WorldWideScience

Sample records for attack aircraft

  1. Incidence of Fungal attack on Aircraft Fuselage

    Directory of Open Access Journals (Sweden)

    H. M. Dayal

    1968-10-01

    Full Text Available Incidence of fungal attack on the fuselage of a few Vampire aircraft has been observed. The fungus isolated from the infected regions has been tentatively indentified as TorulaSp. Laboratory experiments have revealed that within four weeks this fungus causes about 44 percent loss in the tensile strength of the brich plywood used in the manufacture of the fuselage of the aircraft.

  2. Nonlinear analysis of NPP safety against the aircraft attack

    Science.gov (United States)

    Králik, Juraj; Králik, Juraj

    2016-06-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  3. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  4. Delayed detached eddy simulations of fighter aircraft at high angle of attack

    Science.gov (United States)

    Xu, Guoliang; Jiang, Xiong; Liu, Gang

    2016-08-01

    The massively separated flows over a realistic aircraft configuration at 40°, 50°, and 60° angles of attack are studied using the delayed detached eddy simulation (DDES). The calculations are carried out at experimental conditions corresponding to a mean aerodynamic chord-based Reynolds number of 8.93× 105 and Mach number of 0.088. The influence of the grid size is investigated using two grids, 20.0× 106 cells and 31.0× 106 cells. At the selected conditions, the lift, drag, and pitching moment from DDES predictions agree with the experimental data better than that from the Reynolds-averaged Navier-Stokes. The effect of angle of attack on the flow structure over the general aircraft is also studied, and it is found that the dominated frequency associated with the vortex shedding process decreases with increasing angle of attack.

  5. The effects of angle-of-attack indication on aircraft control in the event of an airspeed indicator malfunction

    Science.gov (United States)

    Boesser, Claas Tido

    Analysis of accident data by the Federal Aviation Administration, the National Transportation Safety Board, and other sources show that loss of control is the leading cause of aircraft accidents. Further evaluation of the data indicates that the majority of loss of control accidents are caused by the aircraft stalling. In response to these data, the Federal Aviation Administration and the General Aviation Joint Steering Committee emphasize the importance of stall and angle-of-attack awareness during flight. The high-profile crash of Air France Flight 447, in which pilots failed to recover from a self-induced stall, reinforced concerns over the need for improved stall and angle-of-attack awareness and reinvigorated interest in the debate over the effectiveness of angle-of-attack information displays. Further support for aerodynamic information in the form of an angle-of-attack indicator comes from core cognitive engineering principles. These principles argue for the provision of information about system functioning and dynamics as a means to ensure a human is always in position to recover a system when technology is unable. The purpose of this research was to empirically evaluate the importance of providing pilots with feedback about fundamental aircraft aerodynamics, especially during non-standard situations and unexpected disturbances. An experiment was conducted using a flight simulator to test the effects of in-cockpit angle-of-attack indication on aircraft control following an airspeed indicator malfunction on final approach. Participants flew a final approach with a target airspeed range of 60 to 65 knots. Once participants slowed the aircraft for final approach, the airspeed indicator needle would be stuck at an indication of 70 knots. One group of participants flew the final approach with an angle-of-attack indicator while the other group lacked such an instrument. Examination of aircraft performance data along the final approach showed that, when confronted

  6. Survey of needs and capabilities for wind tunnel testing of dynamic stability of aircraft at high angles of attack

    Science.gov (United States)

    Orlik-Ruckemann, K. J.

    1973-01-01

    A survey was conducted relative to future requirements for dynamic stability information for such aerospace vehicles as the space shuttle and advanced high performance military aircraft. High-angle-of-attack and high-Reynolds number conditions were emphasized. A review was made of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives, revealing an almost total lack of capabilities that could satisfy these requirements. Recommendations are made regarding equipment that should be constructed to remedy this situation. A description is given of some of the more advanced existing capabilities, which can be used to at least partly satisfy immediate demands.

  7. Studies of aircraft differential maneuvering. Report 75-27: Calculating of differential-turning barrier surfaces. Report 75-26: A user's guide to the aircraft energy-turn and tandem-motion computer programs. Report 75-7: A user's guide to the aircraft energy-turn hodograph program. [numerical analysis of tactics and aircraft maneuvers of supersonic attack aircraft

    Science.gov (United States)

    Kelley, H. J.; Lefton, L.

