WorldWideScience

Sample records for attack aircraft

  1. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  2. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  3. Delayed detached eddy simulations of fighter aircraft at high angle of attack

    Science.gov (United States)

    Xu, Guoliang; Jiang, Xiong; Liu, Gang

    2016-08-01

    The massively separated flows over a realistic aircraft configuration at 40°, 50°, and 60° angles of attack are studied using the delayed detached eddy simulation (DDES). The calculations are carried out at experimental conditions corresponding to a mean aerodynamic chord-based Reynolds number of 8.93× 105 and Mach number of 0.088. The influence of the grid size is investigated using two grids, 20.0× 106 cells and 31.0× 106 cells. At the selected conditions, the lift, drag, and pitching moment from DDES predictions agree with the experimental data better than that from the Reynolds-averaged Navier-Stokes. The effect of angle of attack on the flow structure over the general aircraft is also studied, and it is found that the dominated frequency associated with the vortex shedding process decreases with increasing angle of attack.

  4. Delayed detached eddy simulations of fighter aircraft at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Guoliang Xu; Xiong Jiang; Gang Liu

    2016-01-01

    The massively separated flows over a realistic air-craft configuration at 40◦, 50◦, and 60◦angles of attack are studied using the delayed detached eddy simulation (DDES). The calculations are carried out at experimental conditions corresponding to a mean aerodynamic chord-based Reynolds number of 8.93 × 105 and Mach number of 0.088. The influ-ence of the grid size is investigated using two grids, 20.0×106 cells and 31.0 × 106 cells. At the selected conditions, the lift, drag, and pitching moment from DDES predictions agree with the experimental data better than that from the Reynolds-averaged Navier–Stokes. The effect of angle of attack on the flow structure over the general aircraft is also studied, and it is found that the dominated frequency associated with the vortex shedding process decreases with increasing angle of attack.

  5. A Tail Buffet Loads Prediction Method for Aircraft at High Angles of Attack

    Science.gov (United States)

    Pototzky, Anthony S.; Moses, Robert W.

    2005-01-01

    Aircraft designers commit significant resources to the design of aircraft in meeting performance goals. Despite fulfilling traditional design requirements, many fighter aircraft have encountered buffet loads when demonstrating their high angle-of-attack maneuver capabilities. As a result, during test or initial production phases of fighter development programs, many new designs are impacted, usually in a detrimental way, by resulting in reassessing designs or limiting full mission capability. These troublesome experiences usually stem from overlooking or completely ignoring the effects of buffet during the design phase of aircraft. Perhaps additional requirements are necessary that addresses effects of buffet in achieving best aircraft performance in fulfilling mission goals. This paper describes a reliable, fairly simple, but quite general buffet loads analysis method to use in the initial design phases of fighter-aircraft development. The method is very similar to the random gust load analysis that is now commonly available in a commercial code, which this analysis capability is based, with some key modifications. The paper describes the theory and the implementation of the methodology. The method is demonstrated on a JSF prototype example problem. The demonstration also serves as a validation of the method, since, in the paper, the analysis is shown to nearly match the flight data. In addition, the paper demonstrates how the analysis method can be used to assess candidate design concepts in determining a satisfactory final aircraft configuration.

  6. Lattice Boltzmann Method used for the aircraft characteristics computation at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Traditional Finite Volume Method(FVM)and Lattice Boltzmann Method(LBM)are both used to compute the high angle attack aerodynamic characteristics of the benchmark aircraft model named CT-1.Even though the software requires flow on the order of Ma<0.4,simulation at Ma=0.5 is run in PowerFLOW after theoretical analysis.The consistency with the wind tunnel testing is satisfied,especially for the LBM which can produce perfect results at high angle attack.PowerFLOW can accurately capture the detail of flows because it is inherently time-dependent and parallel and suits large-scale computation very well.

  7. A design study of a reaction control system for a V/STOL fighter/attack aircraft

    Science.gov (United States)

    Beard, B. B.; Foley, W. H.

    1983-01-01

    Attention is given to a short takeoff vertical landing (STOVL) aircraft reaction control system (RCS) design study. The STOVL fighter/attack aircraft employs an existing turbofan engine, and its hover requirement places a premium on weight reduction, which eliminates prospective nonairbreathing RCSs. A simple engine compressor bleed RCS degrades overall performance to an unacceptable degree, and the supersonic requirement precludes the large volume alternatives of thermal or ejector thrust augmentation systems as well as the ducting of engine exhaust gases and the use of a dedicated turbojet. The only system which addressed performance criteria without requiring major engine modifications was a dedicated load compressor driven by an auxilliary power unit.

  8. Bifurcation analysis and stability design for aircraft longitudinal motion with high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Xin Qi; Shi Zhongke

    2015-01-01

    Bifurcation analysis and stability design for aircraft longitudinal motion are investigated when the nonlinearity in flight dynamics takes place severely at high angle of attack regime. To pre-dict the special nonlinear flight phenomena, bifurcation theory and continuation method are employed to systematically analyze the nonlinear motions. With the refinement of the flight dynam-ics for F-8 Crusader longitudinal motion, a framework is derived to identify the stationary bifurca-tion and dynamic bifurcation for high-dimensional system. Case study shows that the F-8 longitudinal motion undergoes saddle node bifurcation, Hopf bifurcation, Zero-Hopf bifurcation and branch point bifurcation under certain conditions. Moreover, the Hopf bifurcation renders ser-ies of multiple frequency pitch oscillation phenomena, which deteriorate the flight control stability severely. To relieve the adverse effects of these phenomena, a stabilization control based on gain scheduling and polynomial fitting for F-8 longitudinal motion is presented to enlarge the flight envelope. Simulation results validate the effectiveness of the proposed scheme.

  9. Survey of needs and capabilities for wind tunnel testing of dynamic stability of aircraft at high angles of attack

    Science.gov (United States)

    Orlik-Ruckemann, K. J.

    1973-01-01

    A survey was conducted relative to future requirements for dynamic stability information for such aerospace vehicles as the space shuttle and advanced high performance military aircraft. High-angle-of-attack and high-Reynolds number conditions were emphasized. A review was made of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives, revealing an almost total lack of capabilities that could satisfy these requirements. Recommendations are made regarding equipment that should be constructed to remedy this situation. A description is given of some of the more advanced existing capabilities, which can be used to at least partly satisfy immediate demands.

  10. Studies of aircraft differential maneuvering. Report 75-27: Calculating of differential-turning barrier surfaces. Report 75-26: A user's guide to the aircraft energy-turn and tandem-motion computer programs. Report 75-7: A user's guide to the aircraft energy-turn hodograph program. [numerical analysis of tactics and aircraft maneuvers of supersonic attack aircraft

    Science.gov (United States)

    Kelley, H. J.; Lefton, L.

    1976-01-01

    The numerical analysis of composite differential-turn trajectory pairs was studied for 'fast-evader' and 'neutral-evader' attitude dynamics idealization for attack aircraft. Transversality and generalized corner conditions are examined and the joining of trajectory segments discussed. A criterion is given for the screening of 'tandem-motion' trajectory segments. Main focus is upon the computation of barrier surfaces. Fortunately, from a computational viewpoint, the trajectory pairs defining these surfaces need not be calculated completely, the final subarc of multiple-subarc pairs not being required. Some calculations for pairs of example aircraft are presented. A computer program used to perform the calculations is included.

  11. Aircraft

    Science.gov (United States)

    Hibbs, Bart D.; Lissaman, Peter B. S.; Morgan, Walter R.; Radkey, Robert L.

    1998-01-01

    This disclosure provides a solar rechargeable aircraft that is inexpensive to produce, is steerable, and can remain airborne almost indefinitely. The preferred aircraft is a span-loaded flying wing, having no fuselage or rudder. Travelling at relatively slow speeds, and having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing's top surface, the aircraft uses only differential thrust of its eight propellers to turn. Each of five sections of the wing has one or more engines and photovoltaic arrays, and produces its own lift independent of the other sections, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface. The aircraft is capable of a top speed of about ninety miles per hour, which enables the aircraft to attain and can continuously maintain altitudes of up to sixty-five thousand feet. Regenerative fuel cells in the wing store excess electricity for use at night, such that the aircraft can sustain its elevation indefinitely. A main spar of the wing doubles as a pressure vessel that houses hydrogen and oxygen gasses for use in the regenerative fuel cell. The aircraft has a wide variety of applications, which include weather monitoring and atmospheric testing, communications, surveillance, and other applications as well.

  12. 1.5 μm lidar anemometer for true air speed, angle of sideslip, and angle of attack measurements on-board Piaggio P180 aircraft

    Science.gov (United States)

    Augere, B.; Besson, B.; Fleury, D.; Goular, D.; Planchat, C.; Valla, M.

    2016-05-01

    Lidar (light detection and ranging) is a well-established measurement method for the prediction of atmospheric motions through velocity measurements. Recent advances in 1.5 μm Lidars show that the technology is mature, offers great ease of use, and is reliable and compact. A 1.5 μm airborne Lidar appears to be a good candidate for airborne in-flight measurement systems. It allows measurements remotely, outside aircraft aerodynamic disturbance, and absolute air speed (no need for calibration) with great precision in all aircraft flight domains. In the framework of the EU AIM2 project, the ONERA task has consisted of developing and testing a 1.5 μm anemometer sensor for in-flight airspeed measurements. The objective of this work is to demonstrate that the 1.5 μm Lidar sensor can increase the quality of the data acquisition procedure for aircraft flight test certification. This article presents the 1.5 μm anemometer sensor dedicated to in-flight airspeed measurements and describes the flight tests performed successfully on-board the Piaggio P180 aircraft. Lidar air data have been graphically compared to the air data provided by the aircraft flight test instrumentation (FTI) in the reference frame of the Lidar sensor head. Very good agreement of true air speed (TAS) by a fraction of ms‑1, angle of sideslip (AOS), and angle of attack (AOA) by a fraction of degree were observed.

  13. 1.5 μm lidar anemometer for true air speed, angle of sideslip, and angle of attack measurements on-board Piaggio P180 aircraft

    International Nuclear Information System (INIS)

    Lidar (light detection and ranging) is a well-established measurement method for the prediction of atmospheric motions through velocity measurements. Recent advances in 1.5 μm Lidars show that the technology is mature, offers great ease of use, and is reliable and compact. A 1.5 μm airborne Lidar appears to be a good candidate for airborne in-flight measurement systems. It allows measurements remotely, outside aircraft aerodynamic disturbance, and absolute air speed (no need for calibration) with great precision in all aircraft flight domains. In the framework of the EU AIM2 project, the ONERA task has consisted of developing and testing a 1.5 μm anemometer sensor for in-flight airspeed measurements. The objective of this work is to demonstrate that the 1.5 μm Lidar sensor can increase the quality of the data acquisition procedure for aircraft flight test certification. This article presents the 1.5 μm anemometer sensor dedicated to in-flight airspeed measurements and describes the flight tests performed successfully on-board the Piaggio P180 aircraft. Lidar air data have been graphically compared to the air data provided by the aircraft flight test instrumentation (FTI) in the reference frame of the Lidar sensor head. Very good agreement of true air speed (TAS) by a fraction of ms−1, angle of sideslip (AOS), and angle of attack (AOA) by a fraction of degree were observed. (special issue article)

  14. Rezultati modeliranja borbenog manevra napada aviona na zemaljski cilj iz oštrog obrušavanja / The results of combat attack maneuver modelling on ground target using aircraft steep diving

    Directory of Open Access Journals (Sweden)

    Nikola Pekić

    2005-11-01

    Full Text Available U ovom radu prikazani su rezultati matematičkog modeliranja kretanja aviona u borbenom manevru pri napadu na zemaljski cilj iz oštrog obrušavanja. Kretanje aviona razmatrano je kao kretanje materijalne tačke u prostoru. Takođe, prikazane su prednosti aviona sa otklonom vektora potiska i njegove primene u manevru u odnosu na avion sa klasičnom pogonskom grupom i klasičnim aerodinamičkim upravljačkim površinama. / This paper presents the results of mathematical modeling of aircraft movement in combat maneuver during attack on ground target using steep diving. Aircraft movement is considered as movement of a material point in space. Also, the advantages of aircraft with thrust vector deflection and its applications during maneuver when compared to the aircraft with classical engines and classical aerodynamic controls.

  15. 未来美军航母战斗群空袭作战特点探析%Characteristics of Air Attack of American Aircraft Carrier Battle Group in the Future

    Institute of Scientific and Technical Information of China (English)

    高武; 杨士锋; 韩玉龙; 林云

    2016-01-01

    随着美军“福特”号核动力航空母舰的下水和舰载武器装备的更新换代,未来美军利用航母平台发动空袭作战将趋向隐身化、智能化、精确化、无人化,任务区分精细,作战方式灵活,作战手段多样。论文结合美军空袭作战理论和武器装备的发展,重点从作战原则、作战指挥、力量构成、空袭方式等方面分析未来美军航母战斗群空袭作战特点,指出其存在的薄弱环节,为防空力量建设和作战提供理论参考。%With the service of “Ford” aircraft carrier and update of shipborne weapone ,American navy would use the Ford aircraft carrier for air attack in the future .It will be more aptitudinal ,accurate and perdue ,and the attack will be a self‐service .In the attack ,task for each part will be more particularly ,the mode of battle will be more flexible ,and the American navy will use kinds of means in the battle .This article considers both the air attack theory of American air force and the de‐velopment of weapon ,emphasizes particularly on combat principle ,combat cmmand ,army system and mode of air attack , analyses the characteristic of air attack form aircraft carrier system in the future ,points out the disadvantage of aircraft carri‐er ,and gives advice about how to develop our aerial defence and how to fight against the air attack of aircraft carrier system .

  16. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  18. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  19. 基于改进AHP的多机协同多目标攻击威胁评估算法分析%Threat Assessment Algorithm on Multi-aircraft Cooperative and Multi-target Attack

    Institute of Scientific and Technical Information of China (English)

    雷蕾

    2016-01-01

    现代空战需要先进的火控计算,目标威胁评估是其重要的组成部分。文章通过建立威胁评估体系模型,再提出威胁因子及权值计算方法,从而构建了一套完整的目标威胁评估算法。最后针对一个多机协同多目标攻击态势,利用建立的算法进行威胁矩阵的计算,计算结果表明该方法是有效可行的。%Modern air combat needs advanced ifre control calculation, and the target threat assessment is an important part of the ifre control system. Through the establishment of threat assessment system model, and then put forward the threat factor and weight calculation method. Thus,construct a complete target threat assessment algorithm. Finally, according to the situation of multi Aircraft Cooperative multi target attack, the method is used to calculate the threat matrix. The results show that the proposed method is effective and feasible.

  20. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  1. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  2. [Panic attack].

    Science.gov (United States)

    Scantamburlo, G; Ansseau, M

    2004-05-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. PMID:15264579

  3. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  4. Mars attacks.

    Science.gov (United States)

    Cohain, Judy Slome

    2008-01-01

    "Mars Attacks" is a new term coined to describe unjustified violation of women by care providers at the time of birth, as well as the purposeful abandonment of the peer review system by major obstetric journals and the abandonment of the use of research evidence by ACOG in their latest protocols, in order to justify continued use of this form of violence against women. PMID:19244777

  5. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  6. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  8. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  9. Amphibious Aircraft

    Data.gov (United States)

    National Aeronautics and Space Administration — A brief self composed research article on Amphibious Aircrafts discussing their use, origin and modern day applications along with their advantages and...

  10. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  12. Aircraft Noise

    Science.gov (United States)

    Michel, Ulf; Dobrzynski, Werner; Splettstoesser, Wolf; Delfs, Jan; Isermann, Ullrich; Obermeier, Frank

    Aircraft industry is exposed to increasing public pressure aiming at a continuing reduction of aircraft noise levels. This is necessary to both compensate for the detrimental effect on noise of the expected increase in air traffic and improve the quality of living in residential areas around airports.

  13. Aircraft Design

    Science.gov (United States)

    Bowers, Albion H. (Inventor); Uden, Edward (Inventor)

    2016-01-01

    The present invention is an aircraft wing design that creates a bell shaped span load, which results in a negative induced drag (induced thrust) on the outer portion of the wing; such a design obviates the need for rudder control of an aircraft.

  14. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  15. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  16. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  17. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  18. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  19. A NASA study of the impact of technology on future multimission aircraft

    Science.gov (United States)

    Samuels, Jeffrey J.

    1992-01-01

    A conceptual aircraft design study was recently completed which compared three supersonic multimission tactical aircraft. The aircraft were evaluated in two technology timeframes and were sized with consistent methods and technology assumptions so that the aircraft could be compared in operational utility or cost analysis trends. The three aircraft are a carrier-based Fighter/Attack aircraft, a land-based Multirole Fighter, and a Short Takeoff/Vertical Landing (STOVL) aircraft. This paper describes the design study ground rules used and the aircraft designed. The aircraft descriptions include weights, dimensions and layout, design mission and maneuver performance, and fallout mission performance. The effect of changing technology and mission requirements on the STOVL aircraft and the impact of aircraft navalization are discussed. Also discussed are the effects on the STOVL aircraft of both Thrust/Weight required in hover and design mission radius.

  20. Building Computer Network Attacks

    CERN Document Server

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  1. Building Computer Network Attacks

    OpenAIRE

    Futoransky, Ariel; Notarfrancesco, Luciano; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities o...

