatic wireless network discovery and known network identification to facilitate wireless networking for the end-user. In order to implement known network discovery, client operating systems remember past wireless networks that have been joined and automatically look for these networks (referred to as Preferred or Trusted Networks) whenever the wireless network adapter is enabled. By examining these implementations in detail, we have discovered previously undisclosed vulnerabilities in the implementation of these algorithms under the two most prevalent client operating systems, Windows XP and MacOS X. With custom base station software, an attacker may cause clients within wireless radio range to associate to the attacker’s wireless network without user interaction or notification. This will occur even if the user has never connected to a wireless network before or they have an empty Preferred/Trusted Networks List. We describe these vulnerabilities as well as their implementation and impact. 1

Dino A. Dai Zovi; Shane A. Macaulay

2005-01-01T23:59:59.000Z

55

Serial model for attack tree computations  

Science Conference Proceedings (OSTI)

In this paper we extend the standard attack tree model by introducing temporal order to the attacker's decision making process. This will allow us to model the attacker's behaviour more accurately, since this way it is possible to study his actions related ...

Aivo Jürgenson; Jan Willemson

2009-12-01T23:59:59.000Z

56

Sensor network configuration under physical attacks  

Science Conference Proceedings (OSTI)

Sensor networks will typically operate in hostile environments, where they are susceptible to physical attacks resulting in physical node destructions. In this paper, we study impacts of physical attacks on network configuration w.r.t. lifetime. While ... Keywords: deployment, network configuration, network lifetime, physical attacks, physical node destruction, sensor networks

Xun Wang; Wenjun Gu; Kurt Schosek; Sriram Chellappan; Dong Xuan

2009-04-01T23:59:59.000Z

57

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

58

A collusion attack optimization strategy for digital fingerprinting  

Science Conference Proceedings (OSTI)

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle of ... Keywords: Multimedia security, collusion attack, digital fingerprinting, optimization

Hui Feng; Hefei Ling; Fuhao Zou; Weiqi Yan; Zhengding Lu

2012-09-01T23:59:59.000Z

59

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

60

Cybersecurity - Foiling attackers | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Non-Invasive Attack Testing Workshop  

Science Conference Proceedings (OSTI)

Non-Invasive Attack Testing Workshop. Purpose: To encourage development of test methods, metrics and tools for evaluating the effectiveness of ...

2013-05-14T23:59:59.000Z

62

Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs  

Science Conference Proceedings (OSTI)

As computers have become ever more interconnected, the complexity of security configuration has exploded. Management tools have not kept pace, and we show that this has made identity snowball attacks into a critical danger. Identity snowball attacks ... Keywords: access control, attack graph, authentication, combinatorial optimization, identity snowball, machine learning, sparsest cut, support vector machine

John Dunagan; Alice X. Zheng; Daniel R. Simon

2009-10-01T23:59:59.000Z

63

Higher Order Differential Attack of Camellia (II)  

Science Conference Proceedings (OSTI)

Camellia is a 128-bit block cipher, proposed by NTT and Mitsubishi in 2000. It has been shown that 10 round variant without FL function under a 256-bit secret key is attackable by Higher Order Differential Attack and even if FL function is included, ...

Yasuo Hatano; Hiroki Sekine; Toshinobu Kaneko

2002-08-01T23:59:59.000Z

64

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

65

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

66

Smart Grid Integrity Attacks: Characterizations and Countermeasures  

Science Conference Proceedings (OSTI)

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

2011-10-01T23:59:59.000Z

67

Enabling FindIt!/SFX in Google ScholarTM To enable FindIt!, the Library's OpenURL linking service, in Google ScholarTM on your personal  

E-Print Network (OSTI)

Enabling FindIt!/SFX in Google ScholarTM To enable FindIt!, the Library's OpenURL linking service, in Google ScholarTM on your personal computer: 1. Start at the Google ScholarTM homepage (http://scholar.google.ca/). 2. Select "Scholar Preferences". 3. In the "Library Links" box

Peak, Derek

68

Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Charged Lepton Searches  

E-Print Network (OSTI)

for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Charged Lepton Searches Charged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITS Sequential Charged Heavy Lepton (L±) MASS LIMITSSequential Charged Heavy Lepton (L±) MASS LIMITSSequential

69

Citation: K. Nakamura et al. (Particle Data Group), JP G 37, 075021 (2010) and 2011 partial update for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Neutral Leptons, Searches for  

E-Print Network (OSTI)

for the 2012 edition (URL: http://pdg.lbl.gov) Heavy Neutral Leptons, Searches for (A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons Stable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton

70

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

71

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

72

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

73

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

74

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein  

Science Conference Proceedings (OSTI)

NIST Quantifies Low Levels of 'Heart Attack Risk' Protein. For Immediate Release: November 3, 2009. ...

2012-10-02T23:59:59.000Z

75

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

76

When Utility Bills Attack! | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

When Utility Bills Attack! When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook every year is half the fun of fiscal responsibility). But as proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills. I take a guess at what my bill will be at the beginning of the month, and then I'm either excited when the

77

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

78

Foundations of attack-defense trees  

Science Conference Proceedings (OSTI)

We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical ...

Barbara Kordy; Sjouke Mauw; Saša Radomirovi?; Patrick Schweitzer

2010-09-01T23:59:59.000Z

79

Extending gibson's attacks on the GPT cryptosystem  

Science Conference Proceedings (OSTI)

In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT). In order to avoid Gibson's attacks on GPT, several variants have been proposed. We cryptanalyze the variant with column scrambler and the one using reducible rank ...

Raphael Overbeck

2005-03-01T23:59:59.000Z

80

Defending against side-channel attacks : DynamoREA  

E-Print Network (OSTI)

Modern computer architectures are prone to leak information about their applications through side-channels caused by micro-architectural side-effects. Through these side-channels, attackers can launch timing attacks by ...

Wen, David, M. Eng. (David Y.). Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

82

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

83

Countering DoS attacks with stateless multipath overlays  

Science Conference Proceedings (OSTI)

Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that attackers will attack a fixed and bounded set of overlay nodes causing service ... Keywords: key agreement, spread-spectrum communications

Angelos Stavrou; Angelos D. Keromytis

2005-11-01T23:59:59.000Z

84

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

85

On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers  

E-Print Network (OSTI)

the vulnerabilities of DNS and SIP message handling in the Vonage phone, stealthily become the remote MITM and launch flaw in handling a malformed INVITE message, which allows the remote attacker to remotely crashOn the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers Ruishan

Wang, Xinyuan "Frank"

86

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams  

Science Conference Proceedings (OSTI)

In this paper, we present a method of handling the visualization of hetereogeneous event traffic that is generated by intrusion detection sensors, log files and other event sources on a computer network from the point of view of detecting multistage ... Keywords: attack tracks, intrusion detection, visualization

S. Mathew; R. Giomundo; S. Upadhyaya; M. Sudit; A. Stotz

2006-11-01T23:59:59.000Z

87

Analysis of Automated Model against DDoS Attacks  

E-Print Network (OSTI)

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with the overall DDoS problem. With a new packet marking technique and agent design, our approach has many advanced features to minimize the DDoS attacks within a single ISP domain. In this paper we discuss different types of attacks that are possible on our model and propose techniques to counteract the identified attacks. We will also discuss security protocols for communication between different entities in our model.

Udaya Kiran Tupakula

2003-01-01T23:59:59.000Z

88

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

89

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

90

Precision air data support for chem/bio attack response .  

E-Print Network (OSTI)

??The defense response against chemical and biological (Chem/bio) weapons has gained a renewed focus in light of the 11 Sept 2001 terrorist attack. A successful… (more)

Tan, Kwang Liang

2003-01-01T23:59:59.000Z

91

Hydrogen Attack in Creeping Polycrystals Due to Cavitation on ...  

Science Conference Proceedings (OSTI)

Sep 1, 1994 ... Hydrogen Attack (HA) is the development at elevated temperatures of grain boundary cavitation by internal methane gas, which is generated by ...

92

Rapid cooling technology could aid surgery patients, heart attack...  

NLE Websites -- All DOE Office Websites (Extended Search)

cooling technology could aid surgery patients, heart attack victims Diagram shows how ice slurry cools blood INTERNAL COOLING - An ice slurry, delivered through an endotracheal...

93

Thermal Barrier Coatings for Resistance Against Attack by Molten ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings for Resistance Against Attack by Molten Silicate Deposits from CMAS Sand, Volcanic Ash, or Coal Fly Ash Ingested ...

94

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

95

Trust Anchor Lifecycle Attack Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

secure software providing independent testing, monitoring, and control of energy control system component operation Trust Anchor Lifecycle Attack Protection More Documents...

96

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... to disrupt the energy distribution of smart ... attacks against distributed energy routing in smart grid. ... on Cyber Technology in Automation, Control, and ...

2012-04-12T23:59:59.000Z

97

Attacking the IPsec Standards in Encryption-only Configurations  

Science Conference Proceedings (OSTI)

We describe new attacks which break any RFCcompliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted ...

Jean Paul Degabriele; Kenneth G. Paterson

2007-05-01T23:59:59.000Z

98

A novel technique of recognising multi-stage attack behaviour  

Science Conference Proceedings (OSTI)

With the increasing amount of security audit data, management and analysis of it become a critical and challenging issue. Security alerts and threat analysis project (SATA) aims at analysing security events and detecting security threat. In this ... Keywords: attack plan recognition, correlativity, intrusion detection, multi-stage attacks, security alerts, security threats, threat analysis

Li Wang; Yao Li; Zhi-tang Li

2010-12-01T23:59:59.000Z

99

Selective Attack of Welds by Flow-Accelerated Corrosion  

Science Conference Proceedings (OSTI)

Flow-accelerated corrosion (FAC), a degradation mechanism that attacks carbon steel material, has been a significant issue for nuclear plants for some time. Until recently, though, welds were thought to be largely immune to this mechanism. This work demonstrates that significant weld attacks have been occurring at a number of nuclear plants throughout the world.

2002-07-26T23:59:59.000Z

100

The dark side of the Internet: Attacks, costs and responses  

Science Conference Proceedings (OSTI)

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, ... Keywords: Click fraud, Cyber warfare, Denial of service attack, Digital rights management, Hacking, Malware, Online frauds, Online gambling, Online piracy, Phishing, Spam

Won Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Survey and Simulation on Malicious Data Attack on Power Market  

E-Print Network (OSTI)

It is expected that the next generation of power grid will be more intelligent in power distribution, grid data attack. A cyber-spy may inject malicious data to make power grid in danger. In this report the financial risk of data attack, a bunch of notions with respect to power grid are studies. Observability

Lavaei, Javad

102

Heart Attack Survival Plan Information To Share With  

E-Print Network (OSTI)

Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

Bandettini, Peter A.

103

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

104

Metrics for Assessment of Smart Grid Data Integrity Attacks  

Science Conference Proceedings (OSTI)

There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

2012-07-01T23:59:59.000Z

105

TCPL: A Defense against wormhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

2010-10-26T23:59:59.000Z

106

Healing heart attack victims, one cell at a time  

NLE Websites -- All DOE Office Websites (Extended Search)

E-mail: stark8@llnl.gov FOR IMMEDIATE RELEASE April 2, 2009 NR-09-04-02 Healing heart attack victims, one cell at a time LIVERMORE, Calif. -- By using the amount of carbon...

107

On attack causality in internet-connected cellular networks  

Science Conference Proceedings (OSTI)

The emergence of connections between telecommunications networks and the Internet creates significant avenues for exploitation. For example, through the use of small volumes of targeted traffic, researchers have demonstrated a number of attacks capable ...

Patrick Traynor; Patrick McDaniel; Thomas La Porta

2007-08-01T23:59:59.000Z

108

Risk-Based models of attacker behavior in cybersecurity  

Science Conference Proceedings (OSTI)

Even as reliance on information and communication technology networks continues to grow, and their potential security vulnerabilities become a greater threat, very little is known about the humans who perpetrate cyber attacks--what are their strategies, ...

Si Li; Ryan Rickert; Amy Sliva

2013-04-01T23:59:59.000Z

109

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

110

Argonne applied mathematicians use INCITE awards to attack energy...  

NLE Websites -- All DOE Office Websites (Extended Search)

to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for...

111

Coordinated Variable Structure Switching Attacks for Smart Grid  

E-Print Network (OSTI)

The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop intelligent models of cyber-physical attacks that produce salient disruptions and appropriately describe meaningful cyber-physical interdependencies such that they balance precision, scale and complexity. In our research, we present a foundation for the development of a class of intelligent cyber-physical attacks termed coordinated variable structure switching attacks whereby opponents aim to destabilize the power grid through con- trolled switching sequence. Such switching is facilitated by cyber-attack and corruption of communication channels and control signals of the associated switch(es). We provide methods and theorems to construct such attack models and demonstrate their utility in the simulation of extensive system disturbances. Our proposed class of cyber-physical switching attacks for smart grid systems has the potential to disrupt large-scale power system operation within a short interval of time. Through successful cyber intrusion, an opponent can remotely apply a state- dependent coordinated switching sequence on one or more relays and circuit breakers of a power system to disrupt operation. Existence of this switching vulnerability is dependent on the local structure of the power grid. Variable structure systems theory is employed to effectively model the cyber-physical aspects of a smart grid and determine the existence of the vulnerability and construct the destabilizing switching attack sequence. We illustrate the utility of the attack approach assess its impact on the different power system test cases including the single machine infinite bus power system model and the Western Electricity Coordinating Council (WECC) 3-machine 9-bus system through MATLAB/Simulink and PSCAD simulation environment. The results demonstrate the potential of our approach for practical attack. Moreover, we build on our work in several ways. First, we extend the research to demonstrate an approach to mitigation within the variable structure system frame- work. We demonstrate via small signal analysis how through persistent switching a stable sliding mode can be used to disrupt a dynamical system that seems stable. We also design an approach to vulnerability analysis to assess the feasibility of co-ordinated variable structure switching attacks. Moreover, we study the performance of our attack construction approach when the opponent has imperfect knowledge of the local system dynamics and partial knowledge of the generator state. Based on the system with modeling errors, we study the performance of coordinated variable structure switching attacks in the presence of state estimation. Finally, we illustrate the concepts of attack model within the multiple switching framework, the cascading failure analysis is employed in the New-England 10-machine, 39-bus power system using MATLAB/Simulink and DSATools simulation environment. Our results demonstrate the potential for coordinated variable structure switching attacks to enable large-scale power system disturbances.

Liu, Shan

2013-05-01T23:59:59.000Z

112

A robust defense mechanism to prevent phishing attack using parse tree validation  

Science Conference Proceedings (OSTI)

In modern era, Web-based applications and services have changed the landscape of information delivery and exchange in today's corporate, government and educational arenas. An increase in the usage of web applications is directly related to the number ... Keywords: URL, application programming interface, blacklist, parse tree, phishing, vulnerability, web application security, web service

V. Shanmughaneethi; Regan Abraham; S. Swamynathan

2011-12-01T23:59:59.000Z

113

A random M-ary method based countermeasure against side channel attacks  

Science Conference Proceedings (OSTI)

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the ... Keywords: DPA, SPA, elliptic curve cryptosystems, power analysis attacks, random m-ary recoding algorithm, side channel attacks

MahnKi Ahn; JaeCheol Ha; HoonJae Lee; SangJae Moon

2003-05-01T23:59:59.000Z

114

profile,context,url,geo,temporal,website  

Science Conference Proceedings (OSTI)

... 9. 1,10,https://www.facebook.com/pages/The-Century-Bar/ 114062288658483,0,2,-9. 1,12,http://5andadime.com,2,0,-9. 1 ...

115

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

116

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

117

Kipnis-shamir attack on unbalanced oil-vinegar scheme  

Science Conference Proceedings (OSTI)

The public key of the Oil-Vinegar scheme consists of a set of m quadratic equations in m+n variables over a finite field Fq. Kipnis and Shamir broke the balanced Oil-Vinegar scheme where d = n-m = 0 by finding equivalent ... Keywords: Kipnis-Shamir attack, Oil-Vinegar scheme, multivariate public key cryptosystem, signature scheme

Weiwei Cao; Lei Hu; Jintai Ding; Zhijun Yin

2011-05-01T23:59:59.000Z

118

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

119

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields  

E-Print Network (OSTI)

Using Criticality to Attack Performance Bottlenecks Brian Allen Fields Electrical Engineering that the challenges software optimizers and microarchitects face every day boil down to a single problem: bottleneck cache miss or window stall. Tasks such as tuning processors for energy efficiency and finding the right

Hill, Mark D.

120

MULTOPS: a data-structure for bandwidth attack detection  

Science Conference Proceedings (OSTI)

A denial-of-service bandwidth attack is an attempt to disrupt an online service by generating a traffic overload that clogs links or causes routers near the victim to crash. We propose a heuristic and a data-structure that network devices (such as routers) ...

Thomer M. Gil; Massimiliano Poletto

2001-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

A proposal of extension of FMS-Based mechanism to find attack paths  

Science Conference Proceedings (OSTI)

With the increase of internet service providers(companies) for the rapidly growing numbers of internet users in recent years, malicious attackers has been growing too. Due to these attacks, corporate image can be impaired significantly by such damages ...