    1976-01-01

    The numerical analysis of composite differential-turn trajectory pairs was studied for 'fast-evader' and 'neutral-evader' attitude dynamics idealization for attack aircraft. Transversality and generalized corner conditions are examined and the joining of trajectory segments discussed. A criterion is given for the screening of 'tandem-motion' trajectory segments. Main focus is upon the computation of barrier surfaces. Fortunately, from a computational viewpoint, the trajectory pairs defining these surfaces need not be calculated completely, the final subarc of multiple-subarc pairs not being required. Some calculations for pairs of example aircraft are presented. A computer program used to perform the calculations is included.

  8. 1.5 μm lidar anemometer for true air speed, angle of sideslip, and angle of attack measurements on-board Piaggio P180 aircraft

    Science.gov (United States)

    Augere, B.; Besson, B.; Fleury, D.; Goular, D.; Planchat, C.; Valla, M.

    2016-05-01

    Lidar (light detection and ranging) is a well-established measurement method for the prediction of atmospheric motions through velocity measurements. Recent advances in 1.5 μm Lidars show that the technology is mature, offers great ease of use, and is reliable and compact. A 1.5 μm airborne Lidar appears to be a good candidate for airborne in-flight measurement systems. It allows measurements remotely, outside aircraft aerodynamic disturbance, and absolute air speed (no need for calibration) with great precision in all aircraft flight domains. In the framework of the EU AIM2 project, the ONERA task has consisted of developing and testing a 1.5 μm anemometer sensor for in-flight airspeed measurements. The objective of this work is to demonstrate that the 1.5 μm Lidar sensor can increase the quality of the data acquisition procedure for aircraft flight test certification. This article presents the 1.5 μm anemometer sensor dedicated to in-flight airspeed measurements and describes the flight tests performed successfully on-board the Piaggio P180 aircraft. Lidar air data have been graphically compared to the air data provided by the aircraft flight test instrumentation (FTI) in the reference frame of the Lidar sensor head. Very good agreement of true air speed (TAS) by a fraction of ms‑1, angle of sideslip (AOS), and angle of attack (AOA) by a fraction of degree were observed.

  9. Aircraft

    Science.gov (United States)

    Hibbs, Bart D.; Lissaman, Peter B. S.; Morgan, Walter R.; Radkey, Robert L.

    1998-01-01

    This disclosure provides a solar rechargeable aircraft that is inexpensive to produce, is steerable, and can remain airborne almost indefinitely. The preferred aircraft is a span-loaded flying wing, having no fuselage or rudder. Travelling at relatively slow speeds, and having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing's top surface, the aircraft uses only differential thrust of its eight propellers to turn. Each of five sections of the wing has one or more engines and photovoltaic arrays, and produces its own lift independent of the other sections, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface. The aircraft is capable of a top speed of about ninety miles per hour, which enables the aircraft to attain and can continuously maintain altitudes of up to sixty-five thousand feet. Regenerative fuel cells in the wing store excess electricity for use at night, such that the aircraft can sustain its elevation indefinitely. A main spar of the wing doubles as a pressure vessel that houses hydrogen and oxygen gasses for use in the regenerative fuel cell. The aircraft has a wide variety of applications, which include weather monitoring and atmospheric testing, communications, surveillance, and other applications as well.

  10. 1.5 μm lidar anemometer for true air speed, angle of sideslip, and angle of attack measurements on-board Piaggio P180 aircraft

    International Nuclear Information System (INIS)

    Lidar (light detection and ranging) is a well-established measurement method for the prediction of atmospheric motions through velocity measurements. Recent advances in 1.5 μm Lidars show that the technology is mature, offers great ease of use, and is reliable and compact. A 1.5 μm airborne Lidar appears to be a good candidate for airborne in-flight measurement systems. It allows measurements remotely, outside aircraft aerodynamic disturbance, and absolute air speed (no need for calibration) with great precision in all aircraft flight domains. In the framework of the EU AIM2 project, the ONERA task has consisted of developing and testing a 1.5 μm anemometer sensor for in-flight airspeed measurements. The objective of this work is to demonstrate that the 1.5 μm Lidar sensor can increase the quality of the data acquisition procedure for aircraft flight test certification. This article presents the 1.5 μm anemometer sensor dedicated to in-flight airspeed measurements and describes the flight tests performed successfully on-board the Piaggio P180 aircraft. Lidar air data have been graphically compared to the air data provided by the aircraft flight test instrumentation (FTI) in the reference frame of the Lidar sensor head. Very good agreement of true air speed (TAS) by a fraction of ms−1, angle of sideslip (AOS), and angle of attack (AOA) by a fraction of degree were observed. (special issue article)

  11. 未来美军航母战斗群空袭作战特点探析%Characteristics of Air Attack of American Aircraft Carrier Battle Group in the Future