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  4. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  5. Research on Unmanned Aircraft Controlled and Autonomous Attack System Based on Fuzzy Control Theory%基于模糊控制的UAV操控引导自主攻击系统

    Institute of Scientific and Technical Information of China (English)

    张艳霞; 张安; 王强

    2015-01-01

    针对无人机操控引导自主攻击系统,采用模糊控制原理,实现将任务系统解算出的瞄准偏差转化为控制无人机飞行的三通道控制指令。采用Vega Prime和VS 2005对整个攻击过程进行三维视景仿真,应用蒙特卡洛法对多次仿真结果进行处理,得到火控攻击精度。最后对影响攻击精度的两个误差源进行分析,定量地给出了各误差源对攻击精度的影响。仿真结果表明,该系统满足设计要求。%A new system using Fuzzy Control Algorithm is designed with regard to UAV controlled and autonomous attack system,which can converts the aiming deviation calculated by mission system to overloads of three channels which is the UAV flight control commands. The whole bombing process is simulated by Vega Prime and Visual 2005 with three-dimensional. Then bombing error is obtained by dealing with several simulation results through Monte Carlo method. At last,the error sources which influence the bombing precision are analyzed,and the error source influences are obtained quantificationally. Simulation results show that the system meet the design requirements.

  6. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik;

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicl...

  7. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  8. Aerodynamic characteristics of general aviation at high angle of attack with the propeller slipstream

    Science.gov (United States)

    Matsuo, N.; Hirano, S.

    1986-01-01

    The aerodynamic characteristics of the FA-300 business aircraft at high angle of attack with the propeller stream are described. The FA-300 offers two types, FA-300-700 for 340 HP, and -710 for 450 Hp of the engine. The effects of the propeller slipstream on the high angle of the attack are discussed.

  9. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  10. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  11. Aircraft cybernetics

    Science.gov (United States)

    1977-01-01

    The use of computers for aircraft control, flight simulation, and inertial navigation is explored. The man-machine relation problem in aviation is addressed. Simple and self-adapting autopilots are described and the assets and liabilities of digital navigation techniques are assessed.

  12. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  13. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  16. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  17. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  18. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  19. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  20. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  1. APPLICATION FOR AIRCRAFT TRACKING

    OpenAIRE

    Ostroumov, Ivan; Kuz’menko, Natalia

    2011-01-01

    Abstract. In the article the important problems of software development for aircraft tracking have beendiscussed. Position reports of ACARS have been used for aircraft tracking around the world.An algorithm of aircraft coordinates decoding and visualization of aircraft position on the map has beenrepresented.Keywords: ACARS, aircraft, internet, position, software, tracking.

  2. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  3. Sensor Technology and Futuristic Of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    Emmanuel Rugambage Ndayishimiye

    2016-08-01

    Full Text Available The Next Generation fighter Aircraft seeks a fighter with higher abilities in areas such as reach, persistence, survivability, net-centricity, situation awareness, human system integration and weapons effects. The future system will have to counter foe armed with next generation advanced electronic attack, sophisticated integrated air defense systems, directed energy weapons, passive detection, integrated self-protection and cyber-attack capabilities. It must be capable to operate in the anti-access area-denial (A2/AD environment that will exist in the next coming years.

  4. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  5. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  6. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  7. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  8. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  9. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  10. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  11. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  12. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  13. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  14. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  15. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. Propulsion controlled aircraft computer

    Science.gov (United States)

    Cogan, Bruce R. (Inventor)

    2010-01-01

    A low-cost, easily retrofit Propulsion Controlled Aircraft (PCA) system for use on a wide range of commercial and military aircraft consists of an propulsion controlled aircraft computer that reads in aircraft data including aircraft state, pilot commands and other related data, calculates aircraft throttle position for a given maneuver commanded by the pilot, and then displays both current and calculated throttle position on a cockpit display to show the pilot where to move throttles to achieve the commanded maneuver, or is automatically sent digitally to command the engines directly.

  18. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  19. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  20. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  1. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  2. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  3. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  4. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  5. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  6. Design of a Three Surfaces R/C Aircraft Model

    Directory of Open Access Journals (Sweden)

    D. P. Coiro

    2002-01-01

    Full Text Available Design of a three lifting surfaces radio-controlled model has been carried out at Dipartimento di Progettazione Aeronautica (DPA by the authors in the last year. The model is intended to be a UAV prototype and is now under construction. The main goal of this small aircraft's design is to check the influence of the canard surface on the aircraft's aerodynamic characteristics and flight behavior, especially at high angles of attack. The aircraft model is also intended to be a flying platform to test sensors, measurement and acquisition systems for research purposes and a valid and low-cost teaching instrument for flight dynamics and flight maneuvering. The aircraft has been designed to fly with and without canard, and all problems relative to aircraft balance and stability have been carefully analyzed and solved. The innovative configuration and the mixed wooden-composite material structure has been obtained with very simple shapes and all the design is focused on realizing a low-cost model. A complete aerodynamic analysis of the configuration up to high angles of attack and a preliminary aircraft stability and performance prediction will be presented.

  7. Intelligent control of agile aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Mohler, R.R.; Zakrzewski, R.R. [Dept. of Electrical and Computer Engineering, Corvallis, OR (United States)

    1994-12-31

    A brief overview of adaptive and computer-aided flight control is presented as background for the evolution of recent research on nonlinear intelligent control. Here, several nonlinear control algorithms are investigated but emphasis is given to nearly time-optimal, neural-net generated feedback control which is trained on ideal minimum-time, open-loop trajectories. The minimum-time policies are computed by a new version of the switching-line-variational method (gradient algorithm). Critical control constraints and a benchmark for performance as well as a basis for training are obtained for the system design. This further demonstrates the need for an integrated controls and aircraft system design for full utilization of nonlinear control capability. Complex nonlinear simulations show the effectiveness of the derived nonlinear feedback controller for the high-angle-of-attack research vehicle (HARV) with stabilator and thrust-vector control. For example, angle of attack is controlled from near zero to sixty degrees in about two seconds with appropriate trim conditions at both ends. Such control greatly enhances maneuverability and general flight envelope admissibility.

  8. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  9. A NASA study of the impact of technology on future carrier based tactical aircraft - Overview

    Science.gov (United States)

    Wilson, S. B., III

    1992-01-01

    This paper examines the impact of technology on future carrier based tactical aircraft. The results were used in the Center for Naval Analysis Future Carrier Study. The NASA Team designed three classes of aircraft ('Fighter', 'Attack', and 'Multimission') with two different technology levels. The Multimission aircraft were further analyzed by examining the penalty on the aircraft for both catapult launch/arrested landing recovery (Cat/trap) and short take-off/vertical landing (STOVL). The study showed the so-called STOVL penalty was reduced by engine technology and the next generation Strike Fighter will pay more penalty for Cat/trap than for STOVL capability.

  10. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  11. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  12. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  13. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  14. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  15. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  17. Sertraline-induced panic attack.

    Science.gov (United States)

    González-Berríos, Nereida

    2009-01-01

    Selective Serotonin Reuptake Inhibitors are the treatment of choice for depression and anxiety disorders due to its tolerability, safety and side effects profile. However, with the current and frequent use of these medications in patients with these disorders, new side effects have been reported. This case report describes the development of panic attacks in a 24-year-old-female patient with depressive and anxiety symptoms, and no previous predisposing history for panic attacks. PMID:19954091

  18. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  19. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  20. Designing A Conventional Aircraft

    OpenAIRE

    Sonei, Arash

    2014-01-01

    This paper is explaining the important design phases of dimensioning an unmanned conventional aircraft from scratch and will also design one according to a few chosen requirements. The design phases discussed will be all from wing dimensioning to stability and spin recovery, aircraft performance requirements and how to select a motor which overcomes these. As well as the optimal rate of climb for improved efficiency is discussed. In the end an aircraft which manages the set requirements and i...

  1. Lightning effects on aircraft

    Science.gov (United States)

    1977-01-01

    Direct and indirect effects of lightning on aircraft were examined in relation to aircraft design. Specific trends in design leading to more frequent lightning strikes were individually investigated. These trends included the increasing use of miniaturized, solid state components in aircraft electronics and electric power systems. A second trend studied was the increasing use of reinforced plastics and other nonconducting materials in place of aluminum skins, a practice that reduces the electromagnetic shielding furnished by a conductive skin.

  2. Micro-cantilever flow sensor for small aircraft

    KAUST Repository

    Ghommem, Mehdi

    2013-10-01

    We extend the use of cantilever beams as flow sensors for small aircraft. As such, we propose a novel method to measure the airspeed and the angle of attack at which the air travels across a small flying vehicle. We measure beam deflections and extract information about the surrounding flow. Thus, we couple a nonlinear beam model with a potential flow simulator through a fluid-structure interaction scheme. We use this numerical approach to generate calibration curves that exhibit the trend for the variations of the limit cycle oscillations amplitudes of flexural and torsional vibrations with the air speed and the angle of attack, respectively. © The Author(s) 2013.

  3. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  4. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  5. Cable Tensiometer for Aircraft

    Science.gov (United States)

    Nunnelee, Mark (Inventor)

    2008-01-01

    The invention is a cable tensiometer that can be used on aircraft for real-time, in-flight cable tension measurements. The invention can be used on any aircraft cables with high precision. The invention is extremely light-weight, hangs on the cable being tested and uses a dual bending beam design with a high mill-volt output to determine tension.

  6. Aircraft operations management manual

    Science.gov (United States)

    1992-01-01

    The NASA aircraft operations program is a multifaceted, highly diverse entity that directly supports the agency mission in aeronautical research and development, space science and applications, space flight, astronaut readiness training, and related activities through research and development, program support, and mission management aircraft operations flights. Users of the program are interagency, inter-government, international, and the business community. This manual provides guidelines to establish policy for the management of NASA aircraft resources, aircraft operations, and related matters. This policy is an integral part of and must be followed when establishing field installation policy and procedures covering the management of NASA aircraft operations. Each operating location will develop appropriate local procedures that conform with the requirements of this handbook. This manual should be used in conjunction with other governing instructions, handbooks, and manuals.

  7. A comparison of flight input techniques for parameter estimation of highly-augmented aircraft

    OpenAIRE

    Gates, Russell J.

    1995-01-01

    Parameter estimation is an inverse process in which stability derivatives are determined from time history flight data by matching the aircraft mathematical model's computed response with the measured response of the aircraft. Accurate parameter estimation depends mainly on instrumentation and input technique. Input technique is the focus of this thesis in which both classical inputs and optimal inputs were applied under the same flight conditions to the High Angle of Attack Research Vehicle ...

  8. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  9. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    reflected in the journalistic practices. The described norms form a coherent pattern if safeguarding the existing democracy and the general public is considered to be the main purpose. A coverage based on this pattern of norms can be compared to other forms of crisis management following attacks because...

  10. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  11. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  12. [Polygraphy of a panic attack].

    Science.gov (United States)

    Noffke, H U; Roser, M

    2001-09-01

    We studied a 24-year old female patient with Type 1 diabetes mellitus suffering for 4 weeks from a major depressive episode combined with panic disorder without agoraphobia. A spontaneous panic attack was serendipitously recorded by polygraph while the subject was at rest. Electrocardiogram, finger blood-flow, respiratory rhythm and muscle tone (forearm, forehead) were recorded. A triphasic course consisting of a "dynamic phase" (appr. 80 s) preceded by a discrete "initial phase" (appr. 140 s) and a "declining phase" (appr. 180 s) was observed. The dynamic phase is characterized by an acute increase of fingertip vasoconstriction and heart rate. The patient was not aware of the panic attack before the dynamic phase. The recognisable central regulation confirms previously published findings indicating a sympathetic-norepinephrine activation at the beginning of the panic attack without activating the musculoskeletal system. Furthermore, a paradoxical phenomenon involving heart and respiratory rate was observed before the onset of anxiety, i.e. an increase of the heart rate and a simultaneous decline of the respiratory rate, suggesting a non-antagonistic regulation of the ergotropic-trophotropic system. The autonomic state of the patient points to a lability in homeostasis from which panic attacks as a form of CNS response could develop. PMID:11572106

  13. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  14. SOLAR AIRCRAFT DESIGN

    OpenAIRE

    RAHMATI, Sadegh; GHASED, Amir

    2015-01-01

    Abstract. Generally domain Aircraft uses conventional fuel. These fuel having limited life, high cost and pollutant. Also nowadays price of petrol and other fuels are going to be higher, because of scarcity of those fuels. So there is great demand of use of non-exhaustible unlimited source of energy like solar energy. Solar aircraft is one of the ways to utilize solar energy. Solar aircraft uses solar panel to collect the solar radiation for immediate use but it also store the remaining part ...

  15. LG-ANALYST: linguistic geometry for master air attack planning

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg

    2003-09-01

    We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.

  16. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  17. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  18. Application of nonlinear feedback control theory to supermaneuverable aircraft

    Science.gov (United States)

    Garrard, William L.; Enns, Dale F.

    1991-01-01

    Controlled flight at extremely high angles of attack, far exceeding the stall angle, and/or at high angular rates is sometimes referred to as supermaneuvering flight. The objective was to examine methods for design of control laws for aircraft performing supermaneuvers. Since the equations which govern the motion of aircraft during supermaneuvers are nonlinear, this study concentrated on nonlinear control law design procedures. The two nonlinear techniques considered were Nonlinear Quadratic Regulator (NLQR) theory and nonlinear dynamic inversion. A conventional gain scheduled proportional plus integral (P + I) controller was also developed to serve as a baseline design typical of current control laws used in aircraft. A mathematical model of a generic supermaneuverable aircraft was developed from data obtained from the literature. A detailed computer simulation of the aircraft was also developed. This simulation allowed the flying of proposed supermaneuvers and was used to evaluate the performance of the control law designs and to generate linearized models of the aircraft at different flight conditions.

  19. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  20. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  1. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems. The facility allows for the simulation of a...

  2. Solar thermal aircraft

    Science.gov (United States)

    Bennett, Charles L.

    2007-09-18

    A solar thermal powered aircraft powered by heat energy from the sun. A heat engine, such as a Stirling engine, is carried by the aircraft body for producing power for a propulsion mechanism, such as a propeller. The heat engine has a thermal battery in thermal contact with it so that heat is supplied from the thermal battery. A solar concentrator, such as reflective parabolic trough, is movably connected to an optically transparent section of the aircraft body for receiving and concentrating solar energy from within the aircraft. Concentrated solar energy is collected by a heat collection and transport conduit, and heat transported to the thermal battery. A solar tracker includes a heliostat for determining optimal alignment with the sun, and a drive motor actuating the solar concentrator into optimal alignment with the sun based on a determination by the heliostat.

  3. Depreciation of aircraft

    Science.gov (United States)

    Warner, Edward P

    1922-01-01

    There is a widespread, and quite erroneous, impression to the effect that aircraft are essentially fragile and deteriorate with great rapidity when in service, so that the depreciation charges to be allowed on commercial or private operation are necessarily high.

  4. Aircraft electromagnetic compatibility

    Science.gov (United States)

    Clarke, Clifton A.; Larsen, William E.

    1987-01-01

    Illustrated are aircraft architecture, electromagnetic interference environments, electromagnetic compatibility protection techniques, program specifications, tasks, and verification and validation procedures. The environment of 400 Hz power, electrical transients, and radio frequency fields are portrayed and related to thresholds of avionics electronics. Five layers of protection for avionics are defined. Recognition is given to some present day electromagnetic compatibility weaknesses and issues which serve to reemphasize the importance of EMC verification of equipment and parts, and their ultimate EMC validation on the aircraft. Proven standards of grounding, bonding, shielding, wiring, and packaging are laid out to help provide a foundation for a comprehensive approach to successful future aircraft design and an understanding of cost effective EMC in an aircraft setting.

  5. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  6. Aircraft Data Acquisition

    Directory of Open Access Journals (Sweden)

    Elena BALMUS

    2016-03-01

    Full Text Available The introduction of digital systems instead of analog ones has created a major separation in the aviation technology. Although the digital equipment made possible that the increasingly faster controllers take over, we should say that the real world remains essentially analogue [4]. Fly-by-wire designers attempting to control and measure the real feedback of an aircraft were forced to find a way to connect the analogue environment to their digital equipment. In order to manage the implications of this division in aviation, data optimization and comparison has been quite an important task. The interest in using data acquisition boards is being driven by the technology and design standards in the new generation of aircraft and the ongoing efforts of reducing weight and, in some cases addressing the safety risks. This paper presents a sum of technical report data from post processing and diversification of data acquisition from Arinc 429 interface on a research aircraft platform. Arinc 429 is by far the most common data bus in use on civil transport aircraft, regional jets and executive business jets today. Since its introduction on the Boeing 757/767 and Airbus aircraft in the early 1980s hardly any aircraft has been produced without the use of this data bus. It was used widely by the air transport indu

  7. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  8. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  9. Fat May Not Hike Heart Attack Risk

    Science.gov (United States)

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  10. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  11. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  12. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  13. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  14. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  15. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  16. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  17. Review Article: Influenza Transmission on Aircraft

    Science.gov (United States)

    Adlhoch, Cornelia

    2016-01-01

    Background: Air travel is associated with the spread of influenza through infected passengers and potentially through in-flight transmission. Contact tracing after exposure to influenza is not performed systematically. We performed a systematic literature review to evaluate the evidence for influenza transmission aboard aircraft. Methods: Using PubMed and EMBASE databases, we identified and critically appraised identified records to assess the evidence of such transmission to passengers seated in close proximity to the index cases. We also developed a bias assessment tool to evaluate the quality of evidence provided in the retrieved studies. Results: We identified 14 peer-reviewed publications describing contact tracing of passengers after possible exposure to influenza virus aboard an aircraft. Contact tracing during the initial phase of the influenza A(H1N1)pdm09 pandemic was described in 11 publications. The studies describe the follow-up of 2,165 (51%) of 4,252 traceable passengers. Altogether, 163 secondary cases were identified resulting in an overall secondary attack rate among traced passengers of 7.5%. Of these secondary cases, 68 (42%) were seated within two rows of the index case. Conclusion: We found an overall moderate quality of evidence for transmission of influenza virus aboard an aircraft. The major limiting factor was the comparability of the studies. A majority of secondary cases was identified at a greater distance than two rows from the index case. A standardized approach for initiating, conducting, and reporting contact tracing could help to increase the evidence base for better assessing influenza transmission aboard aircraft. PMID:27253070

  18. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  19. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  20. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  1. Buffet induced structural/flight-control system interaction of the X-29A aircraft

    Science.gov (United States)

    Voracek, David F.; Clarke, Robert

    1991-01-01

    High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.