Byung-Ryong Kim; Ki-Chang Kim

2006-05-01T23:59:59.000Z

122

Argonne applied mathematicians use INCITE awards to attack energy problems  

NLE Websites -- All DOE Office Websites (Extended Search)

Argonne applied mathematicians use INCITE awards to attack energy problems Argonne applied mathematicians use INCITE awards to attack energy problems March 27, 2013 Tweet EmailPrint What is the best possible power grid configuration for our nation? How can we balance the increasing demands for power while minimizing costs and avoiding waste of resources? Last year, Mihai Anitescu, a computational mathematician in Argonne's Mathematics and Computer Science Division. received DOE funding to establish the Multifaceted Mathematics for Complex Energy Systems (M2ACS) to tackle these questions. As part of the M2ACS research, Anitescu and his colleagues at Argonne are focusing on ways to optimize the effects of randomly changing variables, say, in wind or resource demand. Such variables can number into the billions. And to be useful for energy systems planning, any calculations

123

Ice slurry technology can save heart attack victims, surgery patients  

NLE Websites -- All DOE Office Websites (Extended Search)

Ice Ice slurry technology can save heart attack victims, surgery patients Director's Welcome Organization Achievements Highlights Fact Sheets, Brochures & Other Documents Multimedia Library About Nuclear Energy Nuclear Reactors Designed by Argonne Argonne's Nuclear Science and Technology Legacy Opportunities within NE Division Visit Argonne Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Highlights Bookmark and Share Ice slurry technology can save heart attack victims, surgery patients Doctors use an endoscope to see the application of the slurry during a laparoscopic kidney surgery on a pig

124

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

125

Enhanced Secure DNS:  A Defense Against DDOS Attacks  

E-Print Network (OSTI)

The success of distributed denial of service (DDOS)  attacks carried out against ebusiness websites in February 2000 pointed out the deficiencies of an Internet where millions of dollars are transacted daily. Many experts call for the cooperation of the Internet community as a whole to follow safe network administation practices in order to foil the DDOS threat,  but such advice mostly goes unheeded. A novel strategy to fight DDOS attacks,  called intrusion tolerance,  argues that such attacks are impossible to stop,  so it is better to find a way to successfully tolerate them. One such proposal,  termed the Secure Collective Defense (SCOLD),  uses nextgeneration domain name system (DNS)  Berkeley Internet Name Domain (BIND)  software to enable preferred clients to communicate with computers on a network that is being attacked. The features of this new BIND code include a program,  nsreroute,  that securely installs an authoritative zone for the victim domain onto a client DNS server. This BIND software sets up an IP tunnel that forces queries from the client DNS server to the victim DNS server to traverse a SCOLDaware proxy server,  which forwards the query through a secret alternate gateway. This thesis chronicles the addition of code made to the latest version of BIND to satisfy the requirements of SCOLD. The results of experiments using the enhanced DNS BIND in the SCOLD architecture is detailed. This paper ends with the many lessons I have learned from this project. iii

David Boyd Wilkinson; David B. Wilkinson; C. Edward Chow; David Boyd (m. S; Computer Science; C. Edward Chow

2003-01-01T23:59:59.000Z

126

Security of differential phase shift quantum key distribution against individual attacks  

E-Print Network (OSTI)

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15T23:59:59.000Z

127

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. González Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

128

Defending against an Internet-based attack on the physical world  

Science Conference Proceedings (OSTI)

We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide ... Keywords: Internet Threats, automated attacks, computer security, comuter security, cybercrime, internet threats

Simon Byers; Aviel D. Rubin; David Kormann

2002-11-01T23:59:59.000Z

129

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks  

Science Conference Proceedings (OSTI)

SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user inputs, on Web applications that use low-level string operations to construct SQL queries. In this work, ... Keywords: SQL injection attacks, dynamic monitoring, retrofitting code, symbolic evaluation

Prithvi Bisht; P. Madhusudan; V. N. Venkatakrishnan

2010-02-01T23:59:59.000Z

130

Countermeasures against fault attacks on software implemented AES: effectiveness and cost  

Science Conference Proceedings (OSTI)

In this paper we present software countermeasures specifically designed to counteract fault injection attacks during the execution of a software implementation of a cryptographic algorithm and analyze the efficiency of these countermeasures. We propose ... Keywords: countermeasures, fault attacks, side-channel attacks

Alessandro Barenghi; Luca Breveglieri; Israel Koren; Gerardo Pelosi; Francesco Regazzoni

2010-10-01T23:59:59.000Z

131

DDoS attack detection method based on linear prediction model  

Science Conference Proceedings (OSTI)

Distributed denial of service (DDoS) attack is one of the major threats to the current Internet. The IP Flow feature value (FFV) algorithm is proposed based on the essential features of DDoS attacks, such as the abrupt traffic change, flow dissymmetry, ... Keywords: ARMA model, attack features, distributed denial of service, linear prediction, network security

Jieren Cheng; Jianping Yin; Chengkun Wu; Boyun Zhang; Yun Liu

2009-09-01T23:59:59.000Z

132

Using the Domain Name System to Thwart Automated Client-Based Attacks  

SciTech Connect

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

2011-09-01T23:59:59.000Z

133

Denial-of-service attacks on battery-powered mobile computers  

E-Print Network (OSTI)

Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures. 1.

Thomas Martin; Michael Hsiao; Dong Ha; Jayan Krishnaswami

2004-01-01T23:59:59.000Z

134

This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.  

E-Print Network (OSTI)

#12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

Bandettini, Peter A.

135

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

136

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

137

Iran's Response to a U.S. Attack  

E-Print Network (OSTI)

Click to skip to the comments section. Editor's Note: Readers, you can click the PDF button on the menu above to make this article into a PDF suitable for printing or e-reading. Michael Rienzi lays out a detailed analysis of Iran's potential reactions to a strike and finds the following thesis to be likely. Iran’s reaction to an attack by the US would be to use all means at its disposal including their large arsenal of missiles, asymmetric warfare, regular forces, and economic/political disruption methods that would cause large amounts of devastation, casualties, economic disruption, and fear; in the hopes that the enemy would lose the support of its citizens and allies, thus forcing them to end the confrontation; Iran would use all means at its disposal to accomplish this goal rather quickly as they would try to avoid an extended conflict. “Iran would not hesitate to retaliate if attacked. If enemies intend to endanger our welfare and security, we will adopt measures which will make them regret their actions."Islamic Revolutionary Guards Corps

V. Rienzi; Brig Gen; Mohammad Hejazi

2012-01-01T23:59:59.000Z

138

Time Stamp Attack on Wide Area Monitoring System in Smart Grid  

E-Print Network (OSTI)

Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

Zhang, Zhenghao; Li, Husheng; Pei, Changxing

2011-01-01T23:59:59.000Z

139

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

140

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in ...  

Science Conference Proceedings (OSTI)

Presentation Title, Thermal Barrier Coatings Resistant to Attack by Molten Fly Ash in Integrated Gas Combined Cycle Turbine Engines. Author(s), Andrew D.

142

High Performance Computing techniques for attacking reduced version of AES using XL and XSL methods.  

E-Print Network (OSTI)

??A known-plaintext attack on the Advanced Encryption Standard can be formulated as a system of quadratic multivariate polynomial equations in which the unknowns represent key… (more)

Kleiman, Elizabeth

2010-01-01T23:59:59.000Z

143

Real-time wind estimation and display for chem/bio attack response using UAV data .  

E-Print Network (OSTI)

??The defense response to a Chemical and Biological attack would be importantly based on predicting the dispersion of a toxic cloud. Considering that an Unmanned… (more)

Sir, CristiaĚ

2003-01-01T23:59:59.000Z

144

A simple and low cost platform to perform Power Analysis Attacks.  

E-Print Network (OSTI)

??Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so, it… (more)

Carmona, Manuel

2012-01-01T23:59:59.000Z

145

Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention  

Science Conference Proceedings (OSTI)

A chlorine tank truck attack could cause thousands of fatalities. As a means of preventing chlorine truck attacks, I consider the on-site generation of chlorine or hypochlorite at all U.S. facilities currently receiving chlorine by truck. I develop and ... Keywords: applications, cost-effectiveness, public policy, risk analysis, terrorism, uncertainty

Anthony M. Barrett

2010-12-01T23:59:59.000Z

146

A defence scheme against Identity Theft Attack based on multiple social networks  

Science Conference Proceedings (OSTI)

Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind ... Keywords: Identity Theft Attack, Multi-dimensional social network, Social networks

Bing-Zhe He, Chien-Ming Chen, Yi-Ping Su, Hung-Min Sun

2014-04-01T23:59:59.000Z

147

Program on Technology Innovation: Chloride Attack-Induced Aging of Concrete Structures in the Energy Industry  

Science Conference Proceedings (OSTI)

Corrosion of embedded steel elements (reinforcement, liner, pre- or post-tensioning device) is a major cause of structure dysfunction resulting in large maintenance and repair costs worldwide. This report focuses on chloride attack–induced aging of concrete structures in the energy industry. Chloride attack is a common aging issue caused by marine environment, the extensive ...

2012-11-30T23:59:59.000Z

148

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

149

Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes  

Science Conference Proceedings (OSTI)

Public-key cryptographic devices are vulnerable to fault-injection attacks. As countermeasures, a number of secure architectures based on linear and nonlinear error detecting codes were proposed. Linear codes provide protection only against primitive ... Keywords: arithmetic codes, cryptography, multipliers, sidechannel attacks

Zhen Wang, Mark Karpovsky, Ajay Joshi

2012-06-01T23:59:59.000Z

150

Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks  

Science Conference Proceedings (OSTI)

This paper proposes a novel approach for cryptanalysis of keystream generators consisting of the composition of a linear finite state machine (LFSM) and nonlinear mapping. The proposed approach includes a dedicated decimation of the sample for cryptanalysis ... Keywords: LFSRs, algebraic attacks, decimation, fast correlation attack, nonlinear combination keystream generator, state transition matrix, stream ciphers

Miodrag J. Mihaljevi?; Marc P. C. Fossorier; Hideki Imai

2005-12-01T23:59:59.000Z

151

Power and EM Attacks on Passive $13.56\\,\\textrm{MHz}$ RFID Devices  

Science Conference Proceedings (OSTI)

During the last years, more and more security applications have been developed that are based on passive 13.56 MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the ... Keywords: AES, DEMA, DPA, EM Attacks, Power Analysis, RFID, Side-Channel Attacks

Michael Hutter; Stefan Mangard; Martin Feldhofer

2007-09-01T23:59:59.000Z

152

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

153

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

154

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

155

Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3  

E-Print Network (OSTI)

#12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

Jagannatham, Aditya K.

156

Blocking Objectionable Web Content by Leveraging Multiple Information Sources Nitin Agarwal  

E-Print Network (OSTI)

that has very little tex- tual content), URL redirection to some websites, or directly typing (porn websites). Second, the number of positive instances (say, porn websites) is often sig- nificantly less than

Liu, Huan

157

Untitled Document  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security (HSS) has upgraded. The old URL has been changed from http:www.eh.dov.gov to http:www.hss.doe.gov You will be redirected to the new...

158

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

159

Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses  

E-Print Network (OSTI)

We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

Mutaf, Pars

2011-01-01T23:59:59.000Z

160

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Free energies for acid attack reactions of lithium cobaltate.  

Science Conference Proceedings (OSTI)

The attack of lithium-ion battery cathodes by stray aqueous HF, with resultant dissolution, protonation, and possibly other unintended reactions, can be a significant source of capacity fade. We explore the calculation of reaction free energies of lithium cobaltate in acid by a 'hybrid' method, in which solid-phase free energies are calculated from first principles at the generalized gradient approximation + intrasite coulomb interaction (GGA+U) level and tabulated values of ionization potentials and hydration energies are employed for the aqueous species. Analysis of the dissolution of the binary oxides Li{sub 2}O and CoO suggests that the atomic energies for Co and Li should be shifted from values calculated by first principles to yield accurate reaction free energies within the hybrid method. With the shifted atomic energies, the hybrid method was applied to analyze proton-promoted dissolution and protonation reactions of LiCoO{sub 2} in aqueous acid. Reaction free energies for the dissolution reaction, the reaction to form Co{sub 3}O{sub 4} spinel, and the proton-for-lithium exchange reaction are obtained and compared to empirical values. An extension of the present treatment to consider partial reactions is proposed, with a view to investigating interfacial and environmental effects on the dissolution reaction.

Benedek, R.; van de Walle, A.; Chemical Sciences and Engineering Division; California Inst. of Tech.

2008-01-01T23:59:59.000Z

162

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

163

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks  

E-Print Network (OSTI)

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [18] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.’s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [18], is designed conforming the guidelines proposed previously.

Pedro Peris-lopez; Julio C. Hern; Aikaterini Mitrokotsa; Juan M. E. Tapiador

2010-01-01T23:59:59.000Z

164

WADeS: a tool for Distributed Denial of Service Attack detection  

E-Print Network (OSTI)

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the network's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses LRU cache filtering to capture the high bandwidth flows followed by computation of wavelet variance on the aggregate miss traffic. The introduction of attack traffic in the network would elicit changes in the wavelet variance. This is combined with thresholding methods to enable attack detection. Sampling techniques can be used to tailor the cost of our detection mechanism. The mechanism we suggest is independent of routing information, thereby making attack detection immune to IP address spoofing. Using simulations and quantitative measures, we find that our mechanism works successfully on several kinds of attacks. We also use statistical methods to validate the results obtained.

Ramanathan, Anu

2002-01-01T23:59:59.000Z

165

Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

166

Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis  

E-Print Network (OSTI)

Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

2012-01-01T23:59:59.000Z

167

Scientist Engagement & Redirection | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

168

Scientist Engagement & Redirection - Global Initiatives in Proliferati...  

NLE Websites -- All DOE Office Websites (Extended Search)

program inception in 1994, GIPP has engaged more than 17,000 scientists (> 60% having direct experience working with WMD) at over 180 facilities in the Newly Independent States...

169

Redirection of metabolism for hydrogen production  

SciTech Connect

This project is to develop and apply techniques in metabolic engineering to improve the biocatalytic potential of the bacterium Rhodopseudomonas palustris for nitrogenase-catalyzed hydrogen gas production. R. palustris, is an ideal platform to develop as a biocatalyst for hydrogen gas production because it is an extremely versatile microbe that produces copious amounts of hydrogen by drawing on abundant natural resources of sunlight and biomass. Anoxygenic photosynthetic bacteria, such as R. palustris, generate hydrogen and ammonia during a process known as biological nitrogen fixation. This reaction is catalyzed by the enzyme nitrogenase and normally consumes nitrogen gas, ATP and electrons. The applied use of nitrogenase for hydrogen production is attractive because hydrogen is an obligatory product of this enzyme and is formed as the only product when nitrogen gas is not supplied. Our challenge is to understand the systems biology of R. palustris sufficiently well to be able to engineer cells to produce hydrogen continuously, as fast as possible and with as high a conversion efficiency as possible of light and electron donating substrates. For many experiments we started with a strain of R. palustris that produces hydrogen constitutively under all growth conditions. We then identified metabolic pathways and enzymes important for removal of electrons from electron-donating organic compounds and for their delivery to nitrogenase in whole R. palustris cells. For this we developed and applied improved techniques in 13C metabolic flux analysis. We identified reactions that are important for generating electrons for nitrogenase and that are yield-limiting for hydrogen production. We then increased hydrogen production by blocking alternative electron-utilizing metabolic pathways by mutagenesis. In addition we found that use of non-growing cells as biocatalysts for hydrogen gas production is an attractive option, because cells divert all resources away from growth and to hydrogen. Also R. palustris cells remain viable in a non-growing state for long periods of time.

Harwood, Caroline S.

2011-11-28T23:59:59.000Z

170

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

171

A study on visual attack to BPCS-Steganography and countermeasure  

Science Conference Proceedings (OSTI)

This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS replaces noisy blocks with the binary patterns mapped from secret data. The logical operation called conjugate ...

Michiharu Niimi; Hideki Noda; Bruce Segee

2005-09-01T23:59:59.000Z

172

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

173

Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks  

E-Print Network (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

Gummadi, Ramakrishna

174

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance- as claimed by their authors. The study of this recent protocol is the main subject of this paper. We present a passive full disclosure attack which allows an adversary-listening the public messages exchanged on the channel- to discover the long-term secret key of the tag. The presented attack is very relevant as it implies that none of the protocol security objectives are guaranteed. Additionally, we also show that the probability of a successful mafia fraud attack against the Reid et al. protocol [16] is bounded by (3/4) n and not by (7/8) n as Piramuthu states in [15].

unknown authors

2009-01-01T23:59:59.000Z

175

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

176

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

177

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

178

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

179

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

180

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network (OSTI)

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks  

E-Print Network (OSTI)

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover is in close proximity. This attack is globally known as a relay attack, a kind that includes others such as distance fraud, mafia fraud and terrorist attacks. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed in the last years, but vulnerabilities of major or minor relevance have been identified in all of them. In 2008, Kim et al. [10] proposed a new distance bounding protocol with the objective of being the best one in terms of security, privacy, tag computational overhead and fault tolerance - as claimed by their authors. The study of this rec...

Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

2009-01-01T23:59:59.000Z

182

Statement on the Eighth Anniversary of the 9/11 Attacks | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Eighth Anniversary of the 9/11 Attacks on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they left behind. "Although it has been eight years since that day, we cannot let the passage of time dull our memories or diminish our resolve. We still face grave threats from extremists, and we are deeply grateful to all those who serve our country to keep us safe. I'm especially proud of the men and women at

183

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

­ MicroGrid [9, 10] ­ to study proxy networks with real applications and real DoS attacks. MicroGrid supports detailed packet-level simulation of large networks and use of unmodified applications. With MicroGrid

Chien, Andrew A.

184

[2010] Avoiding Side-Channel Attacks in Embedded Systems with Non-deterministic Branches  

Science Conference Proceedings (OSTI)

In this paper, we suggest handling security in embedded systems by introducing a small architectural change. We propose the use of a non-deterministic branch instruction to generate non-determinism in the execution of encryption algorithms. Non-determinism ... Keywords: embedded system security, side-channel attacks, hiding countermeasure

Pedro Malagon, Juan-Mariano de Goyeneche, Marina Zapater, Jose M. Moya

2010-01-01T23:59:59.000Z

185

False data injection attacks against state estimation in electric power grids  

Science Conference Proceedings (OSTI)

A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, ... Keywords: Power grids, attack, state estimation

Yao Liu; Peng Ning; Michael K. Reiter

2011-05-01T23:59:59.000Z

186

Not-a-Bot: improving service availability in the face of botnet attacks  

Science Conference Proceedings (OSTI)

A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic ...