    Institute of Scientific and Technical Information of China (English)

    高武; 杨士锋; 韩玉龙; 林云

    2016-01-01

    随着美军“福特”号核动力航空母舰的下水和舰载武器装备的更新换代,未来美军利用航母平台发动空袭作战将趋向隐身化、智能化、精确化、无人化,任务区分精细,作战方式灵活,作战手段多样。论文结合美军空袭作战理论和武器装备的发展,重点从作战原则、作战指挥、力量构成、空袭方式等方面分析未来美军航母战斗群空袭作战特点,指出其存在的薄弱环节,为防空力量建设和作战提供理论参考。%With the service of “Ford” aircraft carrier and update of shipborne weapone ,American navy would use the Ford aircraft carrier for air attack in the future .It will be more aptitudinal ,accurate and perdue ,and the attack will be a self‐service .In the attack ,task for each part will be more particularly ,the mode of battle will be more flexible ,and the American navy will use kinds of means in the battle .This article considers both the air attack theory of American air force and the de‐velopment of weapon ,emphasizes particularly on combat principle ,combat cmmand ,army system and mode of air attack , analyses the characteristic of air attack form aircraft carrier system in the future ,points out the disadvantage of aircraft carri‐er ,and gives advice about how to develop our aerial defence and how to fight against the air attack of aircraft carrier system .

  12. Panic Attack or Heart Attack?

    Science.gov (United States)

    Panic Attack or Heart Attack? Diagnosing heart disease in women A Healthy Hearts Guide ® Heart disease in women is often mistaken for panic attack with shortness of breath, anxiety, palpitations and indigestion. ...

  13. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion of at...... attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  14. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  15. Heart Attack

    Science.gov (United States)

    ... having another heart attack. These medicines include: aspirin, beta blockers, statins, ACE inhibitors and fish oil. Your doctor ... have had a stent placed in your heart. Beta blockers are a group of drugs that lower the ...

  16. Panic Attack

    OpenAIRE

    Scantamburlo, Gabrielle; Ansseau, Marc

    2004-01-01

    Panic attacks can occur unexpectedly and in almost any situation. The present article discusses the main features of anxiety states, the approach, the management and the practice guidelines for the treatment of panic disorder. Peer reviewed

  17. Heart Attack Risk Assessment

    Science.gov (United States)

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  18. Attack warning

    Energy Technology Data Exchange (ETDEWEB)

    1988-12-01

    The North American Aerospace Defense Command, located at Cheyenne Mountain Air Force Station, is responsible for warning the United States and Canadian leaders that North America is under air, missile, or space attack. The Air Force has been developing a replacement for NORAD's communications computer system, and it expects to spend about $281 million on this program-about $72 million for block I and $209 million for block II. Block I of the replacement system has experienced significant schedule and performance problems, such as the inability to meet the requirement for the unit to restore full mission capability within 267 minutes after a total loss of power, and the incompatibility of the unit with other computer equipment due to the wiring standard. These problems have pushed the planned installation data from 1986 to 1999. The Air Force intends to have the contractor correct the deficiencies during block II development. This report discusses how the replacement program should be reassessed.

  19. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  20. Active Linkability Attacks

    OpenAIRE

    Schnoor, Henning; Woizekowski, Oliver

    2013-01-01

    We study linking attacks on communication protocols. We show that an active attacker is strictly more powerful in this setting than previously-considered passive attackers. We introduce a formal model to reason about active linkability attacks, formally define security against these attacks and give very general conditions for both security and insecurity of protocols. In addition, we introduce a composition-like technique that allows to obtain security proofs by only studying small component...

  1. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  2. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  3. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  4. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  5. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  6. What Is a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  7. What Causes a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Causes a Heart Attack? Coronary Heart Disease A heart attack happens if ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  8. Life After a Heart Attack

    Science.gov (United States)

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  9. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L; Nardi Antonio E; Nascimento Isabella; Valença Alexandre M.; Zin Walter A.

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  10. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  11. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  12. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  13. Amphibious Aircraft

    Data.gov (United States)

    National Aeronautics and Space Administration — A brief self composed research article on Amphibious Aircrafts discussing their use, origin and modern day applications along with their advantages and...

  14. Aircraft Design

    Science.gov (United States)

    Bowers, Albion H. (Inventor); Uden, Edward (Inventor)

    2016-01-01

    The present invention is an aircraft wing design that creates a bell shaped span load, which results in a negative induced drag (induced thrust) on the outer portion of the wing; such a design obviates the need for rudder control of an aircraft.