  2. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  3. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  4. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  7. IDENTIFICATION OF AIRCRAFT HAZARDS

    International Nuclear Information System (INIS)

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7)

  8. Aircraft Operations Classification System

    Science.gov (United States)

    Harlow, Charles; Zhu, Weihong

    2001-01-01

    Accurate data is important in the aviation planning process. In this project we consider systems for measuring aircraft activity at airports. This would include determining the type of aircraft such as jet, helicopter, single engine, and multiengine propeller. Some of the issues involved in deploying technologies for monitoring aircraft operations are cost, reliability, and accuracy. In addition, the system must be field portable and acceptable at airports. A comparison of technologies was conducted and it was decided that an aircraft monitoring system should be based upon acoustic technology. A multimedia relational database was established for the study. The information contained in the database consists of airport information, runway information, acoustic records, photographic records, a description of the event (takeoff, landing), aircraft type, and environmental information. We extracted features from the time signal and the frequency content of the signal. A multi-layer feed-forward neural network was chosen as the classifier. Training and testing results were obtained. We were able to obtain classification results of over 90 percent for training and testing for takeoff events.

  9. Identification of Aircraft Hazards

    International Nuclear Information System (INIS)

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7)

  10. IDENTIFICATION OF AIRCRAFT HAZARDS

    Energy Technology Data Exchange (ETDEWEB)

    K.L. Ashley

    2005-03-23

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7).

  11. Identification of Aircraft Hazards

    Energy Technology Data Exchange (ETDEWEB)

    K. Ashley

    2006-12-08

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7).

  12. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  13. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  14. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  15. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  16. Improving rotorcraft survivability to RPG attack using inverse methods

    Science.gov (United States)

    Anderson, D.; Thomson, D. G.

    2009-09-01

    This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs). The basis of this approach is the application of inverse simulation techniques pioneered for simulation of aggressive helicopter manoeuvres to the RPG engagement problem. In this research, improvements in survivability are achieved by computing effective evasive manoeuvres. The first step in this process uses the missile approach warning system camera (MAWS) on the aircraft to provide angular information of the threat. Estimates of the RPG trajectory and impact point are then estimated. For the current flight state an appropriate evasion response is selected then realised via inverse simulation of the platform dynamics. Results are presented for several representative engagements showing the efficacy of the approach.

  17. Advanced Aircraft Material

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Prince

    2013-06-01

    Full Text Available There has been long debate on “advanced aircraft material” from past decades & researchers too came out with lots of new advanced material like composites and different aluminum alloys. Now days a new advancement that is in great talk is third generation Aluminum-lithium alloy. Newest Aluminum-lithium alloys are found out to have low density, higher elastic modulus, greater stiffness, greater cryogenic toughness, high resistance to fatigue cracking and improved corrosion resistance properties over the earlier used aircraft material as mentioned in Table 3 [1-5]. Comparison had been made with nowadays used composite material and is found out to be more superior then that

  18. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  19. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  20. Maneuver and buffet characteristics of fighter aircraft

    Science.gov (United States)

    Ray, E. J.; Mckinney, L. W.; Carmichael, J. G.

    1973-01-01

    Recent research efforts in the improvement of the maneuverability of fighter aircraft in the high-subsonic and transonic speed range are reviewed with emphasis on the factors affecting aerodynamic boundaries, such as maximum obtainable lift, buffet onset, pitchup, wing rock, and nose slice. The investigations were made using a general research configuration which encompassed a systematic matrix of wing-design parameters. These results illustrated the sensitivity of section and planform geometry to a selected design point. The incorporation of variable-geometry wing devices in the form of flaps or leading-edge slats was shown to provide controlled flow over a wide range of flight conditions and substantial improvements in maneuver capabilities. Additional studies indicated that the blending of a highly swept maneuver strake with an efficient, moderately swept wing offers a promising approach for improving maneuver characteristics at high angles of attack without excessive penalties in structural weight.

  1. Auralization of novel aircraft configurations

    OpenAIRE

    Arntzen, M.; Bertsch, E.L.; Simons, D.G.

    2015-01-01

    A joint initiative of NLR, DLR, and TU Delft has been initiated to streamline the process of generating audible impressions of novel aircraft configurations. The integrated approach adds to the value of the individual tools and allows predicting the sound of future aircraft before they actually fly. Hence, an existing process for the aircraft design and system noise prediction at DLR has been upgraded to generate the required input data for an aircraft auralization framework developed by NLR ...

  2. Long Range Aircraft Trajectory Prediction

    OpenAIRE

    Magister, Tone

    2009-01-01

    The subject of the paper is the improvement of the aircraft future trajectory prediction accuracy for long-range airborne separation assurance. The strategic planning of safe aircraft flights and effective conflict avoidance tactics demand timely and accurate conflict detection based upon future four–dimensional airborne traffic situation prediction which is as accurate as each aircraft flight trajectory prediction. The improved kinematics model of aircraft relative flight considering flight ...

  3. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  4. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  5. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  6. Aircraft noise prediction

    Science.gov (United States)

    Filippone, Antonio

    2014-07-01

    This contribution addresses the state-of-the-art in the field of aircraft noise prediction, simulation and minimisation. The point of view taken in this context is that of comprehensive models that couple the various aircraft systems with the acoustic sources, the propagation and the flight trajectories. After an exhaustive review of the present predictive technologies in the relevant fields (airframe, propulsion, propagation, aircraft operations, trajectory optimisation), the paper addresses items for further research and development. Examples are shown for several airplanes, including the Airbus A319-100 (CFM engines), the Bombardier Dash8-Q400 (PW150 engines, Dowty R408 propellers) and the Boeing B737-800 (CFM engines). Predictions are done with the flight mechanics code FLIGHT. The transfer function between flight mechanics and the noise prediction is discussed in some details, along with the numerical procedures for validation and verification. Some code-to-code comparisons are shown. It is contended that the field of aircraft noise prediction has not yet reached a sufficient level of maturity. In particular, some parametric effects cannot be investigated, issues of accuracy are not currently addressed, and validation standards are still lacking.

  7. Robots for Aircraft Maintenance

    Science.gov (United States)

    1993-01-01

    Marshall Space Flight Center charged USBI (now Pratt & Whitney) with the task of developing an advanced stripping system based on hydroblasting to strip paint and thermal protection material from Space Shuttle solid rocket boosters. A robot, mounted on a transportable platform, controls the waterjet angle, water pressure and flow rate. This technology, now known as ARMS, has found commercial applications in the removal of coatings from jet engine components. The system is significantly faster than manual procedures and uses only minimal labor. Because the amount of "substrate" lost is minimal, the life of the component is extended. The need for toxic chemicals is reduced, as is waste disposal and human protection equipment. Users of the ARMS work cell include Delta Air Lines and the Air Force, which later contracted with USBI for development of a Large Aircraft Paint Stripping system (LARPS). LARPS' advantages are similar to ARMS, and it has enormous potential in military and civil aircraft maintenance. The technology may also be adapted to aircraft painting, aircraft inspection techniques and paint stripping of large objects like ships and railcars.

  8. Braking performance of aircraft tires

    Science.gov (United States)

    Agrawal, Satish K.

    This paper brings under one cover the subject of aircraft braking performance and a variety of related phenomena that lead to aircraft hydroplaning, overruns, and loss of directional control. Complex processes involving tire deformation, tire slipping, and fluid pressures in the tire-runway contact area develop the friction forces for retarding the aircraft; this paper describes the physics of these processes. The paper reviews the past and present research efforts and concludes that the most effective way to combat the hazards associated with aircraft landings and takeoffs on contaminated runways is by measuring and displaying in realtime the braking performance parameters in the aircraft cockpit.

  9. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  10. Attack Penetration System for SQL Injection

    Directory of Open Access Journals (Sweden)

    Manju Kaushik

    2014-06-01

    Full Text Available The SQL Injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per our study and also prevention methods had been discussed in several research papers. So the main motivation of our paper to penetrate the attack. For this we have proposed an efficient framework from which the central authority can control all the visited IP and restrict those IP. If the IP is in the restricted zone then the contents are restricted by using SQL update command with some status modification states. If the restricted IP wish to access the data from their credentials, it is immediately inform to the admin and the time of attack alert will be stored in the log area of that attack. Finally by comparison we will justify our results which are better in comparison to the previous test and methodology.

  11. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  12. SQL INJECTION ATTACK DETECTION AND PREVENTION

    OpenAIRE

    Dr. SUNITHA ABBURU; PERUMALSAMY RAMASAMY

    2012-01-01

    Nowadays SQL injection attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The cont...

  13. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  14. Numerical study of aerodynamic characteristics of FSW aircraft with different wing positions under supersonic condition

    Directory of Open Access Journals (Sweden)

    Lei Juanmian

    2016-08-01

    Full Text Available This paper investigates the influence of forward-swept wing (FSW positions on the aerodynamic characteristics of aircraft under supersonic condition (Ma = 1.5. The numerical method based on Reynolds-averaged Navier–Stokes (RANS equations, Spalart–Allmaras (S–A turbulence model and implicit algorithm is utilized to simulate the flow field of the aircraft. The aerodynamic parameters and flow field structures of the horizontal tail and the whole aircraft are presented. The results demonstrate that the spanwise flow of FSW flows from the wingtip to the wing root, generating an upper wing surface vortex and a trailing edge vortex nearby the wing root. The vortexes generated by FSW have a strong downwash effect on the tail. The lower the vertical position of FSW, the stronger the downwash effect on tail. Therefore, the effective angle of attack of tail becomes smaller. In addition, the lift coefficient, drag coefficient and lift–drag ratio of tail decrease, and the center of pressure of tail moves backward gradually. For the whole aircraft, the lower the vertical position of FSW, the smaller lift, drag and center of pressure coefficients of aircraft. The closer the FSW moves towards tail, the bigger pitching moment and center of pressure coefficients of the whole aircraft, but the lift and drag characteristics of the horizontal tail and the whole aircraft are basically unchanged. The results have potential application for the design of new concept aircraft.

  15. Numerical study of aerodynamic characteristics of FSW aircraft with dierent wing positions under supersonic condition

    Institute of Scientific and Technical Information of China (English)

    Lei Juanmian; Zhao Shuai; Wang Suozhu

    2016-01-01

    This paper investigates the influence of forward-swept wing (FSW) positions on the aero-dynamic characteristics of aircraft under supersonic condition (Ma=1.5). The numerical method based on Reynolds-averaged Navier–Stokes (RANS) equations, Spalart–Allmaras (S–A) turbu-lence model and implicit algorithm is utilized to simulate the flow field of the aircraft. The aerody-namic parameters and flow field structures of the horizontal tail and the whole aircraft are presented. The results demonstrate that the spanwise flow of FSW flows from the wingtip to the wing root, generating an upper wing surface vortex and a trailing edge vortex nearby the wing root. The vortexes generated by FSW have a strong downwash effect on the tail. The lower the vertical position of FSW, the stronger the downwash effect on tail. Therefore, the effective angle of attack of tail becomes smaller. In addition, the lift coefficient, drag coefficient and lift–drag ratio of tail decrease, and the center of pressure of tail moves backward gradually. For the whole aircraft, the lower the vertical position of FSW, the smaller lift, drag and center of pressure coefficients of aircraft. The closer the FSW moves towards tail, the bigger pitching moment and center of pres-sure coefficients of the whole aircraft, but the lift and drag characteristics of the horizontal tail and the whole aircraft are basically unchanged. The results have potential application for the design of new concept aircraft.

  16. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  17. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  18. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  19. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  20. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  1. 19 CFR 10.183 - Duty-free entry of civil aircraft, aircraft engines, ground flight simulators, parts, components...

    Science.gov (United States)

    2010-04-01

    ... Duty-free entry of civil aircraft, aircraft engines, ground flight simulators, parts, components, and... aircraft, aircraft engines, and ground flight simulators, including their parts, components, and... United States (HTSUS) by meeting the following requirements: (1) The aircraft, aircraft engines,...

  2. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  3. Inlet, engine, airframe controls integration development for supercruising aircraft

    Science.gov (United States)

    Houchard, J. H.; Carlin, C. M.; Tjonneland, E.

    1983-01-01

    In connection with a consideration of advanced military aircraft systems, attention is given to research for improving the technology of the design of supersonic cruise aircraft. Syberg et al. (1981) have shown that an analytic design method is now available to accurately predict the flow characteristics of axisymmetric supersonic inlets, including off-design angle of attack operation. On the basis of information regarding the inlet flow characteristics, the control system designer can begin the inlet design and development, before wind tunnel testing has begun. The present investigation is concerned with details and status of inlet control technology. A detailed representation of a supersonic propulsion system is developed. This development demonstrates the feasibility of the selected hybrid computational concept.

  4. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  5. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    R.J.J.H. van Son

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  6. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  7. Dynamic stability testing of aircraft - Needs versus capabilities

    Science.gov (United States)

    Orlik-Rueckemann, K. J.

    1973-01-01

    Highlights of a recent survey of the future needs for dynamic stability information for such aerospace vehicles as the Space Shuttle and advanced high-performance military aircraft, indicating the importance of obtaining this information for high-angle-of-attack high-Reynolds-number conditions. A review of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives reveals an almost total lack of such capabilities for Mach numbers above 0.1 at angles of attack higher than 25 deg. In addition, capabilities to obtain certain new cross-coupling derivatives and information on effects of the coning motion are almost completely lacking. Recommendations are made regarding equipment that should be constructed to remedy this situation.

  8. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  9. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  10. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  11. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  12. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  15. Mission management aircraft operations manual

    Science.gov (United States)

    1992-01-01

    This manual prescribes the NASA mission management aircraft program and provides policies and criteria for the safe and economical operation, maintenance, and inspection of NASA mission management aircraft. The operation of NASA mission management aircraft is based on the concept that safety has the highest priority. Operations involving unwarranted risks will not be tolerated. NASA mission management aircraft will be designated by the Associate Administrator for Management Systems and Facilities. NASA mission management aircraft are public aircraft as defined by the Federal Aviation Act of 1958. Maintenance standards, as a minimum, will meet those required for retention of Federal Aviation Administration (FAA) airworthiness certification. Federal Aviation Regulation Part 91, Subparts A and B, will apply except when requirements of this manual are more restrictive.

  16. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  17. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  18. An Network Attack Modeling Method Based on MLL-AT

    Science.gov (United States)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  19. 19 CFR 122.64 - Other aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Other aircraft. 122.64 Section 122.64 Customs... AIR COMMERCE REGULATIONS Clearance of Aircraft and Permission To Depart § 122.64 Other aircraft. Clearance or permission to depart shall be requested by the aircraft commander or agent for aircraft...

  20. Guidance Systems of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    K.N. Rajanikanth

    2005-07-01

    Full Text Available Mission performance of a fighter aircraft is crucial for survival and strike capabilities in todays' aerial warfare scenario. The guidance functions of such an aircraft play a vital role inmeeting the requirements and accomplishing the mission success. This paper presents the requirements of precision guidance for various missions of a fighter aircraft. The concept ofguidance system as a pilot-in-loop system is pivotal in understanding and designing such a system. Methodologies of designing such a system are described.