Ramakrishna Gummadi; Hari Balakrishnan; Petros Maniatis; Sylvia Ratnasamy

2009-04-01T23:59:59.000Z

187

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

188

Contactless electromagnetic active attack on ring oscillator based true random number generator  

Science Conference Proceedings (OSTI)

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some ... Keywords: EM injections, IEMI, TRNGs, active attacks, ring oscillators

Pierre Bayon; Lilian Bossuet; Alain Aubert; Viktor Fischer; François Poucheret; Bruno Robisson; Philippe Maurine

2012-05-01T23:59:59.000Z

189

On False Data Injection Attacks against Distributed Energy Routing in Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid is a new type of energy-based cyber physical system (CPS) that will provide reliable, secure, and efficient energy transmission and distribution. The way to secure the distributed energy routing process that efficiently utilizes the distributed ... Keywords: Smart grid, Distributed energy routing, False data injection attacks, Energy distribution

Jie Lin; Wei Yu; Xinyu Yang; Guobin Xu; Wei Zhao

2012-04-01T23:59:59.000Z

190

A Look In the Mirror: Attacks on Package Managers Author Names Removed for Anonymous Submission  

E-Print Network (OSTI)

for security. There is no protection of package metadata or the root metadata. Package Metadata An attacker can of the package in the package meta- data protects the package from tampering. Packages Resistance to metadata, the package metadata is protected from tam- pering. Packages The signature on the root metadata prevents

Hartman, John H.

191

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain  

E-Print Network (OSTI)

In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and flow measure. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time. NS-2 network simulator on Linux platform is used as simulation testbed. Simulation results show that our proposed solution gives a drastic improvement in terms of detection rate and false positive rate. However, the mammoth volume generated by DDoS attacks pose the biggest challenge in terms of memory and computational overheads as far as monitoring and analysis of traffic at single point connecting victim is concerned. To address this problem, a distributed...

Gupta, B B; Misra, Manoj; 10.1145/1523103.1523203

2012-01-01T23:59:59.000Z

192

Iago attacks: why the system call API is a bad untrusted RPC interface  

Science Conference Proceedings (OSTI)

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted application's state. Under such ... Keywords: iago attacks, overshadow, system call

Stephen Checkoway; Hovav Shacham

2013-04-01T23:59:59.000Z

193

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system  

Science Conference Proceedings (OSTI)

The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned by the four states sent by Alice is three instead of two. Thus Eve can distinguish these states with a set of Positive Operator Valued Measure (POVM) operators belonging to three-dimension space, which will reduce the QBER induced by her attack. Furthermore, a relationship between the degree of the imperfection of FM and the transmittance of the practical QKD system is obtained. The results show that the probability that Eve loads her attack successfully depends on the degree of the imperfection of FM rapidly, but the QBER induced by Eve's attack changes slightly with the degree of the FM imperfection.

Sun Shihai; Jiang Musheng; Liang Linmei [Department of Physics, National University of Defense Technology, Changsha 410073 (China)

2011-06-15T23:59:59.000Z

194

The Small and Silent Force Multiplier: A Swarm UAV--Electronic Attack  

Science Conference Proceedings (OSTI)

At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) ... Keywords: Electronic attack, Electronic warfare, Swarm UAV, UAS, UAV, Unmanned Aircraft Systems, Unmanned aerial vehicle

Polat Cevik; Ibrahim Kocaman; Abdullah S. Akgul; Barbaros Akca

2013-04-01T23:59:59.000Z

195

Security computing for the resiliency of protecting from internal attacks in distributed wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their ... Keywords: distributed wireless sensor networks, internal attacks, resiliency, security computing, sensor optimum deployment

Xu Huang; Dharmendra Sharma; Muhammad Ahmed

2012-09-01T23:59:59.000Z

196

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation  

E-Print Network (OSTI)

Frequency and intensity of Internet attacks are rising with an alarming pace. Several technologies and concepts were proposed for fighting distributed denial of service (DDoS) attacks: traceback, pushback, i3, SOS and Mayday. This paper shows that in the case of DDoS reflector attacks they are either ineffective or even counterproductive. We then propose a novel concept and system that extends the control over network traffic by network users to the Internet using adaptive traffic processing devices. We safely delegate partial network management capabilities from network operators to network users. All network packets with a source or destination address owned by a network user can now also be controlled within the Internet instead of only at the network user's Internet uplink. By limiting the traffic control features and by restricting the realm of control to the "owner" of the traffic, we can rule out misuse of this system. Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, new ways of collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.

Thomas Dübendorfer; Matthias Bossardt; Bernhard Plattner

2005-01-01T23:59:59.000Z

197

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

198

Regulating Greenhouse Gas 'Leakage': How California Can Evade the Impending Constitutional Attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation. (author)

Potts, Brian H.

2006-06-15T23:59:59.000Z

199

Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks  

Science Conference Proceedings (OSTI)

Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

Brian H. Potts

2006-06-15T23:59:59.000Z

200

NCS GISMO Features Identifer -Master URL: not published on WWW  

E-Print Network (OSTI)

with 2 "do-nothing" subscans and one Lissajous subscans, enter, e. g., in a pako script: diy /clear" /sys trueHorizon subscan 1800 0 /ts 12 /cr "R" /sys trueHorizon diy PAUSE "good to go? [c/q]" start-source" ("do-something".) diy without options lists the defned subscans in the command-line window. start

Leclercq, Samuel

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

URL: A unified reinforcement learning approach for autonomic cloud management  

Science Conference Proceedings (OSTI)

Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides ... Keywords: Cloud computing, Reinforcement learning, Virtual machine autoconfiguration

Cheng-Zhong Xu; Jia Rao; Xiangping Bu

2012-02-01T23:59:59.000Z

202

URL - CeBiTec - Universit?t Bielefeld  

E-Print Network (OSTI)

Mar 25, 2011... degreeG? (ci) ? 2m(ci) and for each connected component B ? C of GA, ..... Common intervals and symmetric difference in a model-free.

203

The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure  

SciTech Connect

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

2006-08-28T23:59:59.000Z

204

A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks  

E-Print Network (OSTI)

Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

Padmavathi, Dr G

2009-01-01T23:59:59.000Z

205

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)  

E-Print Network (OSTI)

Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

CERN. Geneva

2012-01-01T23:59:59.000Z

206

The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis  

SciTech Connect

This paper develops a bottom-up approach that focuses on behavioral responses in estimating the total economic impacts of the September 11, 2001, World Trade Center (WTC) attacks. The estimation includes several new features. First, is the collection of data on the relocation of firms displaced by the attack, the major source of resilience in muting the direct impacts of the event. Second, is a new estimate of the major source of impacts off-site -- the ensuing decline of air travel and related tourism in the U.S. due to the social amplification of the fear of terrorism. Third, the estimation is performed for the first time using Computable General Equilibrium (CGE) analysis, including a new approach to reflecting the direct effects of external shocks. This modeling framework has many advantages in this application, such as the ability to include behavioral responses of individual businesses and households, to incorporate features of inherent and adaptive resilience at the level of the individual decision maker and the market, and to gauge quantity and price interaction effects across sectors of the regional and national economies. We find that the total business interruption losses from the WTC attacks on the U.S. economy were only slightly over $100 billion, or less than 1.0% of Gross Domestic Product. The impacts were only a loss of $14 billion of Gross Regional Product for the New York Metropolitan Area.

Oladosu, Gbadebo A [ORNL; Rose, Adam [University of Southern California, Los Angeles; Bumsoo, Lee [University of Illinois; Asay, Gary [University of Southern California

2009-01-01T23:59:59.000Z

207

Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.  

SciTech Connect

ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the Ă?Â?Ă?Â?rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

D.R. Coyle; D.C. Booth: M.S. Wallace

2005-12-01T23:59:59.000Z

208

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

209

Protecting Buildings From a Biological or Chemical Attack: actions to take  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Buildings From a Biological or Chemical Attack: actions to take Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Title Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a release Publication Type Report Year of Publication 2003 Authors Price, Phillip N., Michael D. Sohn, Ashok J. Gadgil, William W. Delp, David M. Lorenzetti, Elizabeth U. Finlayson, Tracy L. Thatcher, Richard G. Sextro, Elisabeth A. Derby, and Sondra A. Jarvis Abstract This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear

210

Freedom and order : how democratic governments abridge civil liberties after terrorist attacks -- and why sometimes they don't  

E-Print Network (OSTI)

This dissertation is driven by the following question: "What explains the variation in governments' civil liberty-abridging responses to terrorist attacks?" In the United States, it was not until a year after the 1995 ...

Rubin, Gabriel, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

211

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune,  

E-Print Network (OSTI)

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune 55455 {pwang,tyra,dchantin,malchow,foo,hopper,kyd}@cs.umn.edu ABSTRACT The Kad network

Kim, Dae-Shik

212

Using GIS technology to manage information following a bio-terrorism attack.  

Science Conference Proceedings (OSTI)

The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

2005-05-01T23:59:59.000Z

213

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

214

Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions  

SciTech Connect

This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

Hendryx, M.; Zullig, K.J. [West Virginia University, Morgantown, WV (United States). Dept. of Community Medicine

2009-11-15T23:59:59.000Z

215

Protecting buildings from a biological or chemical attack: Actions to take before or during a release  

SciTech Connect

This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

2003-01-29T23:59:59.000Z

216

Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments  

DOE Green Energy (OSTI)

Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

1993-09-01T23:59:59.000Z

217

Frostbite Theater - Just for Fun - When Liquid Nitrogen Attacks! - Season 2  

NLE Websites -- All DOE Office Websites (Extended Search)

Season One Bloopers Season One Bloopers Previous Video (Season One Bloopers) Frostbite Theater Main Index Next Video (Freezing Balloons!) Freezing Balloons! When Liquid Nitrogen Attacks! - Season 2 Bloopers Making videos is just another opportunity to catch mistakes on film! Enjoy these outtakes from Season 2! [ Show Transcript ] Announcer: Frostbite Theater presents... Cold Cuts! No baloney! Joanna and Steve: Just science! Joanna: Hi! I'm Joanna! Steve: And I'm Steve! Joanna: We made more videos! Steve: And we made more mistakes! Joanna: Enjoy! ----------------------------------------- Joanna: What happens when the freezing power of liquid nitrogen... Steve: Oh, jeez! Joanna: Oh, oh, oh! That was a little too much! Steve: You okay? Joanna: Uh, huh. I'm fine. Steve: This is why you wear the safety gear. This is why you have the

218

Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism  

E-Print Network (OSTI)

A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

2012-01-01T23:59:59.000Z

219

On wormhole attacks in underwater sensor networks: A two-tier localization approach  

E-Print Network (OSTI)

Under-Water Sensor Network (UWSN) is a novel networking paradigm to explore the uninhabited oceans. However, the characteristics of this new network, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from land-based sensor networks. In this paper we show that underwater denial-of-service attack imposes great threats to any UWSN. Without proper countermeasures, underwater sensor networking is a mission impossible. We propose a localization based approach to answer the challenge. In our design, DUB and DDB, a pair of efficient single-round distance measuring schemes, are critical building blocks to realize our approach inspite of constrained node capability and floating node mobility. In addition, to cope with low/medium node mobiltiy, we propose a two-tier localization scheme to identify short-range wormholes instantly, and long-haul wormholes within a limited latency. Our simulation and implementation confirm the effectiveness of our design. I.

Jiejun Kong; Zhengrong Ji; Weichao Wang; Mario Gerla; Rajive Bagrodia

2004-01-01T23:59:59.000Z

220

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Systemic Hypertension and Transient Ischemic Attack in a 6-Year-Old Girl with Fibromuscular Dysplasia Treated with Percutaneous Angioplasty  

Science Conference Proceedings (OSTI)

We describe a 6-year-old girl with arterial hypertension secondary to fibromuscular dysplasia with stenoses of both renal arteries and transient ischemic attack due to extracranial right internal carotid artery subtotal occlusion as well as left internal carotid artery stenosis. She was treated with percutaneous angioplasty of both renal and both carotid arteries.

Foa-Torres, Gustavo [National University of Cordoba, Oulton Institute (Argentina); Ganame, Javier, E-mail: javier.ganame@uzleuven.b [University Hospitals Leuven, Cardiology Department (Belgium); Juaneda, Ernesto; Peirone, Alejandro [Hospital Privado (Argentina); Barcudi, Maria Silvina [Hospital Italiano (Argentina); Achaval, Alberto [Hospital Privado (Argentina)

2010-02-15T23:59:59.000Z

222

On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs  

Science Conference Proceedings (OSTI)

Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to protect the intellectual property and to prevent fraud, ... Keywords: FPGA, bitstream encryption, side-channel attacks, triple des

Amir Moradi; Alessandro Barenghi; Timo Kasper; Christof Paar

2011-10-01T23:59:59.000Z

223

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

224

Fire initiation and spread in urban areas due to nuclear attack  

SciTech Connect

Calculation of fire development in urban areas is a critical step in estimating the global effects of nuclear warfare with regard to smoke production and transport. As part of the first phase of a program to improve our ability to calculate fire starts and spread in urban areas, we have performed a parameter sensitivity analysis using the three codes originally developed for civil defense planning by the IIT Research Institute. We have added graphics and made slight improvements to the codes and applied them to the representation of the San Jose urban area used in the Five-City Study of the late 1960s. For a chosen reference attack scenario, we have varied parameters and compared the results to those of a representative baseline case. The parameters varied included: atmospheric visibility, lowest of the various critical ignition energies of window coverings, shading of windows by trees and awnings, extent of blast extinguishment of fires, secondary ignitions, window glass transmittance, specific firebrand generation rate, firebrand distribution range, windspeed, building densities, specific fuel loadings, and window sizes. 13 references, 10 figures, 5 tables.

Reitter, T.A.; Takata, A.N.; Kang, S.W.

1984-09-01T23:59:59.000Z

225

Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks  

Science Conference Proceedings (OSTI)

This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

2010-01-14T23:59:59.000Z

226

How games can redirect humanity's cognitive surplus for social good  

Science Conference Proceedings (OSTI)

Keywords: cognitive surplus, games, persuasive technologies, pervasive technologies, prosocial games, social good

Joel Ross; Bill Tomlinson

2010-12-01T23:59:59.000Z

227

Controlled angular redirection of light via nanoimprinted disordered gratings  

E-Print Network (OSTI)

= mold, noxious off-gases, respiratory problems #12;Stressful work environments Lack of daylight, ventilation, connection with nature ­ eye-strain #12;The Fix ­ Priority on health More daylighting In stairs irrigation system. Or low-flush or dual flush toilets #12;Use Less Land Mixed use land planning = fewer car

228

Controlled angular redirection of light via nanoimprinted disordered gratings  

E-Print Network (OSTI)

, the daylighting effect vanishes as the system becomes equivalent to an omnidirectional diffuser and transparency (Van Nostrand Reinhold, 1986). 19. M. Kischkoweit-Lopin, "An overview of daylighting systems," Sol gratings are presented in the context of improved interior daylighting and may furthermore be suited

229

PROJECTED IMPACT OF SULFATE ATTACK ON THE LONG-TERM PERFORMANCE OF A CONCRETE REPOSITORY  

Science Conference Proceedings (OSTI)

Saltstone is a cementitious waste form made by mixing salt solution originating from liquid waste storage tanks at the DOE Savannah River Site with a dry mix containing blast furnace slag, fly ash, and cement or lime. The wet mix is poured into a concrete repository for on-site disposal. Solidified Saltstone is a dense, alkaline, reducing, micro-porous, monolithic, cementitious matrix, containing a solution of salts within its pore structure. Sodium sulfate concentrations in the pore fluid are around 0.15 mol/L, and external sulfate attack on concrete barriers is expected to occur over time. To predict the long-term performance of concrete repositories, the STADIUM{reg_sign} code was used to simulate the reactive transport processes leading to formation of ettringite, an expansive mineral phase often associated with spalling or cracking. STADIUM{reg_sign} is a multi-ionic transport model based on a split operator approach that separates ionic movement and chemical reactions. Ionic transport is described by the extended Nernst-Planck equation for unsaturated media, and accounts for electrical coupling between ionic species, chemical activity, transport due to water content gradient, and temperature effects. STADIUM{reg_sign} does not predict whether physical damage will occur, or the impact on transport properties should fracturing occur. Thus the presence of ettringite was assumed to coincide with physical damage for the purpose of estimating effective transport properties. Effective properties for concrete barriers were estimated assuming complete hydraulic failure behind the ettringite front and unaltered properties ahead of the front. The ettringite front advances at a rate dependent on the diffusion coefficient assumed for the failed zone. A sensitivity study indicates a service life ranging from thousands to tens of thousands of years, depending on the barrier thickness and sulfate exposure conditions among other factors.

Flach, G.

2009-12-11T23:59:59.000Z

230

Coordinated Cyber-Physical Attacks, High-Impact Low-Frequency (HILF) Events, and Risk Management in the Electric Sector  

Science Conference Proceedings (OSTI)

Although the North American electricity grid is one of the most reliable power systems in the world, the high-impact low-frequency (HILF) class of rare but potentially catastrophically damaging events is of growing concern in the industry. This white paper summarizes key activities under two EPRI initiatives that address a HILF cyber-physical attack as well as risk assessment approaches and management tools relevant to a HILF event.EPRI’s Cyber Security and Privacy Program ...

2012-12-12T23:59:59.000Z

231

Summary of Analytical Electron Microscopy Observation of Intergranular Attack and Stress Corrosion Cracks in Alloy 600 Steam Generator Tubing  

Science Conference Proceedings (OSTI)

High-resolution analytical transmission electron microscopy (ATEM) can identify structures and compositions of corrosion products in attacked boundaries, cracks, and crack tips to help assess impurities that promote intergranular degradation. ATEM analyses has recently been performed on samples from Watts Bar 1 and Diablo Canyon 2 steam generator (SG) tubing and has revealed that lead (Pb) was involved in intergranular stress corrosion cracking (IGSCC). These new results in combination with previous resu...

2005-04-29T23:59:59.000Z

232

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

233

Learning resources in federated environments: a broken link checker based on URL similarity  

Science Conference Proceedings (OSTI)

In a large federation of learning resource repositories metadata can become out of date, especially when resources are moved or deleted, frustrating users and making it critical to assure the availability of resources in any learning environment. Regularly ...