  1. D-558-2 Aircraft on lakebed

    Science.gov (United States)

    1955-01-01

    . In the process, during August of 1949 they encountered pitch-up problems, which NACA engineers recognized as serious because they could produce a limiting and dangerous restriction on flight performance. Hence, they determined to make a complete investigation of the problem. In 1950, Douglas replaced the turbojet with an LR-8 rocket engine, and its pilot, William B. Bridgeman, flew the aircraft seven times up to a speed of Mach 1.88 (1.88 times the speed of sound) and an altitude of 79,494 feet (the latter an unofficial world's altitude record at the time, achieved on August 15, 1951). In the rocket configuration, a Navy P2B (Navy version of the B-29) launched the airplane at approximately 30,000 feet after taking off from the ground with the Skyrocket attached beneath its bomb bay. During Bridgeman's supersonic flights, he encountered a violent rolling motion known as lateral instability that was less pronounced on the Mach 1.88 flight on August 7, 1951, than on a Mach 1.85 flight in June when he pushed over to a low angle of attack (angle of the fuselage or wing to the prevailing wind direction). The NACA engineers studied the behavior of the aircraft before beginning their own flight research in the airplane in September 1951. Over the next couple of years, NACA pilot A. Scott Crossfield flew the airplane 20 times to gather data on longitudinal and lateral stability and control, wing and tail loads, and lift, drag, and buffeting characteristics at speeds up to Mach 1.878. At that point, Marine Lt. Col. Marion Carl flew the airplane to a new (unofficial) altitude record of 83,235 feet on August 21, 1953, and to a maximum speed of Mach 1.728. Following Carl's completion of these flights for the Navy, NACA technicians at the High-Speed Flight Research Station (HSFRS) near Mojave, Calif., outfitted the LR-8 engine's cylinders with nozzle extensions to prevent the exhaust gas from affecting the rudders at supersonic speeds. This addition also increased the engine

  2. Rotary Balance Wind Tunnel Testing for the FASER Flight Research Aircraft

    Science.gov (United States)

    Denham, Casey; Owens, D. Bruce

    2016-01-01

    Flight dynamics research was conducted to collect and analyze rotary balance wind tunnel test data in order to improve the aerodynamic simulation and modeling of a low-cost small unmanned aircraft called FASER (Free-flying Aircraft for Sub-scale Experimental Research). The impetus for using FASER was to provide risk and cost reduction for flight testing of more expensive aircraft and assist in the improvement of wind tunnel and flight test techniques, and control laws. The FASER research aircraft has the benefit of allowing wind tunnel and flight tests to be conducted on the same model, improving correlation between wind tunnel, flight, and simulation data. Prior wind tunnel tests include a static force and moment test, including power effects, and a roll and yaw damping forced oscillation test. Rotary balance testing allows for the calculation of aircraft rotary derivatives and the prediction of steady-state spins. The rotary balance wind tunnel test was conducted in the NASA Langley Research Center (LaRC) 20-Foot Vertical Spin Tunnel (VST). Rotary balance testing includes runs for a set of given angular rotation rates at a range of angles of attack and sideslip angles in order to fully characterize the aircraft rotary dynamics. Tests were performed at angles of attack from 0 to 50 degrees, sideslip angles of -5 to 10 degrees, and non-dimensional spin rates from -0.5 to 0.5. The effects of pro-spin elevator and rudder deflection and pro- and anti-spin elevator, rudder, and aileron deflection were examined. The data are presented to illustrate the functional dependence of the forces and moments on angle of attack, sideslip angle, and angular rate for the rotary contributions to the forces and moments. Further investigation is necessary to fully characterize the control effectors. The data were also used with a steady state spin prediction tool that did not predict an equilibrium spin mode.

  3. Analysis of Asymmetric Aircraft Aerodynamics Due to an Experimental Wing Glove

    Science.gov (United States)

    Hartshorn, Fletcher

    2011-01-01

    Aerodynamic analysis on a business jet with a wing glove attached to one wing is presented and discussed. If a wing glove is placed over a portion of one wing, there will be asymmetries in the aircraft as well as overall changes in the forces and moments acting on the aircraft. These changes, referred to as deltas, need to be determined and quantified to make sure the wing glove does not have a drastic effect on the aircraft flight characteristics. TRANAIR, a non-linear full potential solver was used to analyze a full aircraft, with and without a glove, at a variety of flight conditions and angles of attack and sideslip. Changes in the aircraft lift, drag and side force, along with roll, pitch and yawing moment are presented. Span lift and moment distributions are also presented for a more detailed look at the effects of the glove on the aircraft. Aerodynamic flow phenomena due to the addition of the glove and its fairing are discussed. Results show that the glove used here does not present a drastic change in forces and moments on the aircraft, but an added torsional moment around the quarter-chord of the wing may be a cause for some structural concerns.

  4. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  5. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  6. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  7. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  8. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  10. Attack detection in unattended sensor networks

    Science.gov (United States)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  11. Chemistry in aircraft plumes

    Energy Technology Data Exchange (ETDEWEB)

    Kraabol, A.G.; Stordal, F.; Knudsen, S. [Norwegian Inst. for Air Research, Kjeller (Norway); Konopka, P. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Wessling (Germany). Inst. fuer Physik der Atmosphaere

    1997-12-31

    An expanding plume model with chemistry has been used to study the chemical conversion of NO{sub x} to reservoir species in aircraft plumes. The heterogeneous conversion of N{sub 2}O{sub 5} to HNO{sub 3}(s) has been investigated when the emissions take place during night-time. The plume from an B747 has been simulated. During a ten-hour calculation the most important reservoir species was HNO{sub 3} for emissions at noon. The heterogeneous reactions had little impact on the chemical loss of NO{sub x} to reservoir species for emissions at night. (author) 4 refs.

  12. Hydrogen aircraft technology

    Science.gov (United States)

    Brewer, G. D.

    1991-01-01

    A comprehensive evaluation is conducted of the technology development status, economics, commercial feasibility, and infrastructural requirements of LH2-fueled aircraft, with additional consideration of hydrogen production, liquefaction, and cryostorage methods. Attention is given to the effects of LH2 fuel cryotank accommodation on the configurations of prospective commercial transports and military airlifters, SSTs, and HSTs, as well as to the use of the plentiful heatsink capacity of LH2 for innovative propulsion cycles' performance maximization. State-of-the-art materials and structural design principles for integral cryotank implementation are noted, as are airport requirements and safety and environmental considerations.

  13. Structural integrity in aircraft.

    Science.gov (United States)

    Hardrath, H. F.

    1973-01-01

    The paper reviews briefly the current design philosophies for achieving long, efficient, and reliable service in aircraft structures. The strengths and weaknesses of these design philosophies and their demonstrated records of success are discussed. The state of the art has not been developed to the point where designing can be done without major test inspection and maintenance programs. A broad program of research is proposed through which a viable computerized design scheme will be provided during the next decade. The program will organize and correlate existing knowledge on fatigue and fracture behavior, identify gaps in this knowledge, and guide specific research to upgrade design capabilities.

  14. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  15. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  16. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  17. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  18. Study of optical techniques for the Ames unitary wind tunnels. Part 3: Angle of attack

    Science.gov (United States)

    Lee, George

    1992-01-01

    A review of optical sensors that are capable of accurate angle of attack measurements in wind tunnels was conducted. These include sensors being used or being developed at NASA Ames and Langley Research Centers, Boeing Airplane Company, McDonald Aircraft Company, Arnold Engineering Development Center, National Aerospace Laboratory of the Netherlands, National Research Council of Canada, and the Royal Aircraft Establishment of England. Some commercial sensors that may be applicable to accurate angle measurements were also reviewed. It was found that the optical sensor systems were based on interferometers, polarized light detector, linear or area photodiode cameras, position sensing photodetectors, and laser scanners. Several of the optical sensors can meet the requirements of the Ames Unitary Plan Wind Tunnel. Two of these, the Boeing interferometer and the Complere lateral effect photodiode sensors are being developed for the Ames Unitary Plan Wind Tunnel.

  19. Radial cylinder aircraft engines

    OpenAIRE

    Šimíček, Petr

    2015-01-01

    Práce je zaměřena na konstrukční řešení letadlových hvězdicových motorů. Úvod je pojednáním o historii letadlových hvězdicových motorů a jejich vývoji v historickém kontextu. Druhá část je zaměřena na konstrukci letadlových hvězdicových motorů, následně jsou uvedena některá zajímavá konstrukční řešení a porovnání s motorem jiného druhu konstrukce. The bachelor's thesis is focused on design of aircraft radial engines. Home is a treatise on the history of aircraft radial engines and their de...

  20. Aircraft landing using GPS

    Science.gov (United States)

    Lawrence, David Gary

    The advent of the Global Positioning System (GPS) is revolutionizing the field of navigation. Commercial aviation has been particularly influenced by this worldwide navigation system. From ground vehicle guidance to aircraft landing applications, GPS has the potential to impact many areas of aviation. GPS is already being used for non-precision approach guidance; current research focuses on its application to more critical regimes of flight. To this end, the following contributions were made: (1) Development of algorithms and a flexible software architecture capable of providing real-time position solutions accurate to the centimeter level with high integrity. This architecture was used to demonstrate 110 automatic landings of a Boeing 737. (2) Assessment of the navigation performance provided by two GPS-based landing systems developed at Stanford, the Integrity Beacon Landing System, and the Wide Area Augmentation System. (3) Preliminary evaluation of proposed enhancements to traditional techniques for GPS positioning, specifically, dual antenna positioning and pseudolite augmentation. (4) Introduction of a new concept for positioning using airport pseudolites. The results of this research are promising, showing that GPS-based systems can potentially meet even the stringent requirements of a Category III (zero visibility) landing system. Although technical and logistical hurdles still exist, it is likely that GPS will soon provide aircraft guidance in all phases of flight, including automatic landing, roll-out, and taxi.

  1. Aviation industry-research in aircraft finance

    OpenAIRE

    Ehrenthal, Joachim C.F.

    2010-01-01

    Aircraft values are key to aircraft financing decisions: Aircraft values act as a source of security for providers of debt capital and lessors failing to re-place aircraft, and as a source of upside potential to equity investors. Yet, aircraft values cannot be precisely and continuously monitored. This is because neither actual primary nor secondary aircraft transaction prices are disclosed. Various types of third party valuation estimates exist, but relying solely on third party appraisa...

  2. MISSILES AND AIRCRAFT (PART1

    Directory of Open Access Journals (Sweden)

    C.M. Meyer

    2012-02-01

    Full Text Available Many sources maintain that the role played by air power in the 1973 Yom Kippur War was important. Other interpretations state that control of air space over the battlefield areas, (either by aircraft or anti-aircraft defences, was vital.

  3. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  4. Bifurcation analysis of polynomial models for longitudinal motion at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Shi Zhongke; Fan Li

    2013-01-01

    To investigate the longitudinal motion stability of aircraft maneuvers conveniently,a new stability analysis approach is presented in this paper.Based on describing longitudinal aerodynamics at high angle-of-attack (α < 50°) motion by polynomials,a union structure of two-order differential equation is suggested.By means of nonlinear theory and method,analytical and global bifurcation analyses of the polynomial differential systems are provided for the study of the nonlinear phenomena of high angle-of-attack flight.Applying the theories of bifurcations,many kinds of bifurcations,such as equilibrium,Hopf,homoclinic (heteroclinic) orbit and double limit cycle bifurcations are discussed and the existence conditions for these bifurcations as well as formulas for calculating bifurcation curves are derived.The bifurcation curves divide the parameter plane into several regions; moreover,the complete bifurcation diagrams and phase portraits in different regions are obtained.Finally,our conclusions are applied to analyzing the stability and bifurcations of a practical example of a high angle-of-attack flight as well as the effects of elevator deflection on the asymptotic stability regions of equilibrium.The model and analytical methods presented in this paper can be used to study the nonlinear flight dynamic of longitudinal stall at high angle of attack.

  5. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  6. SQL INJECTION ATTACK DETECTION AND PREVENTION

    Directory of Open Access Journals (Sweden)

    Dr. SUNITHA ABBURU

    2012-04-01

    Full Text Available Nowadays SQL injection attacks (SQLIAs and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA’s and script in an efficient way. The proposed approach detects and prevents all the Injection queries as well as the cross scripting through the Framework and Static analysis and Dynamic analysis. The contribution is twofold 1. SQL Injection AttackDetection and prevention 2. SQL Injection Reports. These techniques have been implemented in ASP.Net and SQL Server and tested by conducting various experiments and prove that the web applications and database is protected from scripting and SQL injection queries.

  7. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  8. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  9. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  10. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  11. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  14. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  15. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  16. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  17. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  18. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  19. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  20. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  1. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  2. Textual Manipulation for SQL Injection Attacks

    OpenAIRE

    Hussein AlNabulsi; Izzat Alsmadi; Mohammad Al-Jarrah

    2013-01-01

    SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNOR...

  3. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  4. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  5. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  6. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  7. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  8. Cooperative Attack for Manned/Unmanned Aerial Vehicles%有人/无人机协同作战

    Institute of Scientific and Technical Information of China (English)

    王焱

    2013-01-01

    This paper introduces the development of cooperative attack for manned/unmanned aerial vehicles, presents future possible modes of the cooperative attack between aircraft and unmanned aerial vehicles(UAV), and analyzes the feasibility of realizing the ground control function of UAV by manned aerial vehicles . Relative conclusions are meaningful for technicians concerning this field to carry out research on cooperative attack for manned/unmanned aerial vehicles .%介绍了国外有人/无人机协同作战的发展概况,给出了有人/无人机之间协同作战的几种可能模式,并分析了有人机实现无人机地面控制站功能的可行性。相关结论对该领域技术人员开展有人/无人机协同作战研究具有重要意义。

  9. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  10. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  11. Aircraft radar antennas

    Science.gov (United States)

    Schrank, Helmut E.

    1987-04-01

    Many changes have taken place in airborne radar antennas since their beginnings over forty years ago. A brief historical review of the advances in technology is presented, from mechanically scanned reflectors to modern multiple function phased arrays. However, emphasis is not on history but on the state-of-the-art technology and trends for future airborne radar systems. The status of rotating surveillance antennas is illustrated by the AN/APY-1 Airborne Warning and Control System (AWACS) slotted waveguide array, which achieved a significant breakthrough in sidelobe suppression. Gimballed flat plate arrays in nose radomes are typified by the AN/APG-66 (F-16) antenna. Multifunction phased arrays are presented by the Electronically Agile Radar (EAR) antenna, which has achieved significant advances in performance versatility and reliability. Trends toward active aperture, adaptive, and digital beamforming arrays are briefly discussed. Antennas for future aircraft radar systems must provide multiple functions in less aperture space, and must perform more reliably.

  12. Commercial aircraft composite technology

    CERN Document Server

    Breuer, Ulf Paul

    2016-01-01

    This book is based on lectures held at the faculty of mechanical engineering at the Technical University of Kaiserslautern. The focus is on the central theme of societies overall aircraft requirements to specific material requirements and highlights the most important advantages and challenges of carbon fiber reinforced plastics (CFRP) compared to conventional materials. As it is fundamental to decide on the right material at the right place early on the main activities and milestones of the development and certification process and the systematic of defining clear requirements are discussed. The process of material qualification - verifying material requirements is explained in detail. All state-of-the-art composite manufacturing technologies are described, including changes and complemented by examples, and their improvement potential for future applications is discussed. Tangible case studies of high lift and wing structures emphasize the specific advantages and challenges of composite technology. Finally,...

  13. 76 FR 45011 - Control of Air Pollution From Aircraft and Aircraft Engines; Proposed Emission Standards and Test...

    Science.gov (United States)

    2011-07-27

    ... from Aircraft and Aircraft Engines; Emission Standards and Test Procedures;'' Final Rule, 62 FR 25356... From Aircraft and Aircraft Engines; Proposed Emission Standards and Test Procedures; Proposed Rule #0... and Aircraft Engines; Proposed Emission Standards and Test Procedures AGENCY: Environmental...

  14. Fault Tolerant Control Design for the Longitudinal Aircraft Dynamics using Quantitative Feedback Theory

    OpenAIRE

    Ossmann, Daniel

    2015-01-01

    Flight control laws of modern aircraft are scheduled with respect to flight point parameters. The loss of the air data measurement system implies inevitably the loss of relevant scheduling information. A strategy to design a fault tolerant longitudinal flight control system is proposed which can accommodate the total loss of the angle of attack and the calibrated airspeed measurements. In this scenario the described robust longitudinal control law is employed ensuring a control performance ...

  15. Safety of a Commercial Aircraft after Damage to Airframe due to Terrorist Attack

    OpenAIRE

    Lošťák, Miroslav

    2012-01-01

    Teroristické útoky znamenají dnes velké nebezpečí pro civilní dopravní letouny. V této práci jsou analyzovány možné způsoby útoků a je vybrán nejnebezpečnější. Jedná se o teroristický útok z vnějšku letounu za použití tříštivé bojové hlavice rakety. Tato bojová hlavice působí poškození draku letounu rojem střepin vzniklých při výbuchu. Je definován způsob určení zasažené plochy letounu za použití analytické geometrie. Analytickými rovnicemi jsou popsány geometrie rozptylu střepin a geometrie ...

  16. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  17. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare. PMID:27358016

  18. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  19. 36 CFR 331.14 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 331.14 Section 331..., KENTUCKY AND INDIANA § 331.14 Aircraft. (a) The operation of aircraft on WCA lands and waters is prohibited... prohibited. (c) The provisions of this section shall not be applicable to aircraft engaged on...

  20. 48 CFR 246.408-71 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Aircraft. 246.408-71... Aircraft. (a) The Federal Aviation Administration (FAA) has certain responsibilities and prerogatives in connection with some commercial aircraft and of aircraft equipment and accessories (Pub. L. 85-726 (72...

  1. 36 CFR 327.4 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 327.4 Section 327.4... Aircraft. (a) This section pertains to all aircraft including, but not limited to, airplanes, seaplanes, helicopters, ultra-light aircraft, motorized hang gliders, hot air balloons, any non-powered flight devices...

  2. 14 CFR 141.39 - Aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft. 141.39 Section 141.39 Aeronautics... CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.39 Aircraft. (a... certificate or provisional pilot school certificate must show that each aircraft used by the school for...

  3. 40 CFR 87.6 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Aircraft safety. 87.6 Section 87.6 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM AIRCRAFT AND AIRCRAFT ENGINES General Provisions § 87.6 Aircraft safety. The provisions...

  4. Flight mechanics of a tailless articulated wing aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Paranjape, Aditya A; Chung, Soon-Jo; Selig, Michael S, E-mail: sjchung@illinois.edu [Department of Aerospace Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 (United States)

    2011-06-15

    This paper investigates the flight mechanics of a micro aerial vehicle without a vertical tail in an effort to reverse-engineer the agility of avian flight. The key to stability and control of such a tailless aircraft lies in the ability to control the incidence angles and dihedral angles of both wings independently. The dihedral angles can be varied symmetrically on both wings to control aircraft speed independently of the angle of attack and flight path angle, while asymmetric dihedral can be used to control yaw in the absence of a vertical stabilizer. It is shown that wing dihedral angles alone can effectively regulate sideslip during rapid turns and generate a wide range of equilibrium turn rates while maintaining a constant flight speed and regulating sideslip. Numerical continuation and bifurcation analysis are used to compute trim states and assess their stability. This paper lays the foundation for design and stability analysis of a flapping wing aircraft that can switch rapidly from flapping to gliding flight for agile manoeuvring in a constrained environment.

  5. Flight Dynamics of Flexible Aircraft with Aeroelastic and Inertial Force Interactions

    Science.gov (United States)

    Nguyen, Nhan T.; Tuzcu, Ilhan

    2009-01-01

    This paper presents an integrated flight dynamic modeling method for flexible aircraft that captures coupled physics effects due to inertial forces, aeroelasticity, and propulsive forces that are normally present in flight. The present approach formulates the coupled flight dynamics using a structural dynamic modeling method that describes the elasticity of a flexible, twisted, swept wing using an equivalent beam-rod model. The structural dynamic model allows for three types of wing elastic motion: flapwise bending, chordwise bending, and torsion. Inertial force coupling with the wing elasticity is formulated to account for aircraft acceleration. The structural deflections create an effective aeroelastic angle of attack that affects the rigid-body motion of flexible aircraft. The aeroelastic effect contributes to aerodynamic damping forces that can influence aerodynamic stability. For wing-mounted engines, wing flexibility can cause the propulsive forces and moments to couple with the wing elastic motion. The integrated flight dynamics for a flexible aircraft are formulated by including generalized coordinate variables associated with the aeroelastic-propulsive forces and moments in the standard state-space form for six degree-of-freedom flight dynamics. A computational structural model for a generic transport aircraft has been created. The eigenvalue analysis is performed to compute aeroelastic frequencies and aerodynamic damping. The results will be used to construct an integrated flight dynamic model of a flexible generic transport aircraft.

  6. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  7. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  8. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  9. 14 CFR 43.7 - Persons authorized to approve aircraft, airframes, aircraft engines, propellers, appliances, or...

    Science.gov (United States)

    2010-01-01

    ..., airframes, aircraft engines, propellers, appliances, or component parts for return to service after..., REBUILDING, AND ALTERATION § 43.7 Persons authorized to approve aircraft, airframes, aircraft engines... Administrator, may approve an aircraft, airframe, aircraft engine, propeller, appliance, or component part...

  10. 78 FR 54385 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2013-09-04

    ... Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration... directive (AD) for various aircraft equipped with Rotax Aircraft Engines 912 A Series Engine. This AD...; phone: +43 7246 601 0; fax: +43 7246 601 9130; Internet: http://www.rotax-aircraft-engines.com . You...

  11. 14 CFR 21.6 - Manufacture of new aircraft, aircraft engines, and propellers.

    Science.gov (United States)

    2010-01-01

    ... Manufacture of new aircraft, aircraft engines, and propellers. (a) Except as specified in paragraphs (b) and (c) of this section, no person may manufacture a new aircraft, aircraft engine, or propeller based on... provisions of §§ 21.183(c), 21.184(b), or 21.185(c); and (2) New aircraft engines or propellers...

  12. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  13. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  14. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  15. Panic Attack during Elective Gastrointestinal Endoscopy.

    Science.gov (United States)

    Mitsonis, Charalampos; Dimopoulos, Nikolaos; Zavrou, Marianna; Psarra, Vassiliki; Giofkos, Christos; Fiorakis, Christos; Dimitriadis, Athanasios; Valavanis, Dimitrios; Vousoura, Eleni; Zervas, Iannis; Papavassiliou, Efstathios

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y). Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, P < 0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, P < 0.05). Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients. PMID:22007196

  16. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  17. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  18. Western Pacific Typhoon Aircraft Fixes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Western Pacific typhoon aircraft reconnaissance data from the years 1946 - 1965 and 1978, excluding 1952, were transcribed from original documents, or copy of...

  19. Aircraft recognition and tracking device

    Science.gov (United States)

    Filis, Dimitrios P.; Renios, Christos I.

    2011-11-01

    The technology of aircraft recognition and tracking has various applications in all areas of air navigation, be they civil or military, spanning from air traffic control and regulation at civilian airports to anti-aircraft weapon handling and guidance for military purposes.1, 18 The system presented in this thesis is an alternative implementation of identifying and tracking flying objects, which benefits from the optical spectrum by using an optical camera built into a servo motor (pan-tilt unit). More specifically, through the purpose-developed software, when a target (aircraft) enters the field of view of the camera18, it is both detected and identified.5, 22 Then the servo motor, being provided with data on target position and velocity, tracks the aircraft while it is in constant communication with the camera (Fig. 1). All the features are so designed as to operate under real time conditions.

  20. VTOL to Transonic Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The cyclogyro, an aircraft propulsion concept with the potential for VTOL to the lower bounds of transonic flight, is conceptually simple but structurally and...

  1. Electromagnetic Interference In New Aircraft

    Science.gov (United States)

    Larsen, William E.

    1991-01-01

    Report reviews plans to develop tests and standards to ensure that digital avionics systems in new civil aircraft immune to electromagnetic interference (EMI). Updated standards reflect more severe environment and vulnerabilities of modern avionics.

  2. Alloy design for aircraft engines

    Science.gov (United States)

    Pollock, Tresa M.

    2016-08-01

    Metallic materials are fundamental to advanced aircraft engines. While perceived as mature, emerging computational, experimental and processing innovations are expanding the scope for discovery and implementation of new metallic materials for future generations of advanced propulsion systems.

  3. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  4. Qualitative evaluation of a flush air data system at transonic speeds and high angles of attack

    Science.gov (United States)

    Larson, Terry J.; Whitmore, Stephen A.; Ehernberger, L. J.; Johnson, J. Blair; Siemers, Paul M., III

    1987-01-01

    Flight tests were performed on an F-14 aircraft to evaluate the use of flush pressure orifices on the nose section for obtaining air data at transonic speeds over a large range of flow angles. This program was part of a flight test and wind tunnel program to assess the accuracies of such systems for general use on aircraft. It also provided data to validate algorithms developed for the shuttle entry air data system designed at NASA Langley. Data were obtained for Mach numbers between 0.60 and 1.60, for angles of attack up to 26.0 deg, and for sideslip angles up to 11.0 deg. With careful calibration, a flush air data system with all flush orifices can provide accurate air data information over a large range of flow angles. Several orificies on the nose cap were found to be suitable for determination of stagnation pressure. Other orifices on the nose section aft of the nose cap were shown to be suitable for determination of static pressure. Pairs of orifices on the nose cap provided the most sensitive measurements for determining angles of attack and sideslip, although orifices located farther aft on the nose section could also be used.

  5. Aerodynamics of powered missile separation from F/A-18 aircraft

    Science.gov (United States)

    Ahmad, J. U.; Shanks, S. P.; Buning, P. G.

    1993-01-01

    A 3D dynamic 'chimera' algorithm that solves the thin-layer Navier-Stokes equations over multiple moving bodies was modified to numerically simulate the aerodynamics, missile dynamics, and missile plume interactions of a missile separating from a generic wing and from an F/A-18 aircraft in transonic flow. The missile is mounted below the wing for missile separation from the wing and on the F/A-18 fuselage at the engine inlet side for missile separation from aircraft. Static and powered missile separation cases are considered to examine the influence of the missile and plume on the wing and F/A-18 fuselage and engine inlet. The aircraft and missile are at two degrees angle of attack, Reynolds number of 10 million, freestream Mach number of 1.05 and plume Mach number of 3.0. The computational results show the details of the flow field.

  6. A review and update of the NASA aircraft noise prediction program propeller analysis system

    Science.gov (United States)

    Golub, Robert A.; Nguyen, L. Cathy

    1989-04-01

    The National Aeronautics and Space Administration (NASA) Aircraft Noise Prediction Program (ANOPP) Propeller Analysis System (PAS) is a set of computational modules for predicting the aerodynamics, performance, and noise of propellers. The ANOPP PAS has the capability to predict noise levels for propeller aircraft certification and produce parametric scaling laws for the adjustment of measured data to reference conditions. A technical overview of the prediction techniques incorporated into the system is presented. The prediction system has been applied to predict the noise signature of a variety of propeller configurations including the effects of propeller angle of attack. A summary of these validation studies is discussed with emphasis being placed on the wind tunnel and flight test programs sponsored by the Federal Aviation Administration (FAA) for the Piper Cherokee Lance aircraft. A number of modifications and improvements have been made to the system and both DEC VAX and IBM-PC versions of the system have been added to the original CDC NOS version.

  7. Studies on the Seizure of Rudder on the Flight Safety of an Aircraft

    Institute of Scientific and Technical Information of China (English)

    GENG Jianzhong; WU Huzi; DUAN Zhuoyi

    2013-01-01

    The demands of aircraft quality design criterion on main control system failure and subsequently instantaneous response were analyzed.According to the simulation,the flight characteristics of an aircraft were studied in different angle of rudder seizure.It demonstrated that when rudder seizure with high angle and pilot could not take action immediately,the flight parameters would change sharply.The yaw angle increased 50 degrees in 5 minutes,side velocity could attain 40 meters per-second,the angle of attack and sideslip would surpass 30 degrees,roll rate would reach-20 degrees per second,side load would arrive 0.6g.Simultaneity the angle of attack exceeded the limited angle,the aircraft would stall.If control wasn' t working,the disaster would happen.These phenomena supply the sufficient information of the rudder malfunction.The validity of correcting yaw moment by asymmetry thrust was testified,the simulation results showed that even rudder seizure in most serious conditions,adopting asymmetry thrust can correct yaw moment caused by the rudder seizure.The judgment standards of flight safety level for the state of malfunction were given.The safety level was assessed caused by the rudder seizure.For an aircraft with two engines on one side,the pilots need to adjust the 4 engines to balance the asymmetric moment,the work load is increased enormously.According the flight safety standards,the safety level is level Ⅲ.

  8. Challenges in Aircraft Noise Prediction

    OpenAIRE

    Filippone A

    2014-01-01

    This contribution addresses the problem of aircraft noise prediction using theoretical methods. The problem is set in context with the needs at several levels to produce noise characterisation from commercial aircraft powered by gas turbine engines. We describe very briefly the computational model (whilst referring the reader to the appropriate literature), and provide examples of noise predictions and comparisons with measured data, where possible. We focus on the issue of stochastic analysi...

  9. Neural networks for aircraft control

    Science.gov (United States)

    Linse, Dennis

    1990-01-01

    Current research in Artificial Neural Networks indicates that networks offer some potential advantages in adaptation and fault tolerance. This research is directed at determining the possible applicability of neural networks to aircraft control. The first application will be to aircraft trim. Neural network node characteristics, network topology and operation, neural network learning and example histories using neighboring optimal control with a neural net are discussed.

  10. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  11. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  12. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  13. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  14. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    , localisation services and many others. These technologies can be classified under the name of ubiquitous systems. The term Ubiquitous System dates back to 1991 when Mark Weiser at Xerox PARC Lab first referred to it in writing. He envisioned a future where computing technologies would have been melted...... in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  15. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  16. Defeating pharming attacks at the client-side

    OpenAIRE

    Gastellier-Prevost, Sophie; LAURENT, Maryline

    2011-01-01

    International audience With the deployment of "always-connected" broadband Internet access, personal networks are a privileged target for attackers and DNS-based corruption. Pharming attacks - an enhanced version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent login website, using DNS-based techniques that make the attack imperceptible to the end-user. In this paper, we define an advanced approach to alert the end-user in case of pharming attacks a...

  17. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  18. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  19. Optimization in fractional aircraft ownership

    Science.gov (United States)

    Septiani, R. D.; Pasaribu, H. M.; Soewono, E.; Fayalita, R. A.

    2012-05-01

    Fractional Aircraft Ownership is a new concept in flight ownership management system where each individual or corporation may own a fraction of an aircraft. In this system, the owners have privilege to schedule their flight according to their needs. Fractional management companies (FMC) manages all aspects of aircraft operations, including utilization of FMC's aircraft in combination of outsourced aircrafts. This gives the owners the right to enjoy the benefits of private aviations. However, FMC may have complicated business requirements that neither commercial airlines nor charter airlines faces. Here, optimization models are constructed to minimize the number of aircrafts in order to maximize the profit and to minimize the daily operating cost. In this paper, three kinds of demand scenarios are made to represent different flight operations from different types of fractional owners. The problems are formulated as an optimization of profit and a daily operational cost to find the optimum flight assignments satisfying the weekly and daily demand respectively from the owners. Numerical results are obtained by Genetic Algorithm method.

  20. Aircraft exhaust sulfur emissions

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R.C.; Anderson, M.R.; Miake-Lye, R.C.; Kolb, C.E. [Aerodyne Research, Inc., Billerica, MA (United States). Center for Chemical and Environmental Physics; Sorokin, A.A.; Buriko, Y.I. [Scientific Research Center `Ecolen`, Moscow (Russian Federation)

    1997-12-31

    The extent to which fuel sulfur is converted to SO{sub 3} during combustion and the subsequent turbine flow in supersonic and subsonic aircraft engines is estimated numerically. The analysis is based on: a flamelet model with non-equilibrium sulfur chemistry for the combustor, and a one-dimensional, two-stream model with finite rate chemical kinetics for the turbine. The results indicate that between 2% and 10% of the fuel sulfur is emitted as SO{sub 3}. It is also shown that, for a high fuel sulfur mass loading, conversion in the turbine is limited by the level of atomic oxygen at the combustor exit, leading to higher SO{sub 2} oxidation efficiency at lower fuel sulfur loadings. While SO{sub 2} and SO{sub 3} are the primary oxidation products, the model results further indicate H{sub 2}SO{sub 4} levels on the order of 0.1 ppm for supersonic expansions through a divergent nozzle. This source of fully oxidized S(6) (SO{sub 3} + H{sub 2}SO{sub 4}) exceeds previously calculated S(6) levels due to oxidation of SO{sub 2} by OH in the exhaust plume outside the engine nozzle. (author) 26 refs.

  1. Parabolic aircraft solidification experiments

    Science.gov (United States)

    Workman, Gary L. (Principal Investigator); Smith, Guy A.; OBrien, Susan

    1996-01-01

    A number of solidification experiments have been utilized throughout the Materials Processing in Space Program to provide an experimental environment which minimizes variables in solidification experiments. Two techniques of interest are directional solidification and isothermal casting. Because of the wide-spread use of these experimental techniques in space-based research, several MSAD experiments have been manifested for space flight. In addition to the microstructural analysis for interpretation of the experimental results from previous work with parabolic flights, it has become apparent that a better understanding of the phenomena occurring during solidification can be better understood if direct visualization of the solidification interface were possible. Our university has performed in several experimental studies such as this in recent years. The most recent was in visualizing the effect of convective flow phenomena on the KC-135 and prior to that were several successive contracts to perform directional solidification and isothermal casting experiments on the KC-135. Included in this work was the modification and utilization of the Convective Flow Analyzer (CFA), the Aircraft Isothermal Casting Furnace (ICF), and the Three-Zone Directional Solidification Furnace. These studies have contributed heavily to the mission of the Microgravity Science and Applications' Materials Science Program.

  2. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  3. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  4. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  5. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  6. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  7. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  8. Aircraft Cabin Environmental Quality Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Gundel, Lara; Kirchstetter, Thomas; Spears, Michael; Sullivan, Douglas

    2010-05-06

    The Indoor Environment Department at Lawrence Berkeley National Laboratory (LBNL) teamed with seven universities to participate in a Federal Aviation Administration (FAA) Center of Excellence (COE) for research on environmental quality in aircraft. This report describes research performed at LBNL on selecting and evaluating sensors for monitoring environmental quality in aircraft cabins, as part of Project 7 of the FAA's COE for Airliner Cabin Environmental Research (ACER)1 effort. This part of Project 7 links to the ozone, pesticide, and incident projects for data collection and monitoring and is a component of a broader research effort on sensors by ACER. Results from UCB and LBNL's concurrent research on ozone (ACER Project 1) are found in Weschler et al., 2007; Bhangar et al. 2008; Coleman et al., 2008 and Strom-Tejsen et al., 2008. LBNL's research on pesticides (ACER Project 2) in airliner cabins is described in Maddalena and McKone (2008). This report focused on the sensors needed for normal contaminants and conditions in aircraft. The results are intended to complement and coordinate with results from other ACER members who concentrated primarily on (a) sensors for chemical and biological pollutants that might be released intentionally in aircraft; (b) integration of sensor systems; and (c) optimal location of sensors within aircraft. The parameters and sensors were selected primarily to satisfy routine monitoring needs for contaminants and conditions that commonly occur in aircraft. However, such sensor systems can also be incorporated into research programs on environmental quality in aircraft cabins.

  9. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  10. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  11. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  12. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  13. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  14. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  15. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  16. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  17. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  18. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  19. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  20. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  1. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  3. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  5. Upset Simulation and Training Initiatives for U.S. Navy Commercial Derived Aircraft

    Science.gov (United States)

    Donaldson, Steven; Priest, James; Cunningham, Kevin; Foster, John V.