Tien-Dung Le

2013-05-01T23:59:59.000Z

234

Development of prototype guidelines for risk management against terror attack in the tourism industry: a Delphi study  

E-Print Network (OSTI)

The purpose of the study was to gather strategies and factors from tourism security professionals from which terrorism risk management policies can be developed. This study utilized the Delphi method in order to provide structure for the group process. Twelve tourism security experts made up the panel completing three rounds of questionnaires via the email based Delphi technique. This research identified fifty-four strategies to reduce the propensity of terror attack at a tourism venue. Those strategies were divided into four levels of priority based on criticality and feasibility. The fifty-four strategies were grouped into nine subordinate categories. The subordinate categories were related to Training, Communications/ Liaison, Planning/ Assessment, Background Checks, ID Badges/ Secure Entrance, Specialty Security Units, Architectural Design, Media Cooperation, and Technology Based strategies. Alongside the strategies are a collection of comments by the experts regarding strengths, weaknesses, and any barriers to implementation pertaining to the individual strategy. Tourism risk managers, security personnel, and insurance underwriters can all use the results in reducing the opportunity for a terrorist attack at a tourism venue. Major research findings from this study included: 1. The strategy receiving the highest criticality ranking over all other strategies involves training first responders on their role in circumventing the success of terrorists. 2. The subordinate category Communication/ Liaison contains the largest number of strategies indicating the significance of this category among experts. 3. The subordinate category of Specialty Security Units contains the second highest number of strategies indicating the importance of the topic among experts. 4. All of the technology based strategies fell into the lowest priority level. Based on the findings of this study, researcher recommendations include: 1. The guidelines developed in this study should be used by operators of tourism venues to make the best use of limited resources. 2. National or international conferences should be established to further discuss these issues. 3. A greater number of communications mediums should be established to facilitate the exchange of ideas and experiences between affected professionals. 4. Insurance providers should use this information to establish validated guidelines so that, if prospective clients adhered to the recommendations, a reduction in premiums could be offered. 5. Other entities may benefit from this study, such as public school systems, the energy production industry, hospital systems, and pipeline systems.

Smith, Clifford Keith

2003-05-01T23:59:59.000Z

235

Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate  

SciTech Connect

Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

2002-05-03T23:59:59.000Z

236

Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances  

E-Print Network (OSTI)

When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a file server virtual machine running on the same physical host and export it to other virtual machines running on the same host. We implement this private file server virtual machine using a modified version of an NFS server installed in a virtual machine under various virtualization environments such as Xen and VMware. We also demonstrate that by placing the user’s applications in a virtual machine rather than directly on the base machine we can provide near instant recovery of system configuration information. We quantify the costs of this architecture by comparing benchmarks running directly on a base operating system and accessing data in a local filesystem to those running in a guest operating system and accessing data in an NFS partition mounted from a file server virtual machine. We find that for Xen the overhead of read intensive workloads is at most 5 % and for write intensive workloads the overhead is at most 24%. For system benchmarks that stress CPU and memory performance, we see no noticeable degradation.

Jeanna N. Matthews; Jason J. Herne; Todd M. Deshane; Patty A. Jablonski; Leslie R. Cherian; Mike T. Mccabe

2005-01-01T23:59:59.000Z

237

Patterns of heart attacks  

E-Print Network (OSTI)

Myocardial infarction is a derivative of heart disease that is a growing concern in the United States today. With heart disease becoming increasingly predominant, it is important to not only take steps toward preventing ...

Shenk, Kimberly N

2010-01-01T23:59:59.000Z

238

Control systems under attack?  

E-Print Network (OSTI)

The enormous growth of the Internet during the last decade offers new means to share and distribute both information and data. In Industry, this results in a rapprochement of the production facilities, i.e. their Process Control and Automation Systems, and the data warehouses. At CERN, the Internet opens the possibility to monitor and even control (parts of) the LHC and its four experiments remotely from anywhere in the world. However, the adoption of standard IT technologies to Distributed Process Control and Automation Systems exposes inherent vulnerabilities to the world. The Teststand On Control System Security at CERN (TOCSSiC) is dedicated to explore the vulnerabilities of arbitrary Commercial-Of-The-Shelf hardware devices connected to standard Ethernet. As such, TOCSSiC should discover their vulnerabilities, point out areas of lack of security, and address areas of improvement which can then be confidentially communicated to manufacturers. This paper points out risks of accessing the Control and Automa...

Lüders, Stefan

2005-01-01T23:59:59.000Z

239

Inhibiting card sharing attacks  

Science Conference Proceedings (OSTI)

The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number ...

Michael Tunstall; Konstantinos Markantonakis; Keith Mayes

2006-10-01T23:59:59.000Z

240

Attacks on Emerging Architectures  

E-Print Network (OSTI)

Application Academia AJAXIm FaceBook Chat ParseUri PlaxoTo support this interaction, Facebook provides a JavaScriptwhich in turn communicate with Facebook. The cross-origin

Hanna, Steven Craig

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

242

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

243

Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes  

Science Conference Proceedings (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hall, Dr. Linda [ENVIRON International Corporation; Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

244

Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations  

Science Conference Proceedings (OSTI)

In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

Watson, Annetta Paule [ORNL; Raber, Ellen [Lawrence Livermore National Laboratory (LLNL); Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Hauschild, Veronique [U.S. Army Center for Health Promotion and Preventive Medicine; Hall, Dr. Linda [ENVIRON International Corporation; Love, Dr. Adam [Johnson Wright, Inc.

2011-01-01T23:59:59.000Z

245

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

246

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

247

Aerodynamic characteristics of seven symmetrical airfoil sections through 180-degree angle of attack for use in aerodynamic analysis of vertical axis wind turbines  

Science Conference Proceedings (OSTI)

When work began on the Darrieus vertical axis wind turbine (VAWT) program at Sandia National Laboratories, it was recognized that there was a paucity of symmetrical airfoil data needed to describe the aerodynamics of turbine blades. Curved-bladed Darrieus turbines operate at local Reynolds numbers (Re) and angles of attack (..cap alpha..) seldom encountered in aeronautical applications. This report describes (1) a wind tunnel test series conducted at moderate values of Re in which 0 less than or equal to ..cap alpha.. less than or equal to 180/sup 0/ force and moment data were obtained for four symmetrical blade-candidate airfoil sections (NACA-0009, -0012, -0012H, and -0015), and (2) how an airfoil property synthesizer code can be used to extend the measured properties to arbitrary values of Re (10/sup 4/ less than or equal to Re less than or equal to 10/sup 7/) and to certain other section profiles (NACA-0018, -0021, -0025).

Sheldahl, R E; Klimas, P C

1981-03-01T23:59:59.000Z

248

Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances  

Science Conference Proceedings (OSTI)

In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

2006-08-01T23:59:59.000Z

249

Remedial Methods for Intergranular Attack of Alloy 600 Tubing, Volume 1: Plant Corrosion Morphologies and Remedial Methods, Volume 2: Additives and Test Plans for Remedial Methods, Volume 3: Boric Acid and Acetic Acid Remedial Methods  

Science Conference Proceedings (OSTI)

Intergranular attack and stress corrosion cracking of alloy 600 tubing have caused costly PWR shutdowns and even necessitated steam generator replacement. This research identified chemicals that might mitigate such degradation but showed that on-line treatment of boric acid is the best existing remedy.

1986-06-30T23:59:59.000Z

250

V-200: Apache Struts DefaultActionMapper Redirection and OGNL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

tcher.mapper.DefaultActionMapper) can be exploited to e.g. inject and execute arbitrary Java code via OGNL (Object-Graph Navigation Language) expressions. IMPACT: Security Bypass...

251

Phage auxiliary metabolic genes and the redirection of cyanobacterial host carbon metabolism  

E-Print Network (OSTI)

Cyanophages infecting the marine cyanobacteria Prochlorococcus and Synechococcus encode and express genes for the photosynthetic light reactions. Sequenced cyanophage genomes lack Calvin cycle genes, however, suggesting ...

Thompson, Luke Richard

252

Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada  

E-Print Network (OSTI)

Laboratories, Pinawa, Manitoba, Canada. Bäckblom G, MartinLaboratories, Pinawa, Manitoba, AECL-12127. Chijimatsu M and

Rutqvist, Jonny

2009-01-01T23:59:59.000Z

253

Modeling of Damage, Permeability Changes and Pressure Responses during Excavation of the TSX Tunnel in Granitic Rock at URL, Canada  

E-Print Network (OSTI)

rock: implications for nuclear fuel waste disposal, Int Jdisposal for spent nuclear fuel requires consideration ofof the EDZ at a spent nuclear fuel repository. 2 Relevant

Rutqvist, Jonny

2009-01-01T23:59:59.000Z

254

Energy attack on server systems  

Science Conference Proceedings (OSTI)

Power management has become increasingly important for server systems. Numerous techniques have been proposed and developed to optimize server power consumption and achieve energy proportional computing. However, the security perspective of server power ...

Zhenyu Wu; Mengjun Xie; Haining Wang

2011-08-01T23:59:59.000Z

255

Research deciphers HIV attack plan  

NLE Websites -- All DOE Office Websites (Extended Search)

they are blanketed in a greater amount of envelope protein that helps them access and enter host cells. These findings will help inform vaccine design and interpretation of...

256

University of Regina -Student Counts as of Fall Census Dates (end of first week of classes) URL: http://www.uregina.ca/orp/facts.shtml  

E-Print Network (OSTI)

: http://www.uregina.ca/orp/facts.shtml FT = FullTime, 9 or more credit hours in Term for Undergraduates

Argerami, Martin

257

URL: http://www.main-spitze.de/region/kultur/ausstellungen/12193502.htm ,,Route der Industriekultur Rhein-Main" beginnt am 7. August  

E-Print Network (OSTI)

hessische Frankfurt bis ins bayrische Miltenberg führt. Die seit 2003 alljährlich stattfindenden ,,Tage der

Esper, Jan

258

Available at URL ftp://ftp.cs.dartmouth.edu/pub/CS-techreports/TR96-280.ps.Z An RPC Mechanism for Transportable Agents  

E-Print Network (OSTI)

simul- taneous bindings. Our agents are programmed in Agent Tcl we describe how the Tcl implementation made RPC particularly easy to implement. Finally, although our RPC is designed for Agent Tcl programs, the concepts would also work for standard Tcl programs. Keywords - Transportable Agents, Remote Procedure Call

Kotz, David

259

Available at URL ftp://ftp.cs.dartmouth.edu/pub/CStechreports/TR96280.ps.Z An RPC Mechanism for Transportable Agents  

E-Print Network (OSTI)

for multiple simul­ taneous bindings. Our agents are programmed in Agent Tcl; we describe how the Tcl implementation made RPC particularly easy to implement. Finally, although our RPC is designed for Agent Tcl programs, the concepts would also work for standard Tcl programs. Keywords ­ Transportable Agents, Remote

260

Electronic Notes in Theoretical Computer Science 82 No. 2 (2003) URL: http://www.elsevier.nl/locate/entcs/volume82.html 15 pages  

E-Print Network (OSTI)

it, we may suspect an error. · Hardware-software codesign: if we recognize in the source program a piece of code for which we have a hardware implementation (e.g. as a coprocessor or an Intellectual Property) we can remove the code and replace it by an activation of the hardware. Simple cases of algorithm

Alias, Christophe

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Titel Autor Jahr URL ABC Proteins I. Barry Holland/Susan Cole/Karl Kuchler/Christopher Higgins 2003 http://www.sciencedirect.com/science/book/9780123525512  

E-Print Network (OSTI)

/book/9780120845620 Biotechnology in the Pulp and Paper Industry L. Viikari, R. Lantto 2002 http://www.sciencedirect.com/science/publication?issn=09210423&volume=17 Foundations of Comparative Genomics Arcady R. Mushegian 2007 http://www.sciencedirect.com/science A R.S. Verma 1998 http://www.sciencedirect.com/science/issue/41823-1998-999949999.7998-649996 Genes

OsnabrĂĽck, University of

262

To link to this article: DOI: 10.1088/0957-4484/22/26/265613 URL: http://dx.doi.org/10.1088/0957-4484/22/26/265613  

E-Print Network (OSTI)

fraction 25%). Pore mean diameter at side B: (285±25) nm (void fraction 48%). Pore density at side A: 6, despite significant differences concerning the void fractions, confirming that the peculiarity of side B to the membrane pore diameter. The dissolution of the membrane results in bundles of parallel tubes, opened

Mailhes, Corinne

263

Story URL: http://news.medill.northwestern.edu/chicago/news.aspx?id=197040 Story Retrieval Date: 12/8/2011 10:08:09 AM CST  

E-Print Network (OSTI)

communication network weaves together users, electricitystoring substations, largescale generators they used," said K.C. Poulos, the town's sustainability manager. "But if you can give an example like Oak Companies and communities across Illinois are leading innovative smart grid projects. Click on the icons

Kemner, Ken

264

Electronic Notes in Theoretical Computer Science 65 No. 6 (2002) URL: http://www.elsevier.nl/locate/entcs/volume65.html 22 pages  

E-Print Network (OSTI)

(LFTR) is a thorium reactor concept that uses a chemically-stable fluoride salt for the medium in which in solid- fueled reactors. The fluid fuel in LFTR is also easy to process and to separate useful fission products, both stable and radioactive. LFTR also has the potential to destroy existing nuclear waste

Myers, Chris J.

265

To link to this article: DOI:10.1109/TPS.2012.2190303 URL : http://dx.doi.org/10.1109/TPS.2012.2190303  

E-Print Network (OSTI)

g of collagen). Since the levels of hydration in the present study are largely superior to this last. Miles, A. Sionkowska, S. Hulin, T. J. Sims, N. C. Avery, and A. J. Balley, "Identification

Mailhes, Corinne

266

PubMed QUICK GUIDE University of California Berkeley Library Use this URL to access the UCcustomized version of PubMed, with links to UCBsubscribed full text  

E-Print Network (OSTI)

PubMed searching is easy: just enter terms in the search box and click Search. The Advanced Search link below the search box provides access to additional searching options. Keyword Searching Enter combines (ANDs) significant terms together using automatic term mapping, matching your search terms

267

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) Heavy Bosons Other Than  

E-Print Network (OSTI)

://pdg.lbl.gov) Heavy Bosons Other Than Higgs Bosons, Searches for We list here various limits on charged and neutral heavy vector bosons (other than W 's and Z's), heavy scalar bosons (other than Higgs bosons), vector Searches" reviews. CONTENTS:CONTENTS:CONTENTS:CONTENTS: Mass Limits for W (Heavy Charged Vector Boson

268

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) Heavy Charged Lepton Searches  

E-Print Network (OSTI)

://pdg.lbl.gov) Heavy Charged Lepton Searches Charged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITS Sequential Charged Heavy Lepton (L±) MASS LIMITSSequential Charged Heavy Lepton (L±) MASS LIMITSSequential Charged Heavy Lepton (L±) MASS LIMITSSequential

269

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) Heavy Charged Lepton Searches  

E-Print Network (OSTI)

://pdg.lbl.gov) Heavy Charged Lepton Searches Charged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITSCharged Heavy Lepton MASS LIMITS Sequential Charged Heavy Lepton (L±) MASS LIMITSSequential Charged Heavy Lepton (L±) MASS LIMITSSequential Charged Heavy Lepton (L±) MASS LIMITSSequential

270

Citation: K. Nakamura et al. (Particle Data Group), JPG 37, 075021 (2010) (URL: http://pdg.lbl.gov) Heavy Neutral Leptons, Searches for  

E-Print Network (OSTI)

://pdg.lbl.gov) Heavy Neutral Leptons, Searches for (A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons Stable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITS Note that LEP results

271

Citation: J. Beringer et al. (Particle Data Group), PR D86, 010001 (2012) (URL: http://pdg.lbl.gov) Heavy Neutral Leptons, Searches for  

E-Print Network (OSTI)

://pdg.lbl.gov) Heavy Neutral Leptons, Searches for (A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons(A) Heavy Neutral Leptons Stable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITSStable Neutral Heavy Lepton MASS LIMITS Note that LEP results

272

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

273

V-053: Adobe Shockwave player installs Xtras without prompting | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe Shockwave player installs Xtras without prompting 3: Adobe Shockwave player installs Xtras without prompting V-053: Adobe Shockwave player installs Xtras without prompting December 24, 2012 - 12:15am Addthis PROBLEM: Adobe Shockwave player installs Xtras without prompting PLATFORM: Adobe Shockwave Player ABSTRACT: A vulnerability was reported in Adobe Shockwave. REFERENCE LINKS: Vulnerability Note VU#519137 SecurityTracker Alert ID: 1027903 Bugtraq ID: 56972 CVE-2012-6271 IMPACT ASSESSMENT: Medium DISCUSSION: Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra. IMPACT: By convincing a user to view a specially crafted Shockwave content, an attacker may be able to execute arbitrary code with the privileges of the

274

A case study on the influence of THM coupling on the near field safety of a spent fuel repository in sparsely fractured granite  

E-Print Network (OSTI)

Research Laboratory (URL) in Manitoba, Canada (Rutqvist etTSX tunnel of the URL in Manitoba, outside of the excavationLaboratory (URL) in Manitoba, Canada. The constitutive

Nguyen, T.S.

2009-01-01T23:59:59.000Z

275

An online attack against Wiesner's quantum money  

E-Print Network (OSTI)

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Lutomirski, Andrew

2010-01-01T23:59:59.000Z

276

An online attack against Wiesner's quantum money  

E-Print Network (OSTI)

Wiesner's quantum money [5] is a simple, information-theoretically secure quantum cryptographic protocol. In his protocol, a mint issues quantum bills and anyone can query the mint to authenticate a bill. If the mint returns bogus bills when it is asked to authenticate them, then the protocol can be broken in linear time.