    2012-01-01

    Militarized versions of commercial platforms are growing in popularity due to many logistical benefits in the form of commercial off-the-shelf (COTS) parts, established production methods, and commonality for different certifications. Commercial data and best practices are often leveraged to reduce procurement and engineering development costs. While the developmental and cost reduction benefits are clear, these militarized aircraft are routinely operated in flight at significantly different conditions and in significantly different manners than for routine commercial flight. Therefore they are at a higher risk of flight envelope exceedance. This risk may lead to departure from controlled flight and/or aircraft loss1. Historically, the risk of departure from controlled flight for military aircraft has been mitigated by piloted simulation training and engineering analysis of typical aircraft response. High-agility military aircraft simulation databases are typically developed to include high angles of attack (AoA) and sideslip due to the dynamic nature of their missions and have been developed for many tactical configurations over the previous decades. These aircraft simulations allow for a more thorough understanding of the vehicle flight dynamics characteristics at high AoA and sideslip. In recent years, government sponsored research on transport airplane aerodynamic characteristics at high angles of attack has produced a growing understanding of stall/post-stall behavior. This research along with recent commercial airline training initiatives has resulted in improved understanding of simulator-based training requirements and simulator model fidelity.2-5 In addition, inflight training research over the past decade has produced a database of pilot performance and recurrency metrics6. Innovative solutions to aerodynamically model large commercial aircraft for upset conditions such as high AoA, high sideslip, and ballistic damage, as well as capability to accurately

  6. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  7. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  8. Analysis of aircraft maintenance models

    Directory of Open Access Journals (Sweden)

    Vlada S. Sokolović

    2011-10-01

    Full Text Available This paper addressed several organizational models of aircraft maintenance. All models presented so far have been in use in Air Forces, so that the advantages and disadvantages of different models are known. First it shows the current model of aircraft maintenance as well as its basic characteristics. Then the paper discusses two organizational models of aircraft maintenance with their advantages and disadvantages. The advantages and disadvantages of different models are analyzed based on the criteria of operational capabilities of military units. In addition to operational capabilities, the paper presents some other criteria which should be taken into account in the evaluation and selection of an optimal model of aircraft maintenance. Performing a qualitative analysis of some models may not be sufficient for evaluating the optimum choice for models of maintenance referring to the selected set of criteria from the scope of operational capabilities. In order to choose the optimum model, it is necessary to conduct a detailed economic and technical analysis of individual tactical model maintenance. A high-quality aircraft maintenance organization requires the highest state and army authorities to be involved. It is necessary to set clear objectives for all the elements of modern air force technical support programs based on the given evaluation criteria.

  9. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  10. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  11. MATE. Multi Aircraft Training Environment

    DEFF Research Database (Denmark)

    Hauland, G.; Bove, T.; Andersen, Henning Boje;

    2002-01-01

    in the MATE prototype was compared with the effects of traditional training that included the use of realaircraft. The experimental group (EXP) trained the pre-start checklist and the engine start checklist for the Saab 340 commuter aircraft in a MATE prototype. The control group (CTR) trained the same...... procedures using the aircraft (a/c) for training the prestart and a desktop computer tool (power plant trainer) for training engine starts. Performance on the pre-start checklist was compared in a formal checkout that took place in the a/c. Performance on the engine start procedure was compared......A medium fidelity and low cost training device for pilots, called the Multi Aircraft Training Environment (MATE), is developed to replace other low fidelity stand-alone training devices and integrate them into a flexible environment, primarily aimed attraining pilots in checklist procedures...

  12. Vision assisted aircraft lateral navigation

    Science.gov (United States)

    Mohideen, Mohamed Ibrahim; Ramegowda, Dinesh; Seiler, Peter

    2013-05-01

    Surface operation is currently one of the least technologically equipped phases of aircraft operation. The increased air traffic congestion necessitates more aircraft operations in degraded weather and at night. The traditional surface procedures worked well in most cases as airport surfaces have not been congested and airport layouts were less complex. Despite the best efforts of FAA and other safety agencies, runway incursions continue to occur frequently due to incorrect surface operation. Several studies conducted by FAA suggest that pilot induced error contributes significantly to runway incursions. Further, the report attributes pilot's lack of situational awareness - local (e.g., minimizing lateral deviation), global (e.g., traffic in the vicinity) and route (e.g., distance to next turn) - to the problem. An Enhanced Vision System (EVS) is one concept that is being considered to resolve these issues. These systems use on-board sensors to provide situational awareness under poor visibility conditions. In this paper, we propose the use of an Image processing based system to estimate the aircraft position and orientation relative to taxiway markings to use as lateral guidance aid. We estimate aircraft yaw angle and lateral offset from slope of the taxiway centerline and horizontal position of vanishing line. Unlike automotive applications, several cues such as aircraft maneuvers along assigned route with minimal deviations, clear ground markings, even taxiway surface, limited aircraft speed are available and enable us to implement significant algorithm optimizations. We present experimental results to show high precision navigation accuracy with sensitivity analysis with respect to camera mount, optics, and image processing error.

  13. Correction of static pressure on a research aircraft in accelerated flight using differential pressure measurements

    Directory of Open Access Journals (Sweden)

    A. R. Rodi

    2012-11-01

    Full Text Available A method is described that estimates the error in the static pressure measurement on an aircraft from differential pressure measurements on the hemispherical surface of a Rosemount model 858AJ air velocity probe mounted on a boom ahead of the aircraft. The theoretical predictions for how the pressure should vary over the surface of the hemisphere, involving an unknown sensitivity parameter, leads to a set of equations that can be solved for the unknowns – angle of attack, angle of sideslip, dynamic pressure and the error in static pressure – if the sensitivity factor can be determined. The sensitivity factor was determined on the University of Wyoming King Air research aircraft by comparisons with the error measured with a carefully designed sonde towed on connecting tubing behind the aircraft – a trailing cone – and the result was shown to have a precision of about ±10 Pa over a wide range of conditions, including various altitudes, power settings, and gear and flap extensions. Under accelerated flight conditions, geometric altitude data from a combined Global Navigation Satellite System (GNSS and inertial measurement unit (IMU system are used to estimate acceleration effects on the error, and the algorithm is shown to predict corrections to a precision of better than ±20 Pa under those conditions. Some limiting factors affecting the precision of static pressure measurement on a research aircraft are discussed.

  14. Future aircraft networks and schedules

    Science.gov (United States)

    Shu, Yan

    2011-07-01

    Because of the importance of air transportation scheduling, the emergence of small aircraft and the vision of future fuel-efficient aircraft, this thesis has focused on the study of aircraft scheduling and network design involving multiple types of aircraft and flight services. It develops models and solution algorithms for the schedule design problem and analyzes the computational results. First, based on the current development of small aircraft and on-demand flight services, this thesis expands a business model for integrating on-demand flight services with the traditional scheduled flight services. This thesis proposes a three-step approach to the design of aircraft schedules and networks from scratch under the model. In the first step, both a frequency assignment model for scheduled flights that incorporates a passenger path choice model and a frequency assignment model for on-demand flights that incorporates a passenger mode choice model are created. In the second step, a rough fleet assignment model that determines a set of flight legs, each of which is assigned an aircraft type and a rough departure time is constructed. In the third step, a timetable model that determines an exact departure time for each flight leg is developed. Based on the models proposed in the three steps, this thesis creates schedule design instances that involve almost all the major airports and markets in the United States. The instances of the frequency assignment model created in this thesis are large-scale non-convex mixed-integer programming problems, and this dissertation develops an overall network structure and proposes iterative algorithms for solving these instances. The instances of both the rough fleet assignment model and the timetable model created in this thesis are large-scale mixed-integer programming problems, and this dissertation develops subproblem schemes for solving these instances. Based on these solution algorithms, this dissertation also presents

  15. Introduction to unmanned aircraft systems

    CERN Document Server

    Marshall, Douglas M; Hottman, Stephen B; Shappee, Eric; Most, Michael Thomas

    2011-01-01

    Introduction to Unmanned Aircraft Systems is the editors' response to their unsuccessful search for suitable university-level textbooks on this subject. A collection of contributions from top experts, this book applies the depth of their expertise to identify and survey the fundamentals of unmanned aircraft system (UAS) operations. Written from a nonengineering civilian operational perspective, the book starts by detailing the history of UASs and then explores current technology and what is expected for the future. Covering all facets of UAS elements and operation-including an examination of s

  16. Composite components on commercial aircraft

    Science.gov (United States)

    Dexter, H. B.

    1980-01-01

    The paper considers the use of composite components in commercial aircraft. NASA has been active in sponsoring flight service programs with advanced composites for the last 10 years, with 2.5 million total composite component hours accumulated since 1970 on commercial transports and helicopters with no significant degradation in residual strength of composite components. Design, inspection, and maintenance procedures have been developed; a major NASA/US industry technology program has been developed to reduce fuel consumption of commercial transport aircraft through the use of advanced composites.

  17. Versatile Electric Propulsion Aircraft Testbed Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all-electric aircraft testbed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  18. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  19. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  20. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  1. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  2. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  3. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_160692.html Heart Attack Before 50 Ups Early Death Risk But healthy ... News) -- The risk of early death after a heart attack has lessened over the past 30 years among ...

  4. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  5. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  6. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  9. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  10. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  11. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  12. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  13. 75 FR 28504 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engines

    Science.gov (United States)

    2010-05-21

    ... Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engines AGENCY: Federal... 912 A series engine installed in various aircraft does not have an engine type certificate; instead, the engine is part of the aircraft type design. You may obtain further information by examining...

  14. 77 FR 1626 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2012-01-11

    ... Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration (FAA), DOT... various aircraft equipped with Rotax Aircraft Engines 912 A series engine. This AD results from mandatory... Rotax Aircraft Engines BRP has issued Alert Service Bulletin ASB- 912-059 and ASB-914-042...

  15. 76 FR 31465 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2011-06-01

    ... Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration...://www.rotax-aircraft-engines.com . You may review copies of the referenced service information at the... by examining the MCAI in the AD docket. Relevant Service Information Rotax Aircraft Engines...

  16. Residents' Annoyance Responses to Aircraft Noise Events

    OpenAIRE

    United States, National Aeronautics and Space Administration

    1983-01-01

    In a study conducted in the vicinity of Salt Lake City International Airport, community residents reported their annoyance with individual aircraft flyovers during rating sessions conducted in their homes. Annoyance ratings were obtained at different times of the day. Aircraft noise levels were measured, and other characteristics of the aircraft were noted by trained observers. Metrics commonly used for assessing aircraft noise were compared, but none performed significantly better than A-...

  17. The NASA Aircraft Energy Efficiency program

    Science.gov (United States)

    Klineberg, J. M.

    1979-01-01

    A review is provided of the goals, objectives, and recent progress in each of six aircraft energy efficiency programs aimed at improved propulsive, aerodynamic and structural efficiency for future transport aircraft. Attention is given to engine component improvement, an energy efficient turbofan engine, advanced turboprops, revolutionary gains in aerodynamic efficiency for aircraft of the late 1990s, laminar flow control, and composite primary aircraft structures.

  18. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  19. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  20. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  1. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  2. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  3. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  4. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  5. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  6. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  7. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  8. Policy and the evaluation of aircraft noise

    NARCIS (Netherlands)

    Kroesen, M.; Molin, E.J.E.; Van Wee, G.P.

    2010-01-01

    In this paper, we hypothesize and test the ideas that (1) people’s subjectivity in relation to aircraft noise is shaped by the policy discourse, (2) this results in a limited number of frames towards aircraft noise, (3) the frames inform people how to think and feel about aircraft noise and (4) the

  9. 19 CFR 122.37 - Precleared aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Precleared aircraft. 122.37 Section 122.37 Customs... AIR COMMERCE REGULATIONS Landing Requirements § 122.37 Precleared aircraft. (a) Application. This section applies when aircraft carrying crew, passengers and baggage, or merchandise which has...

  10. 14 CFR 252.13 - Small aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Small aircraft. 252.13 Section 252.13 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS SMOKING ABOARD AIRCRAFT § 252.13 Small aircraft. Air carriers shall prohibit smoking on...

  11. 43 CFR 423.41 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Aircraft. 423.41 Section 423.41 Public... Aircraft. (a) You must comply with any applicable Federal, State, and local laws, and with any additional... this part 423, with respect to aircraft landings, takeoffs, and operation on or in the proximity...

  12. 14 CFR 21.127 - Tests: aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Tests: aircraft. 21.127 Section 21.127 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT CERTIFICATION PROCEDURES FOR PRODUCTS AND PARTS Production Under Type Certificate Only § 21.127 Tests: aircraft. (a)...

  13. 50 CFR 27.34 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Aircraft. 27.34 Section 27.34 Wildlife and... WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Vehicles § 27.34 Aircraft. The unauthorized operation of aircraft, including sail planes, and hang gliders, at altitudes resulting...

  14. 36 CFR 13.1004 - Aircraft use.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Aircraft use. 13.1004 Section... § 13.1004 Aircraft use. In extraordinary cases where no reasonable alternative exists, local rural residents who permanently reside in the following exempted community(ies) may use aircraft for access...

  15. 48 CFR 908.7102 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7102 Aircraft. Acquisition of aircraft shall be in accordance with DOE-PMR 41 CFR 109-38.5205. ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Aircraft. 908.7102...

  16. 47 CFR 32.2113 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Aircraft. 32.2113 Section 32.2113... FOR TELECOMMUNICATIONS COMPANIES Instructions for Balance Sheet Accounts § 32.2113 Aircraft. This account shall include the original cost of aircraft and any associated equipment and furnishings...

  17. 14 CFR 91.117 - Aircraft speed.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft speed. 91.117 Section 91.117... speed. (a) Unless otherwise authorized by the Administrator, no person may operate an aircraft below 10... than the maximum speed prescribed in this section, the aircraft may be operated at that minimum speed....

  18. Fiber optic hardware for transport aircraft

    Science.gov (United States)

    White, John A.

    1994-10-01

    Aircraft manufacturers are developing fiber optic technology to exploit the benefits in system performance and manufacturing cost reduction. The fiber optic systems have high bandwidths and exceptional Electromagnetic Interference immunity that exceeds all new aircraft design requirements. Additionally, aircraft manufacturers have shown production readiness of fiber optic systems and design feasibility.

  19. HUMAN FACTOR IMPACT IN MILITARY AIRCRAFT MAINTENANCE

    OpenAIRE

    MARINKOVIC SRBOLJUB J.; DRENOVAC ALEKSANDAR Z.

    2015-01-01

    Aircraft maintenance, as a specific field of military materiel maintenance, is characterized by high reliability standards, based on regulations and technical standards. A system approach to maintenance represents the key element of maintenance quality, while aircraft maintenance staff has a crucial influence on the final outcome of aircraft maintenance.

  20. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  1. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  2. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  3. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    . Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...

  4. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  5. Human Response to Aircraft Noise

    NARCIS (Netherlands)

    Kroesen, M.

    2011-01-01

    How can it be that one person is extremely annoyed by the sounds of aircrafts, while his neighbour claims not to be bothered at all? The present thesis attempts to explain this observation by applying a range of quantitative methods to field data gathered among residents living near large airports.

  6. Aircraft Simulators and Pilot Training.

    Science.gov (United States)

    Caro, Paul W.

    Flight simulators are built as realistically as possible, presumably to enhance their training value. Yet, their training value is determined by the way they are used. Traditionally, simulators have been less important for training than have aircraft, but they are currently emerging as primary pilot training vehicles. This new emphasis is an…

  7. Aircraft Lightning Electromagnetic Environment Measurement

    Science.gov (United States)

    Ely, Jay J.; Nguyen, Truong X.; Szatkowski, George N.

    2011-01-01

    This paper outlines a NASA project plan for demonstrating a prototype lightning strike measurement system that is suitable for installation onto research aircraft that already operate in thunderstorms. This work builds upon past data from the NASA F106, FAA CV-580, and Transall C-180 flight projects, SAE ARP5412, and the European ILDAS Program. The primary focus is to capture airframe current waveforms during attachment, but may also consider pre and post-attachment current, electric field, and radiated field phenomena. New sensor technologies are being developed for this system, including a fiber-optic Faraday polarization sensor that measures lightning current waveforms from DC to over several Megahertz, and has dynamic range covering hundreds-of-volts to tens-of-thousands-of-volts. A study of the electromagnetic emission spectrum of lightning (including radio wave, microwave, optical, X-Rays and Gamma-Rays), and a compilation of aircraft transfer-function data (including composite aircraft) are included, to aid in the development of other new lightning environment sensors, their placement on-board research aircraft, and triggering of the onboard instrumentation system. The instrumentation system will leverage recent advances in high-speed, high dynamic range, deep memory data acquisition equipment, and fiber-optic interconnect.

  8. Survival analysis of aging aircraft

    Science.gov (United States)

    Benavides, Samuel

    This study pushes systems engineering of aging aircraft beyond the boundaries of empirical and deterministic modeling by making a sharp break with the traditional laboratory-derived corrosion prediction algorithms that have shrouded real-world failures of aircraft structure. At the heart of this problem is the aeronautical industry's inability to be forthcoming in an accurate model that predicts corrosion failures in aircraft in spite of advances in corrosion algorithms or improvements in simulation and modeling. The struggle to develop accurate corrosion probabilistic models stems from a multitude of real-world interacting variables that synergistically influence corrosion in convoluted and complex ways. This dissertation, in essence, offers a statistical framework for the analysis of structural airframe corrosion failure by utilizing real-world data while considering the effects of interacting corrosion variables. This study injects realism into corrosion failures of aging aircraft systems by accomplishing four major goals related to the conceptual and methodological framework of corrosion modeling. First, this work connects corrosion modeling from the traditional, laboratory derived algorithms to corrosion failures in actual operating aircraft. This work augments physics-based modeling by examining the many confounding and interacting variables, such as environmental, geographical and operational, that impact failure of airframe structure. Examined through the lens of censored failure data from aircraft flying in a maritime environment, this study enhances the understanding between the triad of the theoretical, laboratory and real-world corrosion. Secondly, this study explores the importation and successful application of an advanced biomedical statistical tool---survival analysis---to model censored corrosion failure data. This well-grounded statistical methodology is inverted from a methodology that analyzes survival to one that examines failures. Third, this

  9. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  10. Turbofan blade stresses induced by the flow distortion of a VTOL inlet at high angles of attack

    Science.gov (United States)

    Williams, R. C.; Diedrich, J. H.; Shaw, R. J.

    1983-01-01

    A 51-cm-diameter turbofan with a tilt-nacelle VTOL inlet was tested in the Lewis Research Center's 9- by 15-Ft Low Speed Wind Tunnel at velocities up to 72 m/s and angles of attack up to 120 deg. Fan-blade vibratory stress levels were investigated over a full aircraft operating range. These stresses were due to inlet air flow distortion resulting from (1) internal flow separation in the inlet, and (2) ingestion of the exterior nacelle wake. Stress levels are presented, along with an estimated safe operating envelope, based on infinite blade fatigue life.

  11. Laser Powered Aircraft Takes Flight

    Science.gov (United States)

    2003-01-01

    A team of NASA researchers from Marshall Space Flight Center (MSFC) and Dryden Flight Research center have proven that beamed light can be used to power an aircraft, a first-in-the-world accomplishment to the best of their knowledge. Using an experimental custom built radio-controlled model aircraft, the team has demonstrated a system that beams enough light energy from the ground to power the propeller of an aircraft and sustain it in flight. Special photovoltaic arrays on the plane, similar to solar cells, receive the light energy and convert it to electric current to drive the propeller motor. In a series of indoor flights this week at MSFC, a lightweight custom built laser beam was aimed at the airplane `s solar panels. The laser tracks the plane, maintaining power on its cells until the end of the flight when the laser is turned off and the airplane glides to a landing. The laser source demonstration represents the capability to beam more power to a plane so that it can reach higher altitudes and have a greater flight range without having to carry fuel or batteries, enabling an indefinite flight time. The demonstration was a collaborative effort between the Dryden Center at Edward's, California, where the aircraft was designed and built, and MSFC, where integration and testing of the laser and photovoltaic cells was done. Laser power beaming is a promising technology for consideration in new aircraft design and operation, and supports NASA's goals in the development of revolutionary aerospace technologies. Photographed with their invention are (from left to right): David Bushman and Tony Frackowiak, both of Dryden; and MSFC's Robert Burdine.

  12. Factors influencing aircraft ground handling performance

    Science.gov (United States)

    Yager, T. J.

    1983-01-01

    Problems associated with aircraft ground handling operations on wet runways are discussed and major factors which influence tire/runway braking and cornering traction capability are identified including runway characteristics, tire hydroplaning, brake system anomalies, and pilot inputs. Research results from tests with instrumented ground vehicles and aircraft, and aircraft wet runway accident investigation are summarized to indicate the effects of different aircraft, tire, and runway parameters. Several promising means are described for improving tire/runway water drainage capability, brake system efficiency, and pilot training to help optimize aircraft traction performance on wet runways.

  13. Survey of Protections from Buffer-Overflow Attacks

    OpenAIRE

    Krerk Piromsopa; Richard J Enbody

    2011-01-01

    Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to provide protection from buffer-overflow attacks have been proposed by a number of researchers. They all aim to either prevent or protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more sophisticated. Given the maturity of field and the fact that some solutions now exist that can prevent most buffer-overflow attacks, we believe it is time to survey these sch...

  14. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  15. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  16. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  18. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  19. Attack Graph-Based Risk Assessment and Optimisation Approach

    Directory of Open Access Journals (Sweden)

    Mohammed Alhomidi

    2014-06-01

    Full Text Available Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA. Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimization solutions a range of solutions can be presented to a user of the methodology.

  20. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  1. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  2. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  3. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  4. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  5. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  6. Cardiogenic embolism producing crescendo transient ischemic attacks.

    Science.gov (United States)

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  7. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  8. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  9. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  10. Aircraft noise and birth weight

    Energy Technology Data Exchange (ETDEWEB)

    Knipschild, P.; Meijer, H.; Salle, H.

    1981-05-01

    Data from six infant welfare centres in the vicinity of Amsterdam airport were analysed. Birth weights of 902 infants were related to aircraft noise levels to which the mother was exposed in pregnancy. The analysis was restricted to deliveries in hospital, single births and mothers aged 20-34 years. In high noise areas the mean birth weight was 69 g lower than in low noise areas. Of the infants in high noise areas 24% had a birth weight less than 3000 g, compared with 18% in low noise areas. In the analysis the effect of sex of the infant, birth order and to some extent socio-economic status were taken into account. An effect of smoking seemed unlikely. The results, together with existing knowledge, give some suggestion that aircraft noise can decrease birth weight.

  11. Perception of aircraft Deviation Cues

    Science.gov (United States)

    Martin, Lynne; Azuma, Ronald; Fox, Jason; Verma, Savita; Lozito, Sandra

    2005-01-01

    To begin to address the need for new displays, required by a future airspace concept to support new roles that will be assigned to flight crews, a study of potentially informative display cues was undertaken. Two cues were tested on a simple plan display - aircraft trajectory and flight corridor. Of particular interest was the speed and accuracy with which participants could detect an aircraft deviating outside its flight corridor. Presence of the trajectory cue significantly reduced participant reaction time to a deviation while the flight corridor cue did not. Although non-significant, the flight corridor cue seemed to have a relationship with the accuracy of participants judgments rather than their speed. As this is the second of a series of studies, these issues will be addressed further in future studies.

  12. Aircraft systems design methodology and dispatch reliability prediction

    OpenAIRE

    Bineid, Mansour

    2005-01-01

    Aircraft despatch reliability was the main subject of this research in the wider content of aircraft reliability. The factors effecting dispatch reliability, aircraft delay, causes of aircraft delays, and aircraft delay costs and magnitudes were examined. Delay cost elements and aircraft delay scenarios were also studied. It concluded that aircraft dispatch reliability is affected by technical and non-technical factors, and that the former are under the designer's control. It showed that ...

  13. Challenges of aircraft design integration

    OpenAIRE

    Kafyeke, F.; Abdo, M.; Pepin, F; Piperni, P.; Laurendeau, E.

    2007-01-01

    The design of a modern airplane brings together many disciplines: structures, aerodynamics, controls, systems, propulsion with complex interdependencies and many variables. Recent aircraft programs, such as Bombardier's Continental Jet program use participants located around the world and selected for their cost, quality and delivery capability. These participants share the risk on the program and must therefore be fully implicated in the design. A big challenge is to provide information on c...

  14. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  15. Use of the Panic Attack Questionnaire-IV to assess non-clinical panic attacks and limited symptom panic attacks in student and community samples.

    Science.gov (United States)

    Norton, Peter J; Zvolensky, Michael J; Bonn-Miller, Marcel O; Cox, Brian J; Norton, G Ron

    2008-10-01

    Since its development in the mid-1980s, the Panic Attack Questionnaire (PAQ) has been one of the more, if not the most, commonly used self-report tools for assessing panic attacks. The usage of the instrument, however, has come amid potential concerns that instructions and descriptions may lead to an over-estimate of the prevalence of panic attacks. Furthermore, the instrument has not been revised since 1992, despite changes in DSM-IV criteria and more recent developments in the understanding of panic attacks. As a result, this paper describes a revision of the PAQ to improve the instruction and descriptive set, and to fully assess features of panic derived from recent conceptualizations. Students meeting DSM-IV panic attack criteria and those endorsing panic attacks, but not meeting criteria, showed few differences with the exception that those not meeting DSM-IV criteria typically reported a longer onset-to-peak intensity time than did Panickers. Results were cross-validated and extended using an independent Community Sample. A full descriptive phenomenology of panic attacks is described, and future directions for studying panic attacks using the PAQ are presented. PMID:18243647

  16. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  17. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  18. Stealth-MITM DoS Attacks on Secure Channels

    CERN Document Server

    Herzberg, Amir

    2009-01-01

    We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and p...

  19. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

    Institute of Scientific and Technical Information of China (English)

    Ya-Fei Yang; Qin-Yuan Feng; Yen(Lindsay)Sun; Ya-Fei Dai

    2009-01-01

    Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as an important but challenging problem.Many unfair rating detection approaches have been developed and evaluated against simple attack models.However,the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems.To solve this problem,we design and launch a rating challenge to coHect anfair rating data from real human users.In order to broaden the scope of the data collection,we also develop a comprehensive signal-based unfair rating detection system.Based on the analysis of real attack data,we discover important features in unfair ratings,build attack models,and develop an unfair rating generator.The models and generator developed in this paper can be directly used to test current rating aggregation systems,as well as to assist the design of future rating systems.

  20. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  1. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    Science.gov (United States)

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  2. A Synthesis of Hybrid RANS/LES CFD Results for F-16XL Aircraft Aerodynamics

    Science.gov (United States)

    Luckring, James M.; Park, Michael A.; Hitzel, Stephan M.; Jirasek, Adam; Lofthouse, Andrew J.; Morton, Scott A.; McDaniel, David R.; Rizzi, Arthur M.

    2015-01-01

    A synthesis is presented of recent numerical predictions for the F-16XL aircraft flow fields and aerodynamics. The computational results were all performed with hybrid RANS/LES formulations, with an emphasis on unsteady flows and subsequent aerodynamics, and results from five computational methods are included. The work was focused on one particular low-speed, high angle-of-attack flight test condition, and comparisons against flight-test data are included. This work represents the third coordinated effort using the F-16XL aircraft, and a unique flight-test data set, to advance our knowledge of slender airframe aerodynamics as well as our capability for predicting these aerodynamics with advanced CFD formulations. The prior efforts were identified as Cranked Arrow Wing Aerodynamics Project International, with the acronyms CAWAPI and CAWAPI-2. All information in this paper is in the public domain.

  3. Factors affecting handling qualities of a lift-fan aircraft during steep terminal area approaches

    Science.gov (United States)

    Gerdes, R. M.; Hynes, C. S.

    1975-01-01

    The XV-5B lift-fan aircraft was used to explore the factors affecting handling qualities in the terminal area. A 10 deg ILS approach task was selected to explore these problems. Interception of the glide slope at 457.2 m, glide slope tracking, deceleration along the glide slope to a spot hover were considered. Variations in airplane deck angle, deceleration schedule, and powered-lift management were studied. The overall descent performance envelope was identified on the basis of fan stall, maximum comfortable descent rate, and controllability restrictions. The collective-lift stick provided precise glide slope tracking capability. The pilot preferred a deck-parallel attitude for which he used powered lift to control glide slope and pitch attitude to keep the angle of attack near zero. Workload was reduced when the deceleration schedule was delayed until the aircraft was well established on the glide slope, since thrust vector changes induced flight path disturbances.

  4. Wind-tunnel investigation of surface-pressure fluctuations associated with aircraft buffet

    Science.gov (United States)

    Riddle, D. W.

    1975-01-01

    Fluctuating pressures and forces that cause aircraft buffeting have been measured on a semispan rigid-wing model of a typical variable-sweep fighter-type aircraft at transonic speeds. The rms spectral and spatial correlation characteristics of wing fluctuating pressures, fluctuating pressure summations, and structural responses are presented and discussed for a Mach number of 0.85, wing sweep angles of 26 and 72 deg, and angles of attack up to 12 deg. The fluctuating pressure characteristics beneath wing shock waves and leading-edge vortices and in regions of attached and separated flows are presented. Results indicate that: (1) the mean and fluctuating static pressure characteristics are related; (2) a circulation oscillation exists for attached flow conditions below buffet onset; and (3) a significant coupling exists between the wing shock-wave oscillation and the wing first torsional mode when shock-induced separation is present.

  5. PREDICTION OF AIRCRAFT NOISE LEVELS

    Science.gov (United States)

    Clark, B. J.

    1994-01-01

    Methods developed at the NASA Lewis Research Center for predicting the noise contributions from various aircraft noise sources have been incorporated into a computer program for predicting aircraft noise levels either in flight or in ground test. The noise sources accounted for include fan inlet and exhaust, jet, flap (for powered lift), core (combustor), turbine, and airframe. Noise propagation corrections are available in the program for atmospheric attenuation, ground reflections, extra ground attenuation, and shielding. The capacity to solve the geometrical relationships between an aircraft in flight and an observer on the ground has been included in the program to make it useful in evaluating noise estimates and footprints for various proposed engine installations. The program contains two main routines for employing the noise prediction routines. The first main routine consists of a procedure to calculate at various observer stations the time history of the noise from an aircraft flying at a specified set of speeds, orientations, and space coordinates. The various components of the noise are computed by the program. For each individual source, the noise levels are free field with no corrections for propagation losses other than spherical divergence. The total spectra may then be corrected for the usual effects of atmospheric attenuation, extra ground attenuation, ground reflection, and aircraft shielding. Next, the corresponding values of overall sound pressure level, perceived noise level, and tone-weighted perceived noise level are calculated. From the time history at each point, true effective perceived noise levels are calculated. Thus, values of effective perceived noise levels, maximum perceived noise levels, and tone-weighted perceived noise levels are found for a grid of specified points on the ground. The second main routine is designed to give the usual format of one-third octave sound pressure level values at a fixed radius for a number of user

  6. Output feedback non-linear decoupled control synthesis and observer design for manoeuvring aircraft

    Science.gov (United States)

    Singh, S. N.; Schy, A. A.

    1980-01-01

    A study of the applicability of nonlinear decoupling theory to the design of control systems using output feedback for maneuvering aircraft is presented. The response variables chosen for decoupled control were angular velocity components along roll, pitch, and yaw axes, angle of attack (p), and angle of sideslip, using aileron, rudder, and elevator controls. An observer design for a class of nonlinear systems was presented and this method was used to estimate angle of attack and sideslip; an approximate observer was obtained by neglecting derivatives of p and aileron deflection angles and it was used in a simulation study. A simulation study showed that precise rapid combined lateral and longitudinal maneuvers can be performed; it was also demonstrated that a bank-angle-command outer loop could be designed for precise bank angles changes and simultaneous large lift maneuvers.

  7. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-07-01

    Full Text Available Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.

  8. AIRTV: Broadband Direct to Aircraft

    Science.gov (United States)

    Sorbello, R.; Stone, R.; Bennett, S. B.; Bertenyi, E.

    2002-01-01

    Airlines have been continuously upgrading their wide-body, long-haul aircraft with IFE (in-flight entertainment) systems that can support from 12 to 24 channels of video entertainment as well as provide the infrastructure to enable in-seat delivery of email and internet services. This is a direct consequence of increased passenger demands for improved in-flight services along with the expectations that broadband delivery systems capable of providing live entertainment (news, sports, financial information, etc.) and high speed data delivery will soon be available. The recent events of Sept. 11 have slowed the airline's upgrade of their IFE systems, but have also highlighted the compelling need for broadband aeronautical delivery systems to include operational and safety information. Despite the impact of these events, it is estimated that by 2005 more than 3000 long haul aircraft (servicing approximately 1 billion passengers annually) will be fully equipped with modern IFE systems. Current aircraft data delivery systems, which use either Inmarsat or NATS, are lacking in bandwidth and consequently are unsuitable to satisfy passenger demands for broadband email/internet services or the airlines' burgeoning data requirements. Present live video delivery services are limited to regional coverage and are not readily expandable to global or multiregional service. Faced with a compelling market demand for high data transport to aircraft, AirTV has been developing a broadband delivery system that will meet both passengers' and airlines' needs. AirTV is a global content delivery system designed to provide a range of video programming and data services to commercial airlines. When AirTV is operational in 2004, it will provide a broadband connection directly to the aircraft, delivering live video entertainment, internet/email service and essential operational and safety data. The system has been designed to provide seamless global service to all airline routes except for those

  9. The Impact of Black-Hole Attack on ZRP Protocol

    Directory of Open Access Journals (Sweden)

    CHAHIDI Badr

    2016-07-01

    Full Text Available lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol. In this attack a malicious node is placed between two or more nodes in order to drop data. The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path. In this study, NS2 is used to assess the impact of the attack on ZRP. Two metrics measure, namely the packet delivered ratio and end to end delay.

  10. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  11. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  12. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  13. Agoraphobic behavior and panic attack: a study of male twins.

    Science.gov (United States)

    Tsuang, Ming; Domschke, Katharina; Jerskey, Beth A; Lyons, Michael J

    2004-01-01

    We used data from 3372 pairs of male twins from the Vietnam Era Twin Registry to examine comorbidity and familial influences on the frequently observed association between agoraphobic behavior and panic. Due to low prevalence of DSM-III-R-defined panic disorder, we also examined subjects who had experienced at least one panic attack during their lives. Agoraphobic behavior among individuals with a history of panic attacks showed familial aggregation (odds ratio = 5.7; P = .018 ). Probands with panic attacks and agoraphobic behavior and their co-twins had higher risk of major depression than probands without agoraphobic avoidance and their co-twins (P = .01). Groups did not differ for alcohol dependence or antisocial personality. Agoraphobic behavior associated with panic attack is familial and associated with comorbid major depression. Agoraphobia following panic attack does not seem to reflect severity as agoraphobic behavior in the proband was unrelated to risk of panic attacks in the co-twin. PMID:15474853

  14. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  15. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  16. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  17. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  18. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  19. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  20. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  1. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  2. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  3. 78 FR 65554 - Exhaust Emission Standards for New Aircraft Turbine Engines and Identification Plate for Aircraft...

    Science.gov (United States)

    2013-11-01

    ... Aircraft Turbine Engines and Identification Plate for Aircraft Engines Correction In rule document 2013... for Subsonic Engines'', in the third column, in the last row, the entry ``rO > 26.7'' is corrected...

  4. 14 CFR 91.111 - Operating near other aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Operating near other aircraft. 91.111... § 91.111 Operating near other aircraft. (a) No person may operate an aircraft so close to another aircraft as to create a collision hazard. (b) No person may operate an aircraft in formation flight...