Andrew Lutomirski

2010-10-01T23:59:59.000Z

277

Detecting unknown network attacks using language models  

Science Conference Proceedings (OSTI)

We propose a method for network intrusion detection based on language models such as n-grams and words. Our method proceeds by extracting these models from TCP connection payloads and applying unsupervised anomaly detection. The essential part ...

Konrad Rieck; Pavel Laskov

2006-07-01T23:59:59.000Z

278

Visualizing Risks: Icons for Information Attack Scenarios  

Science Conference Proceedings (OSTI)

... impact of specific threats by avoiding or transferring risk, reducing vulnerability, recovering quickly ... Underground facility Optical cable ... Tornado Water ...

2000-11-03T23:59:59.000Z

279

Remote Denial of Service Attacks and Countermeasures  

E-Print Network (OSTI)

this paper shall be assumed to be 4. The Hlen field specifies the length of the header in 32-bit words. ToS, or type of service, indicates how packets 2 should be treated based on application needs (how they should be queued, etc.). Since the Length field, which specifies the length of the entire datagram in bytes, is 16 bits, the maximum length of an IP packet is 2 --1 bytes [19]. The Identifier field, the Offset field, and one of the flags are used for handling fragmentation and reassembly. Different networks have different MTU's (maximum transmission units), meaning that maximum allowable packet sizes differ from network to network. Thus, a large packet from a network with a large MTU may need to be broken into fragments as it enters a network with a smaller MTU. The end host is responsible for reassembling the fragments. Fragments that will be reassembled into a single packet are given the same identifier. The first fragment has an offset of zero, and for the following fragments, the Offset field contains the offset in bytes from the first fragment. A flag is set in a packet to indicate that more fragments will follow [19]. Time to live (TTL) provides a way to prevent packets from floating around indefinitely in transit to their destinations. At each hop, this field is typically decremented, and the packet is discarded if the TTL field reaches zero. Since several protocols such as TCP and UDP ride on top of IP, the Protocol field is used to specify the higher level protocol to which the IP packet belongs. A checksum is performed to provide a means for determining whether or not the header has been corrupted. The source address and destination address of the packet are specified following the checksum. Options, which are not frequently used, are included at the end...

David Karig And; David Karig; Ruby Lee

2001-01-01T23:59:59.000Z

280

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2011 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle filenames with meta characters during tab expansions. This may allow a context-dependent attacker to use a crafted filename to trick another user to execute arbitrary commands, which may allow the attacker to gain elevated privileges. April 4, 2011 T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

282

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

283

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

284

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

285

Transmission/Resource Library/Enviromental Resources and Mitigation...  

Open Energy Info (EERE)

Resources and Mitigation < Transmission | Resource Library(Redirected from TransmissionResource LibraryMitigation) Redirect page Jump to: navigation, search REDIRECT...

286

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 920 of 29,416 results. 11 - 920 of 29,416 results. Article U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. http://energy.gov/cio/articles/u-222-apple-safari-bugs-let-remote-users-execute-arbitrary-code-spoof-url-address-bar Download EA-1523: Finding of No Significant Impact Modifications at the Strategic Petroleum Reserve's West Hackberry Raw Water Intake Structure Site, Calcasieu Parish, Louisiana http://energy.gov/nepa/downloads/ea-1523-finding-no-significant-impact Page EA-1211: Relocation and Storage of Isotopic Heat Sources, Hanford Site, Richland, Washington This EA evaluates the environmental impacts for the proposal for relocation

287

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

288

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

289

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

290

T-596: 0-Day Windows Network Interception Configuration Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: 0-Day Windows Network Interception Configuration 6: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. reference LINKS: InfoSec Institute - SLAAC Attack Cisco Threat Comparison and Best-Practice White Paper IMPACT ASSESSMENT: High

291

20130723 - NXDOMAIN  

Science Conference Proceedings (OSTI)

... Department of Energy - jgi.gov; [redirect] Department of Health And ... Administration - casu.gov; [redirect] General Services Administration - hotels. ...

2013-07-24T23:59:59.000Z

292

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

293

To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_5945935,00.html  

E-Print Network (OSTI)

Building in Melbourne [15] now uses latent heat stores to reduce solar cooling plant size and avoid peak solar water heating is the most common solar thermal instrument, with around 5% of homes using thermal research includes solar crop drying, solar ponds and solar air heating but all on a small scale

294

To print this page, select File then Print from your browser URL: http://www.hgtvpro.com/hpro/nws_ind_nws_trends/article/0,2624,HPRO_26519_6023943,00.html  

E-Print Network (OSTI)

rain- screen/insulation wall cladding for commercial buildings, a heat-pump water heater, an energy-Content Office Furniture Project FROG Modular Green Classroom Rheem HP-50 Heat-Pump Water Heater Convia Energy for data centers, a mobile solar generator for job-site power, and an advanced modular classroom

295

To link to this article: DOI: 10.1016/j.matlet.2011.07.082 URL : http://dx.doi.org/10.1016/j.matlet.2011.07.082  

E-Print Network (OSTI)

industry. The main difficulty is often to achieve the combination of both high spatial resolution industry due to their specific properties as mechanical resistivity, hardness, conductivity and magnetic aluminum oxide (AAO) membranes [13­15] and reach good results after the dissolution of the ceramic matrix

Mailhes, Corinne

296

To link to this article : DOI:10.1016/j.jcis.2011.08.087 URL : http://dx.doi.org/10.1016/j.jcis.2011.08.087  

E-Print Network (OSTI)

[41], the kinetic simulations of the non-isothermal experiments at constant heating rates showed. 161 (2001) 319. [41] P. Alphonse, M. Courty, Thermochim. Acta 425 (2005) 75. [42] B.C. Lippens, J

297

To link to this article: DOI: 10.1016/j.ssi.2010.02.014 URL: http://dx.doi.org/10.1016/j.ssi.2010.02.014  

E-Print Network (OSTI)

and in the Belt and have been estimated from available SN progenitors counts (Tammann et al., 1994 and Grenier formation in . 1 kpc around the Sun. Originally this idea has been suggested by Grenier (2000) and Gehrels their cooling model to our disposal. SP thanks Isabelle Grenier for discus- sions. The work of MP and SP

Mailhes, Corinne

298

Markteting Expertise List page 1 of 6 First Name Last Name Title Affiliation Mailing Address Country Phone Fax eMail Expertise/Research Area(s) Secondary eMail URL  

E-Print Network (OSTI)

+903 122-964147 +903 122-234532 ramazan12000@yahoo.com http://www.ogm.gov.tr Robert Beauregard Canada 418 656 7684 robert.beauregard@sbf.ulaval.ca Secondary wood products; Product development

299

To link to this article: DOI: 10.1016/j.indcrop.2011.06.031 URL: http://dx.doi.org/10.1016/j.indcrop.2011.06.031  

E-Print Network (OSTI)

approach, we propose to study the chemical conversion of one of these acids, the aconitic acid and 75% of fusel oils, according to the origin of bioethanol (beet, wheat, etc.). Lauryl alcohol- ied in order to optimize the conversion of aconitic acid and to enrich the medium with one

Mailhes, Corinne

300

To link to this article: DOI:10.1016/j.pecs.2012.04.004 URL : http://dx.doi.org/10.1016/j.pecs.2012.04.004  

E-Print Network (OSTI)

flames in gas turbine combustion chambers. (2012) Progress in Energy and Combustion Science, vol. 38 (n.pecs.2012.04.004 #12;Large Eddy Simulations of gaseous flames in gas turbine combustion chambers L for aeronautical gas turbine burners are reviewed: (1) laboratory-scale combustors, without compressor or turbine

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Mining For Cosmic Treasures With GEMS: Largest Hubble Color... http://www.sciencedaily.com/print.php?url=/releases/2004/01/040... 1 of 2 08/06/04 17:39  

E-Print Network (OSTI)

sample of galaxies can one explore the huge diversity of galaxy types, sizes and shapes, as well distant galaxies are moving away from us faster than nearby galaxies. Astronomers use the Doppler shift of the galaxies' light to measure this movement and compute the distance. And because the light from distant

302

To link to this article : DOI:10.1007/s11367-012-0432-9 URL : http://dx.doi.org/10.1007/s11367-012-0432-9  

E-Print Network (OSTI)

(Jiménez-Gonzalez et al. 2000). For example, Portha et al. (2010) studied a naphtha catalytic reforming. (2010) Naphtha catalytic reforming process Process scale treatment Existing and design improvement (Tangsubkul et al. 2006), in the Naphtha catalytic reforming process (Portha et al. 2010), in the biomass

303

To link to this article: DOI: 10.1016/j.memsci.2012.10.041 URL : http://dx.doi.org/10.1016/j.memsci.2012.10.041  

E-Print Network (OSTI)

-permeable structures, following cell organization, cell proliferation and liver specific activities over a 9 days to control. Therefore, this membrane with double porosity appeared as a promising support to offer an inner 3D environment adequate to cell proliferation to form a liver-like tissue. 1. Introduction

Mailhes, Corinne

304

A scalable wireless routing protocol secure against route truncation attacks  

Science Conference Proceedings (OSTI)

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative ...

Amitabh Saxena; Ben Soh

2010-05-01T23:59:59.000Z

305

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks  

Science Conference Proceedings (OSTI)

Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores ... Keywords: Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks

Eugene Y. Vasserman; Nicholas Hopper

2013-02-01T23:59:59.000Z

306

Optimal counterfeiting attacks and generalizations for Wiesner's quantum money  

E-Print Network (OSTI)

We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank's test for validity, is (3/4)^n for n being the number of qubits used for each note. Generalizations in which other ensembles of states are substituted for the one considered by Wiesner are also discussed, including a scheme recently proposed by Pastawski, Yao, Jiang, Lukin, and Cirac, as well as schemes based on higher dimensional quantum systems. In addition, we introduce a variant of Wiesner's quantum money in which the verification protocol for bank notes involves only classical communication with the bank. We show that the optimal probability with which a counterfeiter can succeed in two independent verification attempts, given access to a single valid n-qubit bank note, is (3/4+sqrt(2)/8)^n. We also analyze extensions of this variant to higher-dimensional schemes.

Abel Molina; Thomas Vidick; John Watrous

2012-02-17T23:59:59.000Z

307

Optimal counterfeiting attacks and generalizations for Wiesner's quantum money  

E-Print Network (OSTI)

We present an analysis of Wiesner's quantum money scheme, as well as some natural generalizations of it, based on semidefinite programming. For Wiesner's original scheme, it is determined that the optimal probability for a counterfeiter to create two copies of a bank note from one, where both copies pass the bank's test for validity, is (3/4)^n for n being the number of qubits used for each note. Generalizations in which other ensembles of states are substituted for the one considered by Wiesner are also discussed, including a scheme recently proposed by Pastawski, Yao, Jiang, Lukin, and Cirac, as well as schemes based on higher dimensional quantum systems. In addition, we introduce a variant of Wiesner's quantum money in which the verification protocol for bank notes involves only classical communication with the bank. We show that the optimal probability with which a counterfeiter can succeed in two independent verification attempts, given access to a single valid n-qubit bank note, is (3/4+sqrt(2)/8)^n. We...

Molina, Abel; Watrous, John

2012-01-01T23:59:59.000Z

308

Voice pharming attack and the trust of VoIP  

Science Conference Proceedings (OSTI)

Voice communication is fundamental to the normal operation of our society. The general public have put a lot of trust in voice communication and they have been relying on it for many critical and sensitive information exchange (e.g., emergency 911 calls, ...

Xinyuan Wang; Ruishan Zhang; Xiaohui Yang; Xuxian Jiang; Duminda Wijesekera

2008-09-01T23:59:59.000Z

309

Unidentifiable Attacks in Electric Power Systems Zhengrui Qin, Qun Li  

E-Print Network (OSTI)

reactive capacity of generator g QGg,max: max reactive capacity of generator g PLmin ij : min line capacity between bus i and bus j PLmax ij : max line capacity between bus i and bus j PDk,i: real demand on bus i injections on buses and real and reactive power flows on transmission lines. Such data is then fed

Li, Qun

310

Situational Awareness a New Way to Attack Cybersecurity ...  

Science Conference Proceedings (OSTI)

... that occurs within the cybersecurity network evolves along ... facilities and the coordination of power transfer between ... i) Procedures for the loss of the ...

2013-04-02T23:59:59.000Z

311

On self-stabilizing synchronous actions despite byzantine attacks  

Science Conference Proceedings (OSTI)

Consider a distributed network of n nodes that is connected to a global source of "beats". All nodes receive the "beats" simultaneously, and operate in lock-step. A scheme that produces a "pulse" every Cycle beats is shown. That is, the nodes agree on ...

Danny Dolev; Ezra N. Hoch

2007-09-01T23:59:59.000Z

312

It's Go Time Robots Attack Family Internet Safety  

Science Conference Proceedings (OSTI)

... Classmates.com You Tube Slashdot (Location) ... Vehicle registration information ? Got a Mailbox with a RED Flag? Unclassified Unclassified ...

2010-04-05T23:59:59.000Z

313

Security evaluation of dual rail logic against DPA attacks  

E-Print Network (OSTI)

modeling in deep submicron CMOS" IEEE Trans. on CAD, vol.21, n11, pp.1352-1363, 2002. [12] K.O. Jeppson

Paris-Sud XI, Université de

314

Observing industrial control system attacks launched via metasploit framework  

Science Conference Proceedings (OSTI)

Industrial Control Systems (ICS) are present across many industries ranging from automotive to utilities. These systems have been found to be connected to corporate enterprise servers and can communicate over unencrypted communication channels. Interconnections ... Keywords: SCADA, industrial control systems, intrusion detection

Nathan Wallace, Travis Atkison

2013-04-01T23:59:59.000Z

315

Government preparedness: Using simulation to prepare for a terrorist attack  

Science Conference Proceedings (OSTI)

The heightened threat of terrorism has caused governments worldwide to plan for responding to large-scale catastrophic incidents. In England the New Dimension Programme supplies equipment, procedures and training to the Fire and Rescue Service to ensure ... Keywords: Discrete event simulation, Fire and Rescue Service, Preparedness, Terrorism

Pavel Albores; Duncan Shaw

2008-06-01T23:59:59.000Z

316

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses  

E-Print Network (OSTI)

Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

Sen, Jaydip

2011-01-01T23:59:59.000Z

317

Optimal Power Grid Protection through A Defender-Attacker ...  

E-Print Network (OSTI)

DC power flow model is used to compute power ... Constraints (4) capture the active DC power flows on a ..... Board on Energy and Environmental Systems; Na -.

318

Optimal Response to Epidemics and Cyber Attacks in Networks  

E-Print Network (OSTI)

Jan 18, 2012 ... of Energy, under Contract DE-AC02-06CH11357. ...... the 1993 IEEE Symposium on Security and Privacy, pages 2–15, Washington, DC, USA,.

319

Parallel Computing in the 1990's: Attacking the Software Problem  

E-Print Network (OSTI)

It is today's general wisdom that the productive use of parallel architectures depends crucially on the availability of powerful development tools and run-time environments. In this paper, we systematically discuss the fundamental software problems encountered in programming parallel architectures, in particular those with distributed resources. All these problems need to be solved, if efficient and convenient use of parallel machines is to be guaranteed. We present a five phases model of parallel application program development, which describes the required efforts in parallel programming by means of four transformation steps: problem analysis, algorithm design, implementation, and mapping. The major part of the paper is dedicated to the description of three research projects which focus on the last three transformation steps: SKELETON, a tool for providing improved algorithmic support for the application-oriented programmer, SPADE, an integrated development and run-time environment, ...

J.E. Boillat; H. Burkhart; K. M. Decker; P. G. Kropf

1991-01-01T23:59:59.000Z

320

A tutorial on physical security and side-channel attacks  

Science Conference Proceedings (OSTI)

A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, ...) to expose the device's secrets. This gave birth ...

François Koeune; François-Xavier Standaert

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cryptographic Hash Workshop (2006) - How to Attack a Hash ...  

Science Conference Proceedings (OSTI)

... amgaard Merkle Construction • uilding a ÷ash Function from a Compression Function ÷ash function takes Ŕariable length input ...

2012-06-20T23:59:59.000Z

322

Monitoring the Macroscopic Effect of DDoS Flooding Attacks  

Science Conference Proceedings (OSTI)

... Our hypothesis: congested destinations, caused by flash crowds (ie, legitimate users ... except that our model reduces the congestion window to half ...

2012-10-17T23:59:59.000Z

323

More on graph theoretic software watermarks: Implementation, analysis, and attacks  

Science Conference Proceedings (OSTI)

This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, ... Keywords: Software piracy protection, Software protection, Software watermarking, Surreptitious software

Christian Collberg; Andrew Huntwork; Edward Carter; Gregg Townsend; Michael Stepp

2009-01-01T23:59:59.000Z

324

Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks  

SciTech Connect

This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

2009-01-31T23:59:59.000Z

325

Protecting clients from insider attacks on trust accounts  

Science Conference Proceedings (OSTI)

Law firms are no exception to the trend towards computerized information infrastructures, particularly because the very nature of their business is collecting and storing highly confidential client data. One area of activity which has come under intense ... Keywords: Fraud, IT security, Trust account

Sameera Mubarak; Jill Slay

2009-11-01T23:59:59.000Z

326

A Review of Different Forms of Sulfate Attack  

and Canada, evaporation is a big issue. • Sulfate salts are continuously drawn up from the soil and precipitate near the evaporative face to build high concentrations.

327

Memoization Attacks and Copy Protection in Partitioned Applications  

E-Print Network (OSTI)

Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...

O'Donnell, Charles W.

2006-12-08T23:59:59.000Z

328

False Data Injection Attacks in Smart Grid: Challenges and ...  

Science Conference Proceedings (OSTI)

... Distribution ? Final Remarks Page 4. ... Limited automation and situational awareness ... Wei Yu Smart Grid: An Energy-based Internet ...

2012-05-05T23:59:59.000Z

329

Ricoh_Enterprise Track_paper_final\\374  

Science Conference Proceedings (OSTI)

... One is by URL. We found some specific URL patterns are duplicated, such as in http://esw.w3.org/topic/Algae?action=diff&date=1059952621. ...