  5. Choice of Aircraft Size - Explanations and Implications

    OpenAIRE

    Givoni, Moshe; Rietveld, Piet

    2006-01-01

    To keep load factors high while offering high frequency service, airlines tend to reduce the size of the aircraft they use. At many of the world’s largest airports there are fewer than 100 passengers per air transport movement, although congestion and delays are growing. Furthermore, demand for air transport is predicted to continue growing but aircraft size is not. This paper aims to investigate and explain this phenomenon, the choice of relatively small aircraft. It seems that this choice i...

  6. Neural Networks Based Aircraft Fault Tolerant Control

    OpenAIRE

    Zhong, Lunlong; Mora-Camino, Félix

    2012-01-01

    The purpose of this communication is to deal with the case in which an aerodynamic actuator failure occurs to an aircraft while it has to perform guidance maneuvers. The problem considered deals with the reallocation of redundant actuators to perform the required maneuvers and maintain the structural integrity of the aircraft. A Nonlinear Inverse Control technique is used to generate online nominal moment along the three axis of the aircraft. Then, taking into account all material and structu...

  7. Profiling cyber attackers using case-based reasoning

    OpenAIRE

    Kapetanakis, Stelios; Filippoupolitis, Avgoustinos; Loukas, George; Al Murayziq, Tariq Saad

    2014-01-01

    Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the at- tack's characteristics rather than the attacker's. The latter is a challenging prob- lem, as relevant data cannot easily be found. We argue that the cyber traces left by a human attacker during an intrusion attempt can help towards building a profile of the particular person...

  8. Preparedness for mass-casualty attacks on public transportation

    OpenAIRE

    Holgersson, Annelie

    2016-01-01

    Background: Public transportation constitutes a vulnerable sector in modern day society with a high probability of generating mass casualties if attacked. By preparing for mass-casualty attacks (MCAs), response can become more effective and public transportation can become a less rewarding target. However, preparedness for attacks, much like response, implies resource constraints, and this dissertation pinpoints some major dilemmas that inhibit achieving preparedness for MCAs on public transp...

  9. Non-harmful insertion of data mimicking computer network attacks

    Science.gov (United States)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  10. The nocturnal panic attacks: polysomnographic features and comorbidities

    OpenAIRE

    Li, Yan-Lin; CHEN Guo-yan; LEI Ge-sheng; Yang, Ting; Chang-jun SU

    2013-01-01

    Background Panic disorder refers to the repeated or unexpected anxiety or panic attacks. It makes patients feel extreme pain. Although the episodes of most patients with panic disorder happen at daytime, the nocturnal panic attacks (NPA) are quite common. Paients pay more attention to NPA. Insomnia is more serious in patients with NPA than those patients with panic disorder attack at daytime. Many patients may occur anxiety and avoidance behavior after NPA. Patients are often afraid of sleep...

  11. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    OpenAIRE

    Mohammad Abdus Salam; Nayana Halemani

    2016-01-01

    Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and m...

  12. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  13. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  14. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  15. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

    OpenAIRE

    Kordy, Barbara; Kordy, Piotr; Mauw, Sjouke; Schweitzer, Patrick

    2013-01-01

    The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack-defense trees.

  16. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  17. Trojan Horse attacks on Quantum Key Distribution systems

    OpenAIRE

    Gisin, Nicolas; Fasel, Sylvain; Kraus, Barbara; Zbinden, Hugo; Ribordy, Grégoire

    2005-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to th...

  18. HProxy: Client-side detection of SSL stripping attacks

    OpenAIRE

    Nikiforakis, Nick; Younan, Yves; Joosen, Wouter

    2010-01-01

    In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently,a new attack against the common usage of SSL surfaced, SSL stripping. The attack is based on the fact that users almost never request secure pages explicitly but rather rely on the servers, to redirect them to the appropriate secure version of a particular website. An attacker, after becoming man-in-the-middle can suppress such messages and p...

  19. AIRTV: Broadband Direct to Aircraft

    Science.gov (United States)

    Sorbello, R.; Stone, R.; Bennett, S. B.; Bertenyi, E.

    2002-01-01

    Airlines have been continuously upgrading their wide-body, long-haul aircraft with IFE (in-flight entertainment) systems that can support from 12 to 24 channels of video entertainment as well as provide the infrastructure to enable in-seat delivery of email and internet services. This is a direct consequence of increased passenger demands for improved in-flight services along with the expectations that broadband delivery systems capable of providing live entertainment (news, sports, financial information, etc.) and high speed data delivery will soon be available. The recent events of Sept. 11 have slowed the airline's upgrade of their IFE systems, but have also highlighted the compelling need for broadband aeronautical delivery systems to include operational and safety information. Despite the impact of these events, it is estimated that by 2005 more than 3000 long haul aircraft (servicing approximately 1 billion passengers annually) will be fully equipped with modern IFE systems. Current aircraft data delivery systems, which use either Inmarsat or NATS, are lacking in bandwidth and consequently are unsuitable to satisfy passenger demands for broadband email/internet services or the airlines' burgeoning data requirements. Present live video delivery services are limited to regional coverage and are not readily expandable to global or multiregional service. Faced with a compelling market demand for high data transport to aircraft, AirTV has been developing a broadband delivery system that will meet both passengers' and airlines' needs. AirTV is a global content delivery system designed to provide a range of video programming and data services to commercial airlines. When AirTV is operational in 2004, it will provide a broadband connection directly to the aircraft, delivering live video entertainment, internet/email service and essential operational and safety data. The system has been designed to provide seamless global service to all airline routes except for those

  20. Impact of aircraft systems within aircraft operation: A MEA trajectory optimisation study

    OpenAIRE

    Seresinhe, R.

    2014-01-01

    Air transport has been a key component of the socio-economic globalisation. The ever increasing demand for air travel and air transport is a testament to the success of the aircraft. But this growing demand presents many challenges. One of which is the environmental impact due to aviation. The scope of the environmental impact of aircraft can be discussed from many viewpoints. This research focuses on the environmental impact due to aircraft operation. Aircraft operation causes...

  1. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  2. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  3. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  4. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  5. On the offensive against brain attack

    Energy Technology Data Exchange (ETDEWEB)

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  6. [Cerebral infarction and transient ischemic attack].

    Science.gov (United States)

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  7. Securing Oracle Database from Search Engines Attack

    Directory of Open Access Journals (Sweden)

    N. M. A. Ayad

    2012-09-01

    Full Text Available Database security has recently become A victim of misused search engines. This can be accomplished simply by searching for a URL containing the name of the vulnerable web page or application. Oracle ships several sample web applications along with its databases. The security holes in these applications allow a web user to exploit SQL Injection to submit arbitrary SQL statements to the database. These applications are enabled by default, listening on port 7777, and known to be vulnerable to SQL Injection. This paper focuses on exploiting search engines to attack oracle database using SQL injection technique from web applications, when a website is vulnerable by SQL injection and this side is connected by oracle database vulnerable by SQL injection.

  8. An attack on hash function HAVAL-128

    Institute of Scientific and Technical Information of China (English)

    WANG Xiaoyun; FENG Dengguo; YU Xiuyuan

    2005-01-01

    In this paper, we give a fast attack against hash function-HAVAL-128.HAVAL was presented by Y. L. Zheng et al. at Auscrypto'92. It can be processed in 3,4 or 5 passes, and produces 128, 160, 192, or 224-bit fingerprint. We break the HAVAL with 128-bit fingerprint. The conclusion is that, given any 1024-bit message m, we just make some modifications about m, and the modified message m can collide with another message m' only with probability 1/27, where m' = m +△m, in which △m is a fixed difference selected in advance. In addition, two collision examples for HAVAL-128 are given in this paper.

  9. Policy and the evaluation of aircraft noise

    OpenAIRE

    Kroesen, M.; Molin, E.J.E.; Van Wee, G.P.

    2010-01-01

    In this paper, we hypothesize and test the ideas that (1) people’s subjectivity in relation to aircraft noise is shaped by the policy discourse, (2) this results in a limited number of frames towards aircraft noise, (3) the frames inform people how to think and feel about aircraft noise and (4) the distribution of the frames in the population is dependent on structural variables related to the individual. To reveal subjects’ frames of aircraft noise a latent class model is estimated based on ...

  10. Research on Emerging and Descending Aircraft Noise

    Directory of Open Access Journals (Sweden)

    Monika Bartkevičiūtė

    2013-12-01

    Full Text Available Along with an increase in the aircraft engine power and growth in air traffic, noise level at airports and their surrounding environs significantly increases. Aircraft noise is high level noise spreading within large radius and intensively irritating the human body. Air transport is one of the main sources of noise having a particularly strong negative impact on the environment. The article deals with activities and noises taking place in the largest nationwide Vilnius International Airport.The level of noise and its dispersion was evaluated conducting research on the noise generated by emerging and descending aircrafts in National Vilnius Airport. Investigation was carried out at 2 measuring points located in a residential area. There are different types of aircrafts causing different sound levels. It has been estimated the largest exceedances that occur when an aircraft is approaching. In this case, the noisiest types of aircrafts are B733, B738 and AT72. The sound level varies from 70 to 85 dBA. The quietest aircrafts are RJ1H and F70. When taking off, the equivalent of the maximum sound level value of these aircrafts does not exceed the authorized limits. The paper describes the causes of noise in aircrafts, the sources of origin and the impact of noise on humans and the environment.Article in Lithuanian

  11. Aircraft Wiring Support Equipment Integration Laboratory (AWSEIL)

    Data.gov (United States)

    Federal Laboratory Consortium — Purpose: The Aircraft Wiring Support Equipment Integration Laboratory (AWSEIL) provides a variety of research, design engineering and prototype fabrication services...

  12. Challenges for the aircraft structural integrity program

    Science.gov (United States)

    Lincoln, John W.

    1994-01-01

    Thirty-six years ago the United States Air Force established the USAF Aircraft Structural Integrity Program (ASIP) because flight safety had been degraded by fatigue failures of operational aircraft. This initial program evolved, but has been stable since the issuance of MIL-STD-1530A in 1975. Today, the program faces new challenges because of a need to maintain aircraft longer in an environment of reduced funding levels. Also, there is increased pressure to reduce cost of the acquisition of new aircraft. It is the purpose of this paper to discuss the challenges for the ASIP and identify the changes in the program that will meet these challenges in the future.

  13. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  14. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  15. A Survey on Detecting Wormhole Attack in Manet

    Directory of Open Access Journals (Sweden)

    Bipin N. Patel

    2014-03-01

    Full Text Available A Mobile Ad Hoc Network (MANET is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. We have presented several existing techniques to detect wormhole attack in mobile ad hoc networks.

  16. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  17. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  18. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  19. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  20. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  1. An Improved Model of Attack Probability Prediction System

    Institute of Scientific and Technical Information of China (English)

    WANG Hui; LIU Shufen; ZHANG Xinjia

    2006-01-01

    This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.

  2. Fake BTS Attacks of GSM System on Software Radio Platform

    OpenAIRE

    Yubo Song; Kan Zhou; Xi Chen

    2012-01-01

    The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is...

  3. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  4. PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS

    Directory of Open Access Journals (Sweden)

    Ravinuthala Sruthi

    2013-06-01

    Full Text Available DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.

  5. Defending Wormhole Attack in Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nisha S.Raote

    2011-09-01

    Full Text Available The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.

  6. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  7. User Authentication with Provable Security against Online Dictionary Attacks

    Directory of Open Access Journals (Sweden)

    Yongzhong He

    2009-05-01

    Full Text Available Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT, some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decision function is presented, based on which RTT authentication schemes are constructed and shown to be secure against all the known online dictionary attacks. After formally modeling of the adversary, the static and dynamic security of the authentication schemes are proved formally.

  8. Prevention Of WormholeAttacks In Geographic Routing Protocol

    Directory of Open Access Journals (Sweden)

    E.Poornima,

    2011-01-01

    Full Text Available As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSRprotocol and analysis and simulations are performed in network simulator (NS-2.

  9. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  10. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  11. 75 FR 50865 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engines

    Science.gov (United States)

    2010-08-18

    ... Equipped With Rotax Aircraft Engines 912 A Series Engines AGENCY: Federal Aviation Administration (FAA... 912 A series engine installed in various aircraft does not have an engine type certificate; instead, the engine is part of the aircraft type design. Comments We gave the public the opportunity...

  12. 75 FR 70098 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engines

    Science.gov (United States)

    2010-11-17

    ... Equipped With Rotax Aircraft Engines 912 A Series Engines AGENCY: Federal Aviation Administration (FAA... Aircraft Engines 912 A series engine with a crankcase assembly S/N up to and including S/N 27811, certificated in any category: ] Type certificate holder Aircraft model Engine model Aeromot-Industria...

  13. 75 FR 32315 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engines

    Science.gov (United States)

    2010-06-08

    ... Equipped With Rotax Aircraft Engines 912 A Series Engines AGENCY: Federal Aviation Administration (FAA... certificated in the United States. However, the Model 912 A series engine installed in various aircraft does not have an engine type certificate; instead, the engine is part of the aircraft type design. You...

  14. 76 FR 40219 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2011-07-08

    ... Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration (FAA), DOT... Rotax Aircraft Engines Mandatory Service Bulletin SB-912-058 SB-914-041, dated April 15, 2011, listed in... 601 0; fax: +43 7246 601 9130; Internet: http://www.rotax-aircraft-engines.com . You may review...

  15. Program to compute the positions of the aircraft and of the aircraft sensor footprints

    Science.gov (United States)

    Paris, J. F. (Principal Investigator)

    1982-01-01

    The positions of the ground track of the aircraft and of the aircraft sensor footprints, in particular the metric camera and the radar scatterometer on the C-130 aircraft, are estimated by a program called ACTRK. The program uses the altitude, speed, and attitude informaton contained in the radar scatterometer data files to calculate the positions. The ACTRK program is documented.

  16. COMPARATIVE ANALYSIS OF TRANSPORT AIRCRAFT, BACKROUND FOR SHORT/ MEDIUM COURIER TRANSPORT AIRCRAFT PROCUREMENT

    Directory of Open Access Journals (Sweden)

    Matei POPA

    2010-03-01

    Full Text Available In accordance with Air Force requirements, the comparative analysis of short/medium transport aircraft comes to sustain procurement decision of short/medium transport aircraft. This paper presents, in short, the principles and the results of the comparative analysis for short/medium military transport aircraft.

  17. Technology for aircraft energy efficiency

    Science.gov (United States)

    Klineberg, J. M.

    1977-01-01

    Six technology programs for reducing fuel use in U.S. commercial aviation are discussed. The six NASA programs are divided into three groups: Propulsion - engine component improvement, energy efficient engine, advanced turboprops; Aerodynamics - energy efficient transport, laminar flow control; and Structures - composite primary structures. Schedules, phases, and applications of these programs are considered, and it is suggested that program results will be applied to current transport derivatives in the early 1980s and to all-new aircraft of the late 1980s and early 1990s.

  18. Aircraft empennage structural detail design

    Science.gov (United States)

    Meholic, Greg; Brown, Rhonda; Hall, Melissa; Harvey, Robert; Singer, Michael; Tella, Gustavo

    1993-01-01

    This project involved the detailed design of the aft fuselage and empennage structure, vertical stabilizer, rudder, horizontal stabilizer, and elevator for the Triton primary flight trainer. The main design goals under consideration were to illustrate the integration of the control systems devices used in the tail surfaces and their necessary structural supports as well as the elevator trim, navigational lighting system, electrical systems, tail-located ground tie, and fuselage/cabin interface structure. Accommodations for maintenance, lubrication, adjustment, and repairability were devised. Weight, fabrication, and (sub)assembly goals were addressed. All designs were in accordance with the FAR Part 23 stipulations for a normal category aircraft.

  19. Study of Various Attacks in MANET and Elaborative Discussion Of Rushing Attack on DSR with clustering scheme

    Directory of Open Access Journals (Sweden)

    Rusha Nandy

    2011-07-01

    Full Text Available An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable to many types of security attacks; one such attack is rushing attack. It is a malicious attack that is directed against on demand routing protocols that uses duplicate suppression at each node.

  20. Aircraft type influence on contrail properties

    Directory of Open Access Journals (Sweden)

    P. Jeßberger

    2013-05-01

    Full Text Available The investigation of the impact of aircraft parameters on contrail properties helps to better understand the climate impact from aviation. Yet, in observations, it is a challenge to separate aircraft and meteorological influences on contrail formation. During the CONCERT campaign in November 2008, contrails from 3 Airbus passenger aircraft of type A319-111, A340-311 and A380-841 were probed at cruise under similar meteorological conditions with in-situ instruments on board the DLR research aircraft Falcon. Within the 2 min old contrails detected near ice saturation, we find similar effective diameters Deff (5.2–5.9 μm, but differences in particle number densities nice (162–235 cm−3 and in vertical contrail extensions (120–290 m, resulting in large differences in contrail optical depths τ (0.25–0.94. Hence larger aircraft produce optically thicker contrails. Based on the observations, we apply the EULAG-LCM model with explicit ice microphysics and in addition the Contrail and Cirrus Prediction model CoCiP to calculate the aircraft type impact on young contrails under identical meteorological conditions. The observed increase in τ for heavier aircraft is confirmed by the models, yet for generally smaller τ. An aircraft dependence of climate relevant contrail properties persists during contrail lifetime, adding importance to aircraft dependent model initialization. We finally derive an analytical relationship between contrail, aircraft and meteorological parameters. Near ice saturation, contrail width × τ scales linearly with fuel flow rate as confirmed by observations. For higher saturation ratios approximations from theory suggest a non-linear increase in the form (RHI–12/3. Summarized our combined results could help to more accurately assess the climate impact from aviation using an aircraft dependent contrail parameterization.