2007-02-16T23:59:59.000Z

330

Property:Geothermal/NewsWebsite | Open Energy Information  

Open Energy Info (EERE)

search Property Name GeothermalNewsWebsite Property Type URL Description News Web URL Retrieved from "http:en.openei.orgwindex.php?titleProperty:Geothermal...

331

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

332

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

333

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 11, 2011 April 11, 2011 T-599: Microsoft April 2011 Security Bulletin Release Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. April 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle

334

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

335

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

336

Record Sheet For The Internet  

NLE Websites -- All DOE Office Websites (Extended Search)

Record Sheet for Internet Information Student Names Brief Description of Information Internet URL...

337

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

338

Efficient Semantic Deduction and Approximate Matching over ...  

Science Conference Proceedings (OSTI)

... c) Redirect: a bidirectional rule based on Wikipedia's redirections between user queries and the title they are redi- rected to (eg Yankee land is ...

2009-02-27T23:59:59.000Z

339

Water-Gas Sampling | Open Energy Information  

Open Energy Info (EERE)

Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon Water-Gas Sampling (Redirected from Water-Gas Samples) Redirect page Jump to: navigation,...

340

untitled  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Phone 609-452-8060 Fax 609-452-9550 URL www.nerc.com Phone 609-452-8060 Fax 609-452-9550 URL www.nerc.com N O R T H A M E R I C A N E L E C T R I C R E L I A B I L I T Y C O U N C I L P r i n c e t o n F o r r e s t a l V i l l a g e , 1 1 6 - 3 9 0 V i l l a g e B o u l e v a r d , P r i n c e t o n , N e w J e r s e y 0 8 5 4 0 - 5 7 3 1 FOR IMMEDIATE RELEASE Contact: Ellen P. Vancko evancko@nerc.com August 14, 2003 Power Outages ⎯ Update 8/15/2003 ⎯ 12:00 a.m. Starting at about 4:11 p.m. EDT, major losses of electric load occurred in the northeastern United States and Canada in the Eastern Interconnection. Although the exact cause is not known at present, the outages are not the result of a terrorist attack. The areas most affected center around the Great Lakes: Michigan, Ohio, New York City, Ontario, Quebec, northern New Jersey, Massachusetts, and Connecticut. The following load was lost (approximate numbers):

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

342

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2012 23, 2012 U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. January 20, 2012 U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. January 19, 2012 U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges The system does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 17, 2012 U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

343

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

344

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 1, 2012 August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. July 26, 2012 U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability ISC BIND is prone to a denial-of-service vulnerability. July 24, 2012

345

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

346

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

347

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

348

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

349

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

350

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

351

JC3 Medium Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. August 28, 2013 V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

352

Designing System-level Defenses against Cellphone Malware  

E-Print Network (OSTI)

Abstract—Cellphones are increasingly becoming attractive targets of various malware, which not only cause privacy leakage, extra charges, and depletion of battery power, but also introduce malicious traffic into networks. In this work, we seek system-level solutions to handle these security threats. Specifically, we propose a mandatory access control–based defense to blocking malware that launch attacks through creating new processes for execution. To combat more elaborated malware which redirect program flows of normal applications to execute malicious code within a legitimate security domain, we further propose using artificial intelligence (AI) techniques such as Graphic Turing test. Through extensive experiments based on both Symbian and Linux smartphones, we show that both our system-level countermeasures effectively detect and block cellphone malware with low false positives, and can be easily deployed on existing smartphone hardware.

Liang Xie; Xinwen Zhang; Ashwin Chaugule; Trent Jaeger; Sencun Zhu

2009-01-01T23:59:59.000Z

353

conventions.tex - CECM  

E-Print Network (OSTI)

URLs should be complete, such as http://pi.nersc.gov and must be in tt font. If the URL occupies more than about one-half of a line, then it should appear on a ...

354

Addressing Water Consumption of Evaporative Coolers with Greywater  

NLE Websites -- All DOE Office Websites (Extended Search)

URL https:isswprod.lbl.govlibraryview-docspublicoutputrpt81997.PDF Attachment Size PDF 2.09 MB Google Scholar BibTex RIS RTF XML Alternate URL: http:eetd.lbl.govnode...

355

Measuring savings in energy savings performance contracts using...  

NLE Websites -- All DOE Office Websites (Extended Search)

Notes Added to JabRef: 2010.04.28 URL http:www.osti.govbridgeproduct.biblio.jsp?queryid0&page0&ostiid491549 Google Scholar BibTex RIS RTF XML Alternate URL: http:...

356

Microsoft Word - M2FT-12LB0811021_Final  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

at the Tournemire URL, France (Focus: EBS) ... 7 3.1.4 Task B1: HE-E Heater Test at Mont Terri URL, Switzerland (Focus: EBS and its interaction with NBS)...

357

Power Efficient Scheduling for Network Applications on Multicore Architecture  

E-Print Network (OSTI)

one packet in microseconds (usec) and throughput is measuredLATA Parallel List Latency (usec) URL Flow IPv4-trie RouteRandom Bipar Greedy Latency (usec) URL Flow IPv4-trie Route

Kuang, Jilong

2011-01-01T23:59:59.000Z

358

University of Munich Department of Computer Science  

E-Print Network (OSTI)

object can just be a location, a physical object augmented with a number, URL, NFC / RIFD tag or visual

359

NIST Poten. Energy Surfaces of Group II Dimers - Version ...  

Science Conference Proceedings (OSTI)

... database access date.) SA Kotochigova and PS Julienne (2010), Potential Energy Surface Database ... [Type of medium] Available: URL [Access date ...

2010-10-05T23:59:59.000Z

360

1541-1672/08/$25.00 2008 IEEE IEEE INTELLIGENT SYSTEMS Published by the IEEE Computer Society  

E-Print Network (OSTI)

York, NY, USA, 2007. ACM. Force, Federal Smart Grid Task. Smart grid basics, 2010. URL http://www.smartgrid

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Assessment of Energy Efficiency Improvement and CO2 Emission...  

NLE Websites -- All DOE Office Websites (Extended Search)

industry, Cost Analyst, Energy Efficiency Technologies, industrial energy efficiency, Steel Industry URL https:isswprod.lbl.govlibraryview-docsprivateoutputrpt82351.PDF...

362

Figure 6. PCs and Terminals per Million Square Feet, 1992 and...  

U.S. Energy Information Administration (EIA) Indexed Site

Swenson URL: consumptioncommercialdataarchivecbecsconsumptionbriefssqft9295.htm For help with technical problems, please contact the webmaster: wmaster@eia.doe.gov Phone...

363

MySearchView: A Customized Metasearch Engine Generator  

E-Print Network (OSTI)

]: Information Search and Retrieval ­ retrieval model, search process. General Terms Management, Measurement to enter the URL of a search engine. Suppose the URL of the search engine is www.yahoo.com. The user can to enter more search engines for this metasearch engine. Once all of the desired search engine URLs

Meng, Weiyi

364

Concerted multi-pronged attack by calpastatin to occlude the catalytic cleft of heterodimeric calpains  

SciTech Connect

Ca{sup 2+}-dependent cysteine proteases, calpains, regulate cell migration, cell death, insulin secretion, synaptic function and muscle homeostasis. Their endogenous inhibitor, calpastatin, consists of four inhibitory repeats, each of which neutralizes an activated calpain with exquisite specificity and potency. Despite the physiological importance of this interaction, the structural basis of calpain inhibition by calpastatin is unknown. Here we report the 3.0 A structure of Ca{sup 2+}-bound m-calpain in complex with the first calpastatin repeat, both from rat, revealing the mechanism of exclusive specificity. The structure highlights the complexity of calpain activation by Ca{sup 2+}, illustrating key residues in a peripheral domain that serve to stabilize the protease core on Ca{sup 2+} binding. Fully activated calpain binds ten Ca{sup 2+} atoms, resulting in several conformational changes allowing recognition by calpastatin. Calpain inhibition is mediated by the intimate contact with three critical regions of calpastatin. Two regions target the penta-EF-hand domains of calpain and the third occupies the substrate-binding cleft, projecting a loop around the active site thiol to evade proteolysis.

Moldoveanu, Tudor; Gehring, Kalle; Green, Douglas R. (McGill); (SJCH)

2009-01-15T23:59:59.000Z

365

Vampire attacks: Draining life from wireless ad-hoc sensor networks  

E-Print Network (OSTI)

with similarly sized mice (Riskin and Hermanson, 2005) suggests that vampire bats might even consume less energy (Chiroptera) are generally awkward crawlers, but the common vampire bat (Desmodus rotundus) and the New a single kinematic gait shift with increasing speed from a kinetic walk (where kinetic and potential energy

Hopper, Nicholas J.

366

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms  

Science Conference Proceedings (OSTI)

Evolution in cloud services and infrastructure has been constantly reshaping the way we conduct business and provide services in our day to day lives. Tools and technologies created to improve such cloud services can also be used to impair them. By using ... Keywords: cloud computing infrastructure, cyber security, denial of service (DoS), game theory

Harkeerat Singh Bedi; Sajjan Shiva

2012-08-01T23:59:59.000Z

367

RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON  

E-Print Network (OSTI)

power outages, encompassing the risks, consequences, and costs of such outages. Key words: electric the risk of 3DRAFT #12;power outages and for the construction of scenarios that explore economic costs in recent years. From 1990 through 1994 the proportion of Canadian outages with zero MW loss was never more

Wang, Hai

368

The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General  

E-Print Network (OSTI)

interest legal organizations; directories of public interestorganizations that provide direct legal services are also represented. We also searched lists and national directories

Albiston, Catherine R.; Nielsen, Laura Beth

2006-01-01T23:59:59.000Z

369

Fieldable Fourier Transform Spectrometer: System Construction, Background Variability Measurements, and Chemical Attack Warning Experiments  

SciTech Connect

The infrared sensors task at the Pacific Northwest National Laboratory (PNNL) is focused on the science and technology of remote and in-situ chemical sensors for detecting proliferation and countering terrorism. Missions to be addressed by remote chemical sensor development will include detecting proliferation of nuclear or chemical weapons, and providing warning of terrorist use of chemical weapons. Missions to be addressed by in-situ chemical sensor development include countering terrorism by screening luggage, personnel, and shipping containers for explosives, firearms, narcotics, chemical weapons, or chemical weapons residues, and mapping contaminated areas. The science and technology relevant to these primary missions is also likely to be useful for battlefield chemical weapons defense, air operations support, monitoring emissions from chemical weapons destruction facilities or industrial chemical plants, and law enforcement applications. PNNL will seek to serve organizations with direct interest in these missions through collaborative research and development efforts approved by NA-22. During FY02, PNNL began assembling a remote IR detection capability that would allow field experiments to be conducted. The capability consists of a commercially available FTIR (Fourier Transform Infrared) emission spectrometer and a frequency-modulation differential-absorption LIDAR (FM-DIAL) system being developed at PNNL. To provide environmental protection for these systems, a large, well insulated, temperature controlled trailer was specified and procured. While the FTIR system was field-ready, the FM-DIAL system required many modifications to prepare for field deployment. This document provides an overview of the FTIR system, summarizes the modifications made to the FM-DIAL system, and describes the salient features of the remote systems trailer.

Hatchell, Brian K.; Harper, Warren W.; Batishko, Charles R.; Johnson, Timothy J.; Sheen, David M.; Stewart, Timothy L.; Schultz, John F.

2002-10-01T23:59:59.000Z

370

The Hopwood Decision in Texas as an Attack on Latino Access to Selective Higher Education Programs  

E-Print Network (OSTI)

to Comprehensive Higher Education in Texas." The SocialFocus on Latinos in Higher Education," Tenth Annual Statuson Minorities in Higher Education. (American Council on

Chapa, Jorge

2001-01-01T23:59:59.000Z

371

Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network  

E-Print Network (OSTI)

of the Secretary of Defense Exceptional Public Service Award and the Hammer Award from former Vice President Al worldwide publicity in acclaimed international media. The automated construction invention, Contour Crafting For a 3000m well with 1500kg weight: kWhJE 8581009.3 9 #12;Power system controls #12;Microgrid scale k

Chien, Andrew A.

372

Mitigating attacks against virtual coordinate based routing in wireless sensor networks  

Science Conference Proceedings (OSTI)

Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that nodes ... Keywords: beacon vector routing, routing, secure beacon vector routing, security, sensor network routing, virtual coordinate system

Jing Dong; Kurt E. Ackermann; Brett Bavar; Cristina Nita-Rotaru

2008-03-01T23:59:59.000Z

373

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting  

E-Print Network (OSTI)

We propose a family of sifting-less quantum-key-distribution protocols which use reverse-reconciliation, and are based on weak coherent pulses (WCPs) polarized along m different directions. When m=4, the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing. We compute their total keyrate as function of the channel transmission T, using general information theoretical arguments and we show that they have a higher keyrate than the more standard protocols, both for fixed and optimized average photon number of the WCPs. When no decoy-state protocols (DSPs) are applied, the scaling of the keyrate with transmission is improved from T2 for BB84 to T^(1+1/(m-2)). If a DSP is applied, we show how the keyrates scale linearly with T, with an improvement of the prefactor by 75.96 % for m=4. High values of $ m $ allow to asymptotically approach the keyrate obtained with ideal single photon pulses. The fact that the keyrates of these sifting-less protocols are higher compared to those of the aforementioned more standard protocols show that the latter are not optimal, since they do not extract all the available secret key from the experimental correlations.

Fabio Grazioso; Frédéric Grosshans

2013-06-25T23:59:59.000Z

374

An event buffer flooding attack in DNP3 controlled SCADA systems  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized ...

Dong Jin; David M. Nicol; Guanhua Yan

2011-12-01T23:59:59.000Z

375

Formal evaluation of the robustness of dual-rail logic against DPA attacks  

Science Conference Proceedings (OSTI)

Based on a first order model of the switching current flowing in CMOS cell, an investigation of the robustness against DPA of dual-rail logic is carried out. The result of this investigation, performed on 130nm process, is a formal identification of ...

Alin Razafindraibe; Michel Robert; Philippe Maurine

2006-09-01T23:59:59.000Z

376

The Hopwood Decision in Texas as an Attack on Latino Access to Selective Higher Education Programs  

E-Print Network (OSTI)

Higher Education in Texas." The Social Science Journal.Amici Curae" Hopwood v. Texas, United States Court ofMexicans in the Making of Texas, 1836-1986. (The University

Chapa, Jorge

2001-01-01T23:59:59.000Z

377

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

378

Regional Recovery Framework for a Biological Attack in the Seattle Urban Area  

E-Print Network (OSTI)

imaging techniques · Unconventional oil and gas recovery · Gas hydrates · Nano-sensors Cross recovery Unconventional resources Renewable fuels Carbon dioxide Public policy Environmental/health #12;The and commercializing OxProp a "controlled buoyancy proppant" that is expected to materially enhance oil and gas

379

Charting the Future of College Affirmative Action: Legal Victories, Continuing Attacks, and New Research  

E-Print Network (OSTI)

2,98(!. '! (84! -)*770. )4>! Michigan Journal of Race & Law,A17. Selingo, J. (2005). Michigan: Who really won? ChronicleEvidence from Florida and Michigan. In D. E. Heller & P.

Orfield, Gary; Marin, Patricia; Flores, Stella M.; Garces, Liliana M.

2007-01-01T23:59:59.000Z

380

Ice smoothie gives heart attacks the 'big Chill,' may save lives  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Impact of the 2001 World Trade Center Attack on Critical Interdependent Infrastructures*  

E-Print Network (OSTI)

; transportation; information and communications; electric power; banking and finance; gas and oil production, water and sewer systems date back nearly 6,000 years in world history [3] and have been essential in nature. By enriching the history of infrastructure interdependence, researchers can better assess both

Mendonça, David

382

New Attacks on Randomized ECC Algorithms Zhijie Jerry Shi and Fan Zhang  

E-Print Network (OSTI)

decreases exponentially. With N power traces, the overall error rate in State 1 can be calculated as: 322 2 number of power traces and has a very high success rate. I. INTRODUCTION The arithmetic of large integer the automaton enters State 1 or 11, a random variable e is drawn. If the next bit is 1, only the transition

Shi, Zhijie Jerry

383

Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth  

E-Print Network (OSTI)

of implementation is suitable for a system running on event­driven foundation classes, such as MFC and JFC. 3 Aspect that increments the in and out counters defined in the cluster. Let B be a Boolean expression (called a guard procedure within the monitor. One condition vari­ able is declared for each guard B in an await statement

Corliss, Marc

384

Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters  

E-Print Network (OSTI)

. Energy [Online]. Available: http://www.oe.en- ergy.gov/smartgrid.htm [3] R. Sridhar, R. Rajeev, and S

Smith, Sean W.

385

The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General  

E-Print Network (OSTI)

be more likely to experience fallout from Buckhannon becausepositively correlated with fallout from Buckhannon. Note,the likelihood of negative fallout from Buckhannon. We then

Albiston, Catherine R.; Nielsen, Laura Beth

2006-01-01T23:59:59.000Z

386

On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography  

Science Conference Proceedings (OSTI)

We consider a quantum polynomial-time algorithm which solves the discrete logarithm problem for points on elliptic curves over GF (2 m ). We improve over earlier algorithms by constructing an efficient ...

Donny Cheung; Dmitri Maslov; Jimson Mathew; Dhiraj K. Pradhan

2008-11-01T23:59:59.000Z

387

WDA: A Web farm Distributed Denial Of Service attack attenuator Ehud Doron *, Avishai Wool  

E-Print Network (OSTI)

Tuesday 9.30 Doctoral session Chair: Sonka Ihnen Adèle Cassigneul,`Literary boundaries: de ning the Wool) intellectual history' 1 Lunch 2.30 Comparative practice Danielle Clarke,`Analogy and example as comparative(s): the legacy of continental French philosophy in contemporary art history' 1.15 Lunch 2.30 Keynote III Chair

Wool, Avishai

388

Discovery and prevention of attack episodes by frequent episodes mining and finite state machines  

Science Conference Proceedings (OSTI)

This paper proposes a framework that applies frequent episode rules, implemented by finite state machines (FSMs), to design a real-time network-based intrusion prevention system (NIPS) for Probe/Exploit (hacking) intrusion. This type of Probe/Exploit ... Keywords: Finite state machines (FSMs), Firewall, Frequent episode rules, Honeypot, Network security, Network-based intrusion prevention system (NIPS)

Ming-Yang Su

2010-03-01T23:59:59.000Z

389

Packet Filtering for Congestion Control under DoS Attacks Yen-Hung Hu  

E-Print Network (OSTI)

Science George Washingtin University Washington, DC 20052 yenhung@gwu.edu Hongsik Choi Department Department of Computer Science George WAshington University Washington, DC 20052 hchoi@gwu.edu Abstract the window period is defined as DC E ' ' GFIH , where ' denotes the to- tal number of bits

Choi, Hyeong-Ah

390

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery  

Science Conference Proceedings (OSTI)

In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental ... Keywords: Fragile watermarking, Image authentication, Tamper detection

Chin-Chen Chang; Yi-Hsuan Fan; Wei-Liang Tai

2008-02-01T23:59:59.000Z

391

An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks  

E-Print Network (OSTI)

and K. P. Subbalakshmi Department of Electrical and Computer Engineering Stevens Institute of Technology an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound to the scarcity of the available resources/spectrum. Cognitive radio networks [1] enable usage of unused spectrum

Subbalakshmi, K.P. "Suba"

392

Frack Attack: Weighing the Debate over the Hazards of Shale Gas Production  

E-Print Network (OSTI)

by shale gas production, it is first important to understand what shale is, where it is deposited, why it serves as a reservoir for natural gas, these ultra- low permeability shales serve as natural barriers that seal any gas

393

DroidChameleon: evaluating Android anti-malware against transformation attacks  

Science Conference Proceedings (OSTI)

Mobile malware threats have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known ... Keywords: android, anti-malware, malware, mobile

Vaibhav Rastogi, Yan Chen, Xuxian Jiang

2013-05-01T23:59:59.000Z

394

Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining  

Science Conference Proceedings (OSTI)

Data-mining techniques can be used not only to study collective behavior about customers, but also to discover private information about individuals. In this study, we demonstrate that decision trees, a popular classification technique for data mining, ... Keywords: computers, data mining, databases/artificial intelligence, decision trees, entropy, privacy, probability, pruning, public sector, relative entropy, society

Xiao-Bai Li; Sumit Sarkar

2009-11-01T23:59:59.000Z

395

On highly nonlinear s-boxes and their inability to thwart DPA attacks  

Science Conference Proceedings (OSTI)

Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in which the round keys are introduced by addition, to thwart single-bit or ...

Claude Carlet

2005-12-01T23:59:59.000Z

396

Machine learning based adaptive watermark decoding in view of anticipated attack  

Science Conference Proceedings (OSTI)

We present an innovative scheme of blindly extracting message bits when a watermarked image is distorted. In this scheme, we have exploited the capabilities of machine learning (ML) approaches for nonlinearly classifying the embedded bits. The proposed ... Keywords: Artificial neural networks (ANN), Bit correct ratio (BCR), Decoding, Discrete cosine transform (DCT), Support vector machines (SVM), Watermarking

Asifullah Khan; Syed Fahad Tahir; Abdul Majid; Tae-Sun Choi

2008-08-01T23:59:59.000Z

397

The Complexity of Manipulative Attacks in Nearly Single-Peaked Electorates  

E-Print Network (OSTI)

Many electoral bribery, control, and manipulation problems (which we will refer to in general as "manipulative actions" problems) are NP-hard in the general case. It has recently been noted that many of these problems fall into polynomial time if the electorate is single-peaked (i.e., is polarized along some axis/issue). However, real-world electorates are not truly single-peaked. There are usually some mavericks, and so real-world electorates tend to merely be nearly single-peaked. This paper studies the complexity of manipulative-action algorithms for elections over nearly single-peaked electorates, for various notions of nearness and various election systems. We provide instances where even one maverick jumps the manipulative-action complexity up to $\

Faliszewski, Piotr; Hemaspaandra, Lane A

2011-01-01T23:59:59.000Z

398

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may… (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

399

Stockholm Environment Institute (SEI) | Open Energy Information  

Open Energy Info (EERE)

Stockholm Environment Institute (SEI) (Redirected from Stockholm Environment Institute) Jump to: navigation, search Logo: Stockholm Environment Institute Name Stockholm Environment...

400

Pages that link to "Building Life-Cycle Cost (BLCC) Program"...  

Open Energy Info (EERE)

Analysis Toolkit ( links) Financing Initiatives Toolkit ( links) Building Energy Assessment Toolkit ( links) BLCC (redirect page) ( links) Create...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Holocene Magmatic Geothermal Region | Open Energy Information  

Open Energy Info (EERE)

Holocene Magmatic Geothermal Region (Redirected from Holocene Magmatic) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Holocene Magmatic Geothermal Region Details...

402

TIGER -- A technology to improve the delivery capability of nuclear bombs and the survivability of the delivery aircraft  

SciTech Connect

The TIGER (Terminal guided and Extended-Range) Program was initiated in 1972 to study improved delivery capabilities for stockpiled tactical nuclear bombs. The Southeast Asia conflict fostered the development of air-delivered standoff conventional weapons utilizing terminal guidance systems. SNL initiated the TIGER program to determine if current nuclear bombs could be provided with a similarly accurate standoff capabilities. These conventional weapon delivery techniques, while allowing highly accurate attack, generally require entering the target area at high altitude to establish line of sight to the target. In parallel with the TIGER program, system studies analyzed this concept and showed marked improvement in aircraft and weapon survivability with moderate standoff (10--20 km) if low level deliveries (60 m) could be accomplished. As a result of this work, the TIGER program was redirected in early 1974 to demonstrate a standoff bomb with good accuracy (90 m CEP) when delivered from low flying aircraft. This program redirection resulted in the selection of an inertial guidance system to replace the earlier terminal guidance systems. This program was called the Extended-Range Bomb (ERB). In May 1974, a joint Air Force/DOE study identified the desirability of having a single tactical weapon which could be employed against either fixed, preselected targets, or mobile battlefield targets. Studies conducted on the ERB system showed that the inertially guided weapon could fly not only the standoff mission but also a return-to-target mission against the mobile battlefield targets whose locations are not known accurately enough to use a standoff delivery. The ERB program evolved from these initial investigations into an exploratory program to develop the hardware and demonstrate the technology required to fly standoff and return-to-target trajectories. The application of this technology in the form of field retrofit kits to the B61 bomb is called TIGER II.

1980-12-31T23:59:59.000Z

403

An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States  

E-Print Network (OSTI)

Act of 20051 has paved the way to relatively streamlined approvals of proposed LNG receiving terminals-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2 to be potential targets for terrorism. Mitsubishi has proposed the development of an LNG receiving facility

Wang, Hai

404

Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses  

E-Print Network (OSTI)

Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

Marcos Curty; Norbert Lütkenhaus

2004-11-05T23:59:59.000Z

405

Denial-of-Service Attacks on Battery-powered Mobile Computers Thomas Martin, Michael Hsiao, Dong Ha, Jayan Krishnaswami  

E-Print Network (OSTI)

inoperable by draining the battery more quickly than it would be under normal usage. In a typical mobile be applicable if the encryption algorithms and protocols are evaluated for their energy usage Research in low design is typically assumed to be to lower the energy per operation of the device, which is a measure

Ha, Dong S.

406

Decision support for improvisation in response to extreme events: Learning from the response to the 2001 World Trade Center attack  

Science Conference Proceedings (OSTI)

Extreme events such as natural or technological disasters challenge society's capabilities for planning and response. While advanced technologies and modeling techniques continue to expand how society can limit and manage extreme events, flexibility ... Keywords: Emergency response, Extreme events, Improvisation

David Mendonça

2007-04-01T23:59:59.000Z

407

Float Together/ Sink Together? (The Effect of Connectivity on the Power System)”, The Economic Impact of Terrorist Attacks, edited by  

E-Print Network (OSTI)

The recent mantra for reorganizing power systems in the U.S. has been to extend the geographic scope of control centers to span several states, utilities and/or grid operators, initially for the purpose of expanding the range of economic transfers and more recently to improve operational reliability, in both cases through the reduction of “seams ” at the borders of control areas. In the early days of electric deregulation this push for coordination was in the guise of forming four to five Regional Transmission Organizations (RTO), combining existing power pools and Independent System Operators (ISO), that might dispatch power at least-cost over wide regions of the country. The Federal Energy Regulatory Commission (FERC) also proposed a standard market design (SMD) for all control areas so that neighboring entities could exchange power more effectively, but this initiative has fallen victim to massive states ’ rights battles (Whatever happened to the Commerce Clause of the U.S. Constitution?). Following the August 14, 2003 Northeast blackout, similar calls for far greater regional coordination have been based upon the perceived benefits in terms of greater reliability and reduced susceptibility to cascading disturbances across control area borders.

Richard E. Schuler

2006-01-01T23:59:59.000Z

408

Welding and Repair Technology Center: Boric Acid Attack of Concrete and Reinforcing Steel in PWR Fuel Handling Buildings  

Science Conference Proceedings (OSTI)

Spent fuel pool (SFP) leakage is common throughout the U.S. PWR fleet, with some plants experiencing leakage since early in plant life. The U.S. Nuclear Regulatory Commission (NRC) issued Information Notice 2004-05 describing leakage from the SFP at Salem Generating Station that migrated outside the building. The contamination was limited to the vicinity of the fuel handling building (FHB) and was contained and remediated within the confines of the protected area. It did not reach either underground aqui...

2012-05-14T23:59:59.000Z

409

Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures  

Science Conference Proceedings (OSTI)

A key requirement for experimental analysis in the areas of network intrusion and computer forensics is the availability of suitable datasets. However, the inherent security and privacy issues surrounding these disciplines have resulted in a lack of ... Keywords: Computer Forensics, Data Mining, Dataset Generator, Experimental Analysis, Intrusion Detection

Stephen O'Shaughnessy; Geraldine Gray

2011-04-01T23:59:59.000Z

410

Simulation of structural effects in embedded systems and visualization of dependencies according to an intended attack or manipulation  

Science Conference Proceedings (OSTI)

The purpose of this workshop contribution is the interaction between networked embedded systems (such as controllers, sensors and actuators within a motor vehicle) and how these can be simulated. It aims to assess the potential impacts of IT security ...

Sven Kuhlmann; Jana Fruth; Tobias Hoppe; Jana Dittmann

2012-09-01T23:59:59.000Z

411

DOE to Provide Nearly $8 Million to Safeguard the Nation’s Energy Infrastructure from Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

412

IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES  

SciTech Connect

The project started on September 1, 2001. During last 4 months, one post-doctor has been hired for this project. We have received TBC samples (YSZ/CoNiCrAlY/ Inconel 601) from Tohoku University, Japan, while processing of the TBC samples was delayed in GE Corp. Research and Development. The TBC preparation in Japan was based on our technical requirement by plasma spray. Bond coat CoNiCrAlY and the YSZ was produced by low-pressure plasma spray and air plasma spray respectively. The morphology of the surface and the microstructure of cross-section of the sample was observed and analyzed by SEM and EDX. XRD was also used to detect the phases in the YSZ. Currently we are processing the overlay Al{sub 2}O{sub 3} on the TBC samples by EB-PVD and high velocity oxy-fuel (HVOF) spray techniques in collaboration with Penn State University and State University of New York at Stony Brook. We will finish comparing the hot corrosion behavior of the Al{sub 2}O{sub 3}/YSZ/CoNiCrAlY/superalloy system with the YSZ/CoNiCrAlY/superalloy system. The mechanism of hot corrosion will be investigated. The processing-structure-properties relationship of the overlays will be determined.

Scott X. Mao

2002-01-31T23:59:59.000Z

413

U.S. Energy Information Administration (EIA)  

Gasoline and Diesel Fuel Update (EIA)

http:www.eia.govforecastsieopdfwww.brasil.gov.brsobreeconomyenergy-matrixbiofuelbrmodel1 You may have followed a bad external link, or mis-typed a URL. We have...

414

NIST Tech Beat -March 24, 2005  

Science Conference Proceedings (OSTI)

... 20, 2007, to correct for a change in the URL of the referenced Web site. Back to Top of Page. NIST, Utah State Collaborate on Sensor Technology. ...

415

NIOSH Office of Mine Safety & Health Research  

Science Conference Proceedings (OSTI)

NIOSH Office of Mine Safety & Health Research. NVLAP Lab Code: 200716-0. ... Safety & Health URL: http://www.cdc.gov/niosh/homepage.html ...

2013-09-27T23:59:59.000Z

416

Retrospective Evaluation of Appliance Price Trends  

NLE Websites -- All DOE Office Websites (Extended Search)

efficiency standards, appliance energy efficiency, cost-benefit analysis, price forecasts, Techno-Economic Analysis URL https:isswprod.lbl.govlibraryview-docspublic...

417

Idaho National Laboratory - Hydropower Program- Virtual Hydropower...  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Sources Feature Set Source Vintage URL Water Energy Resource Sites (All) Idaho National Laboratory 2004 http:hydropower.inl.govresourceassessment Resource Assessment...

418

USDOE, Office of Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

conversion. 2010 National Laboratory Libraries Coalition Meeting Enhancements & Updates Energy Technology Data Exchange FY10 Enhancements: * ETDEWEB new features include: OpenURL...

419

A New Approach in Supply Chain Design: studies in reverse logistics and nonprofit settings  

E-Print Network (OSTI)

mart teach fema about disaster response? , 2005. URL http://vehicle routing in disaster response problems. The modelfor humanitarian responses to future disasters. McCoy and

Berenguer Falguera, Gemma

2012-01-01T23:59:59.000Z

420

APS User News-at-a-Glance, Issue 54  

NLE Websites -- All DOE Office Websites (Extended Search)

abstract (depending on subscription requirements), hyperlinks, complete URLs, animations and QuickTime clips, and a list of 2008 APS publications. APS Science 2003 through...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Browse wiki | Open Energy Information  

Open Energy Info (EERE)

Browse wiki Jump to: navigation, search Colorado Department of Public Health and Environment Address 4300 Cherry Creek Drive South + Depiction File:Url.jpg + FoafHomepage...

422

Slide12 | OSTI, US Dept of Energy, Office of Scientific and Technical...  

Office of Scientific and Technical Information (OSTI)

Slide12 Slide12 OSTI and Microsoft Research Partnership * Video files collected from DOE's National Laboratories * RSS feeds with metadata and URLs sent to Microsoft Research *...

423

NVLAP Interactive Web Site (NIWS)  

Science Conference Proceedings (OSTI)

Welcome to the NVLAP Interactive Web Site (NIWS). ... The URL for the NVLAP Interactive Web Site (NIWS) is: https://www-s.nist.gov/niwsapp. ...

2012-02-03T23:59:59.000Z

424

Energy Information Directory of the Energy Information Administration  

U.S. Energy Information Administration (EIA)

Washington, DC 20036 (202) 872-5955 Fax: (202) 872-9354 URL: http://www.aham.org/ Supplies information on the energy efficiency of major appliances.

425

Community College Institute of Science and Technology (CCI) Issue No. 77  

E-Print Network (OSTI)

Participant Application Process: Described at: http://science.energy.gov/wdts/cci/ Program Recruitment Website/URL: http://science.energy.gov/wdts/cci/ Untitled Document http

426

Dependable boot and fail safe software for the DTUsat-2  

E-Print Network (OSTI)

Participant Application Process: Described at: http://science.energy.gov/wdts/cci/ Program Recruitment Website/URL: http://science.energy.gov/wdts/cci/ Untitled Document http

427

NERSC Journal Cover Stories  

NLE Websites -- All DOE Office Websites (Extended Search)

Lang, Thorsten M. Bernhardt, Robert N. Barnett, and Uzi Landman | Source: Angewandte Chemie International Edition | Category: Chemistry | URL: http:dx.doi.org10.1002...

428

OOMMF Oxs Extension Modules  

Science Conference Proceedings (OSTI)

... URL: http://www.soton.ac.uk/~fangohr/software/oxs_uniaxial4.html Authors: Jürgen Zimmermann, Richard Boardman, and Hans Fangohr Affiliation ...

2012-01-30T23:59:59.000Z

429

NIST X-Ray Transition Energies Version History  

Science Conference Proceedings (OSTI)

... Jr., P. Indelicato, L. de Billy, E. Lindroth, and J. Anton, "X-ray transition energies: new approach to a ... [Type of medium] Available: URL [Access date]. ...

2010-10-05T23:59:59.000Z

430

NIST Periodic Table: Version History  

Science Conference Proceedings (OSTI)

... [Type of medium] Available: URL [Access date]. ... Version 4 September 2003, The ionization energy value was updated for Po; fourth printing of NIST ...

2013-05-28T23:59:59.000Z

431

NIST Basic Atomic Spectroscopic Data: Version History  

Science Conference Proceedings (OSTI)

... [Type of medium] Available: URL [Access date]. ... for the most persistent lines, energy level values ... few configurations, and ionization energies for the ...

2010-10-05T23:59:59.000Z

432

U.S. Energy Information Administration (EIA)  

Annual Energy Outlook 2012 (EIA)

http:www.eia.govenvironmentemissionsghgreportpdfwww.nrel.govfeatures20080601greenit.html You may have followed a bad external link, or mis-typed a URL. We have...

433

Advanced Vehicle Testing Activity - Plug-in Hybrid Electric Vehicles  

NLE Websites -- All DOE Office Websites (Extended Search)

AVTA Website Search Loading Last Updated: Wednesday, September 25, 2013 Copyright 2013 Idaho National Laboratory SecurityPrivacy DOE Idaho URL: http:avt.inel.govgooglesearch...

434

USTL a Division of National Technical Systems  

Science Conference Proceedings (OSTI)

... Test Laboratory, LLC URL: http://www.nts.com/locations ... Personal Body Armor Testing. ... Resistance of Body Armor, Section 7, Ballistic Test Methods. ...

2013-11-08T23:59:59.000Z

435

A New Computational Paradigm in Multiscale Simulations: Application...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publication Source: SC '11 Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis Type of Publication: conference paper URL...

436

Advanced Vehicle Testing Activity - Data Collection Partners  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Collection Partners Last Updated: Wednesday, September 25, 2013 Copyright 2014 Idaho National Laboratory SecurityPrivacy DOE Idaho URL: http:avt.inel.govpartners...

437

Slide19 | OSTI, US Dept of Energy, Office of Scientific and Technical...  

Office of Scientific and Technical Information (OSTI)

- URL to full text Metadata Obtained When Readily Available - Author - Report number - DOE contract number - Originating research organization - Publication date - Language -...

438

LED's OnTheMap Interactive Tool | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

DOC-1993 Public Access Level public Data Dictionary http:lehd.did.census.govleddatatoolsonthemap.html Data Download URL http:onthemap.ces.census.gov Format xls,...

439

Energy Efficiency Improvement and Cost Saving Opportunities for the U.S. Iron and Steel Industry An ENERGY STAR(R) Guide for Energy and Plant Managers  

E-Print Network (OSTI)

i=2 Wisconsin – Focus on Energy Description: Target Group:Format: Contact: URL: Energy advisors offer free servicesidentify and evaluate energy-saving opportunities, recommend

Worrell, Ernst

2011-01-01T23:59:59.000Z

440

LIONS NATIONAL CASELOAD STATISTICAL DATA | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

stopher.Jeffries@usdoj.gov Unique Identifier DOJ-864 Public Access Level public Data Dictionary http:www.usdoj.govusaoreadingroomdataFAQs.htm Data Download URL http:...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Current Population Survey Voting and Registration Supplement...  

NLE Websites -- All DOE Office Websites (Extended Search)

lisa.a.clement@census.gov Unique Identifier DOC-2172 Public Access Level public Data Dictionary http:www.census.govcpsmethodologytechdocs.html Data Download URL http:...

442

Quarterly Report on Bank Derivatives Activities | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

digital@treasury.gov Unique Identifier TREAS-1193 Public Access Level public Data Dictionary http:www.fdic.gov Data Download URL http:www.occ.govftpderiv...

443

Nonemployer Statistics | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

obert.a.marske@census.gov Unique Identifier DOC-4748 Public Access Level public Data Dictionary http:www.census.goveconnonemployerintro.htm Data Download URL http:...

444

EPA's Energy Portal | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Email young.steve@epa.gov Unique Identifier EPA-9381 Public Access Level public Data Dictionary Data Download URL http:epa.govenergy Format various License Spatial United...

445

Geochemistry of Sediments from the Rock Analysis Storage System...  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Email Unique Identifier DOI-26 Public Access Level public Data Dictionary included in metadata Data Download URL http:tin.er.usgs.govplutosoil...

446

Current Population Survey Fertility Supplement | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

lisa.a.clement@census.gov Unique Identifier DOC-2165 Public Access Level public Data Dictionary http:www.census.govcpsmethodologytechdocs.html Data Download URL http:...

447

DAILY RESEARCH NEWS | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

avermissick@ars.usda.gov Unique Identifier USDA-1141 Public Access Level public Data Dictionary Data Download URL http:ars.usda.govnewsrssrss.htm Format rss License Spatial...

448

U.S. Government recreation sites and facilities | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

JamesRolfes@ios.doi.gov Unique Identifier DOI-1517 Public Access Level public Data Dictionary NA Data Download URL http:ridb.recreation.gov?actiondatasharing Format na...

449

Antitrust Division Sherman Act Violations Yielding a Corporate...  

NLE Websites -- All DOE Office Websites (Extended Search)

Email tung.vu@usdoj.gov Unique Identifier DOJ-2256 Public Access Level public Data Dictionary http:www.justice.govatrpubliccriminalsherman10.html Data Download URL http:...

450

2006 Small Area Health Insurance Estimates (SAHIE) Interactive...  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.sahie@census.gov Unique Identifier DOC-2076 Public Access Level public Data Dictionary NA Data Download URL http:www.census.govdidwwwsahiedatainteractive Format...

451

FEMA Hazard Mitigation Program Summary | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

christopher.shoup@dhs.gov Unique Identifier DHS-1493 Public Access Level public Data Dictionary Data Download URL http:www.fema.govlibraryviewRecord.do?fromSearchfromsearch&id...

452

2007 Small Area Health Insurance Estimates (SAHIE) Interactive...  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.sahie@census.gov Unique Identifier DOC-4104 Public Access Level public Data Dictionary http:www.census.govdidwwwsahiedata2007dataset.html Data Download URL http:...

453

2000 Small Area Health Insurance Estimates (SAHIE) | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.sahie@census.gov Unique Identifier DOC-2070 Public Access Level public Data Dictionary http:www.census.govdidwwwsahiedata2000index.html Data Download URL http:...

454

Farmers Markets Search | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

ard.ragland@ams.usda.gov Unique Identifier USDA-4034 Public Access Level public Data Dictionary Data Download URL http:apps.ams.usda.govfarmersmarkets Format HTML License...

455

IRS Private Letter Rulings and Technical Advice Memoranda | Data...  

NLE Websites -- All DOE Office Websites (Extended Search)

digital@treasury.gov Unique Identifier TREAS-4433 Public Access Level public Data Dictionary http:www.irs.govtaxexemptbondarticle0,,id134365,00.html Data Download URL...

456

2008 Small Area Health Insurance Estimates (SAHIE) Interactive...  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.sahie@census.gov Unique Identifier DOC-7101 Public Access Level public Data Dictionary http:www.census.govdidwwwsahiemethods20082009index.html Data Download URL...

457

FEMA Public Assistance Funded Projects Summary - XLS Format ...  

NLE Websites -- All DOE Office Websites (Extended Search)

christopher.shoup@dhs.gov Unique Identifier DHS-1492 Public Access Level public Data Dictionary Data Download URL http:www.fema.govdatasetsdata.gov.FEMAPublicAssistanceSubGrant...

458

Exports from Manufacturing Establishments | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

obert.a.marske@census.gov Unique Identifier DOC-5571 Public Access Level public Data Dictionary http:www.census.govmanufacturingexportsindex.html Data Download URL http:...

459

Bureau of Engraving and Printing 1980-2010 Annual Production...  

NLE Websites -- All DOE Office Websites (Extended Search)

digital@treasury.gov Unique Identifier TREAS-5144 Public Access Level public Data Dictionary http:www.treasury.govSitePoliciesPagesprivacy.aspx Data Download URL http:...

460

Manufacturing & Trade Inventories & Sales | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

obert.a.marske@census.gov Unique Identifier DOC-4925 Public Access Level public Data Dictionary http:www.census.govmtishowsurveysarecollected.html Data Download URL http:...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Americans with Disabilities Act Briefs | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

jan.majewski@usdoj.gov Unique Identifier DOJ-6360 Public Access Level public Data Dictionary NA Data Download URL http:www.ada.govenforceactivities.htmbriefs Format pdf,...

462

Small Area Income and Poverty Estimates (SAIPE) | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.saipe@census.gov Unique Identifier DOC-2121 Public Access Level public Data Dictionary http:www.census.govdidwwwsaipedataindex.html Data Download URL http:...

463

IRS Actions on Decisions | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

digital@treasury.gov Unique Identifier TREAS-4430 Public Access Level public Data Dictionary http:www.irs.govapppicklistlistactionsOnDecisions.html Data Download URL...

464

IRS Internal Revenue Bulletin | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

digital@treasury.gov Unique Identifier TREAS-4431 Public Access Level public Data Dictionary http:www.irs.govapppicklistlistinternalRevenueBulletins.html Data Download URL...

465

FEMA Public Assistance Funded Projects Detail | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

christopher.shoup@dhs.gov Unique Identifier DHS-2539 Public Access Level public Data Dictionary Data Download URL http:www.fema.govdatasetsdata.gov.FEMAPublicAssistanceFundedPr...

466

Civil Penalty Policies | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Simpson.Moshay@epa.gov Unique Identifier EPA-4146 Public Access Level public Data Dictionary Data Download URL http:cfpub.epa.govcomplianceresourcespoliciescivilpenalty...

467

2006 Law Enforcement Officers Killed and Assaulted | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Email Unique Identifier DOJ-314 Public Access Level public Data Dictionary http:www.fbi.govucrkilled2006aboutleoka.htm Data Download URL http:...

468

2009 Small Area Health Insurance Estimates (SAHIE) Interactive...  

NLE Websites -- All DOE Office Websites (Extended Search)

sehsd.sahie@census.gov Unique Identifier DOC-7131 Public Access Level public Data Dictionary http:www.census.govdidwwwsahiemethods20082009index.html Data Download URL...

469

Current Population Survey Annual Social and Economic Supplement...  

NLE Websites -- All DOE Office Websites (Extended Search)

lisa.a.clement@census.gov Unique Identifier DOC-2162 Public Access Level public Data Dictionary http:www.census.govcpsmethodologytechdocs.html Data Download URL http:...

470

LEHD Origin-Destination Employment Statistics (LODES) | Data...  

NLE Websites -- All DOE Office Websites (Extended Search)

matthew.graham@census.gov Unique Identifier DOC-1992 Public Access Level public Data Dictionary http:lehd.did.census.govleddatatoolsonthemap.html Data Download URL http:...

471

Current Population Survey Food Security Supplement | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

lisa.a.clement@census.gov Unique Identifier DOC-2163 Public Access Level public Data Dictionary http:www.census.govcpsmethodologytechdocs.html Data Download URL http:...

472

Monthly Retail Trade Survey | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

obert.a.marske@census.gov Unique Identifier DOC-4948 Public Access Level public Data Dictionary http:www.census.govretaildefinitions.html Data Download URL http:...

473

Climate Reference Network Daily01 Product | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Michael.Palecki@noaa.gov Unique Identifier DOC-2662 Public Access Level public Data Dictionary ftp:ftp.ncdc.noaa.govpubdatauscrnproductsdaily01README.txt Data Download URL...

474

Publications and Resources | Neutron Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

ORNL facilities by Neutron Science Directorate staff. We strongly encourage SNS and HFIR users to submit citation information, including URLs, for all publications regarding...

475

ORNL Neutron Sciences Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

at other facilties by Neutron Sciences Directorate staff. We strongly encourage SNS and HFIR users to submit citation information, including URLs, for all publications regarding...

476

SSRL in SLAC Today | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

in SLAC Today Subscribe to SSRL in SLAC Today feed URL: https:news.slac.stanford.edutagsprograms-facilitieslightsourcesstanford-synchrotron-radiation-lightsource-ssrl...

477

Mapping applications with collectives over sub-communicators...  

NLE Websites -- All DOE Office Websites (Extended Search)

of Publication Source: SC '12 Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis Type of Publication: conference paper URL...

478

Blue Gene/Q: Sequoia and Mira | Argonne Leadership Computing...  

NLE Websites -- All DOE Office Websites (Extended Search)

Publication Date: April, 2013 Name of Publication Source: Contemporary High Performance Computing From Petascale toward Exascale Type of Publication: book chapter URL of the...

479

Running Grid Jobs at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

146581182211679 You will receive a contact URL that you may use to query the job. Here are some sample queries that you can make: To query job status: %...

480

SPARQL endpoint | OpenEI  

Open Energy Info (EERE)

56796 Varnish cache server SPARQL endpoint Query Query Options Endpoint URL: * Default Graph URI: 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru...

Note: This page contains sample records for the topic "url redirection attacks" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Room Air Conditioners  

NLE Websites -- All DOE Office Websites (Extended Search)

of Superefficient Room Air Conditioners year month keywords appliance energy efficiency energy efficiency incentives Market Transformation standards url https isswprod lbl gov...

482

China's energy and emissions outlook to 2050: Perspectives from...  

NLE Websites -- All DOE Office Websites (Extended Search)

Published 022013 Keywords appliance energy efficiency, Buildings Energy Efficiency, china, Clean Energy Policy, industrial energy efficiency URL https:isswprod.lbl.gov...

483

Integrated Computational Materials Engineering: Digital Resource ...  

Science Conference Proceedings (OSTI)

Literature: Provided as either links or attachments, articles on the application and ongoing ... A pop-up window requesting the URL of your resource will appear.

484

OpenEI - CO2  

Open Energy Info (EERE)

National Energy Technology Laboratory (NETL)
url">

485

Table of contents  

Science Conference Proceedings (OSTI)

... Device/App Usage Application YouTube Related URL https://market.android. com/details?id=com.google.android.youtube Storage Device ...

2012-10-24T23:59:59.000Z

486

Enduse Global Emissions Mitigation Scenarios (EGEMS): A New Generation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Appliance Efficiency, bottom-up, china, emissions scenarios, end use, energy demand, forecasting, greenhouse gas emissions, india, modelling, Multi-Country, refrigerators URL...

487

RSS and Podcast News Feeds | OSTI, US Dept of Energy, Office...  

Office of Scientific and Technical Information (OSTI)

appropriate URL in your feed reader OSTI News Feed OSTI News Feed http:www.osti.govhomesiteswww.osti.gov.homefilesimportednewsfeedsrss-osti.xml OSTI News Feed OSTI Blog...

488

charset "UTF-8"  

Science Conference Proceedings (OSTI)

... facebook { background: url(images/frontpagesprite.png) -176px -35px no-repeat; display: inline-block; width: 24px; height: 24px; }. ...

2013-08-07T23:59:59.000Z

489

Figure 5. PCs and Terminals per Thousand Employees, 1992 and...  

Gasoline and Diesel Fuel Update (EIA)

URL: http:www.eia.govemeuconsumptionconsumption briefsempl9295.htm For help with technical problems, please contact the webmaster: wmaster@eia.doe.gov Phone: (202) 586-8959...

490

Neutron Scattering Conferences  

NLE Websites -- All DOE Office Websites (Extended Search)

8-12, 2013 International Workshop: Powder & Electron Crystallography Location Patras, Greece Contact Partha Pratim Das Email partha@upatras.gr URL http:crystallographypatras.wor...

491

Techniques for Security Risk Analysis of Enterprise Networks  

Science Conference Proceedings (OSTI)

... Attackers launch complex multi-step cyber attacks: Cyber attackers can launch multi-step and multi-host attacks that can incrementally penetrate the ...

2013-01-15T23:59:59.000Z

492

Building  

NLE Websites -- All DOE Office Websites (Extended Search)

Presentation URL: Outline â—Ź Applications Already Available at NERSC â—Ź Available Compilers â—Ź Available Libraries â—Ź Fix the problem Game Presentation URL: Applications Already Available Did you know that NERSC offers precompiled executables for more than 100 applications? Applications Already Available Did you know that NERSC offers precompiled executables for more than 100 applications? Example, Materials Science:

493

Toward Ubiquitous Satisficing Agent Control Thomas Wagner  

E-Print Network (OSTI)

space that is searched during problem solving (or the level of abstraction at which problem solving (100% 0) D (40% 240)(60% 300) Q = Quality C = Cost D = Duration Subtask Relation Enables NLE Method that locates the URL and one that issues the query. The enables NLE between the URL finding method

Massachusetts at Amherst, University of

494

Cold Shock Expression System pCold TF DNA 1TAKARA BIO INC.  

E-Print Network (OSTI)

Cold Shock Expression System pCold TF DNA 1TAKARA BIO INC. v.050630 Cat.# 3365 URL Shock Expression System pCold TF DNA v.050630 Cat.# 3365 URL:http://www.takara-bio.com Elucidation protein yield, purity, and solubility for ex- pressed recombinant proteins using "cold shock" technology

Lebendiker, Mario

495

An Empirical Study of Learning-Based Web Search  

Science Conference Proceedings (OSTI)

Although there are various approaches to facilitate the information search on the Web, most current Web search and query systems only return URLs of relevant pages. Learning-based Web search is invented targeting at processing the URLs to dig out the ...

Aoying Zhou; Xiong Fang; Weining Qian

2002-08-01T23:59:59.000Z

496

Modelling information persistence on the web  

Science Conference Proceedings (OSTI)

Models of web data persistency are essential tools for the designof efficient information extraction systems that repeatedlycollect and process the data. This study models the persistence ofweb data through the measurement of URL and content persistenceacross ... Keywords: content persistence, tomba, url persistence

Daniel Gomes; Mário J. Silva

2006-07-01T23:59:59.000Z

497

Aliasing on the world wide web: prevalence and performance implications  

Science Conference Proceedings (OSTI)

Aliasing occurs in Web transactions when requests containing different URLs elicit replies containing identical data payloads. Conventional caches associate stored data with URLs and can therefore suffer redundant payload transfers due to aliasing and ... Keywords: DTD, HTTP, WWW, Zipf's law, aliasing, cache hierarchies, caching, duplicate suppression, duplicate transfer detection, hypertext transfer protocol, performance analysis, redundant transfers, resource modification, world wide web

Terence Kelly; Jeffrey Mogul

2002-05-01T23:59:59.000Z

498

GUIDE TO KEEPING CURRENT WITH THE LAW MAY 2010 With so many information sources available, it can be difficult to keep track of the most  

E-Print Network (OSTI)

in Subject search. 1. Go to the Advanced tab, select Keyword in Subject from the drop-down menu, enter your search term(s) and click Search. 2. Once you receive your list of catalogue hits, edit the resulting URL URL AND 3. Remove anything that appears after the search term(s) (e.g. intellectual property): o

Shoubridge, Eric

499

Butler Public Power District | Open Energy Information  

Open Energy Info (EERE)

Public Power District (Redirected from Butler County Rural P P D) Jump to: navigation, search Name Butler Public Power District Place Nebraska Utility Id 2643 Utility Location Yes...

500

Fusion Energy Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Fusion Energy Division http:www.ornl.govscinseddivisionfed.shtml Please click link above if you were not already redirected to the page....