  15. Aircraft Noise

    Science.gov (United States)

    Michel, Ulf; Dobrzynski, Werner; Splettstoesser, Wolf; Delfs, Jan; Isermann, Ullrich; Obermeier, Frank

    Aircraft industry is exposed to increasing public pressure aiming at a continuing reduction of aircraft noise levels. This is necessary to both compensate for the detrimental effect on noise of the expected increase in air traffic and improve the quality of living in residential areas around airports.

  16. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  17. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  18. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik; Thomasson, P.G.

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicle...

  19. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik;

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicl...

  20. Signs of a Heart Attack

    Science.gov (United States)

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  2. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  3. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for...

  4. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  5. A NASA study of the impact of technology on future multimission aircraft

    Science.gov (United States)

    Samuels, Jeffrey J.

    1992-01-01

    A conceptual aircraft design study was recently completed which compared three supersonic multimission tactical aircraft. The aircraft were evaluated in two technology timeframes and were sized with consistent methods and technology assumptions so that the aircraft could be compared in operational utility or cost analysis trends. The three aircraft are a carrier-based Fighter/Attack aircraft, a land-based Multirole Fighter, and a Short Takeoff/Vertical Landing (STOVL) aircraft. This paper describes the design study ground rules used and the aircraft designed. The aircraft descriptions include weights, dimensions and layout, design mission and maneuver performance, and fallout mission performance. The effect of changing technology and mission requirements on the STOVL aircraft and the impact of aircraft navalization are discussed. Also discussed are the effects on the STOVL aircraft of both Thrust/Weight required in hover and design mission radius.

  6. Aircraft Carriers

    DEFF Research Database (Denmark)

    Nødskov, Kim; Kværnø, Ole

    the majority of its foreign trade, as well as its oil imports, upon which the country is totally dependent. China therefore has good reasons for acquiring an aircraft carrier to enable it to protect its national interests. An aircraft carrier would also be a prominent symbol of China’s future status...... information is pieced together, then a picture is created of a Chinese aircraft carrier program, where Varyag will be made operational for training purposes. With this as the model, China will build a similar sized carrier themselves. If this project does become a reality, then it will take many years for...... Kuznetsov carrier. The SU-33 is, in its modernized version, technologically at the same level as western combat aircraft in both the offensive as well as the defensive roles. But Russia and China currently have an arms trade 6 dispute that is likely to prevent a deal, unless the dispute is resolved. As an...

  7. Aerodynamic characteristics of general aviation at high angle of attack with the propeller slipstream

    Science.gov (United States)

    Matsuo, N.; Hirano, S.

    1986-01-01

    The aerodynamic characteristics of the FA-300 business aircraft at high angle of attack with the propeller stream are described. The FA-300 offers two types, FA-300-700 for 340 HP, and -710 for 450 Hp of the engine. The effects of the propeller slipstream on the high angle of the attack are discussed.

  8. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    OpenAIRE

    Yi-Hsun Wang; Ching-Hao Mao; Hahn-Ming Lee

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of...

  9. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  10. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  11. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  12. Aircraft cybernetics

    Science.gov (United States)

    1977-01-01

    The use of computers for aircraft control, flight simulation, and inertial navigation is explored. The man-machine relation problem in aviation is addressed. Simple and self-adapting autopilots are described and the assets and liabilities of digital navigation techniques are assessed.

  13. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  14. Cell Counting Attack and Browser Attack against TOR Network

    OpenAIRE

    Swati

    2014-01-01

    The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper we are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymou...

  15. Blocking of Brute Force Attack

    Directory of Open Access Journals (Sweden)

    M.Venkata Krishna Reddy

    2012-08-01

    Full Text Available A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it could take years to find it. Depending on the password's length and complexity, there could be trillions of possible combinations. To speed things up a bit, a brute-force attack could start with dictionary words or slightly modified dictionary words because most people will use those rather than a completely random password. These attacks are called dictionary attacks or hybrid brute-force attacks. Brute-force attacks put user accounts at risk and flood your site with unnecessary traffic. Hackers launch brute-force attacks using widely available tools that utilize wordlists and smart rule set to intelligently and automatically guess user passwords. Although such attacks are easy to detect, they are not so easy to prevent

  16. ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

    Directory of Open Access Journals (Sweden)

    A.MADHURI,

    2010-09-01

    Full Text Available In this paper, we discuss the methods for detecting and preventing the DDoS Attacks and Replay Attacks, which have been posing the problems for the Internet. We explained a scheme AMFDR (AttackPatterns for Marking Filtering DoS and Replay attacks that identifies the attack packets from the packets that are sent by legitimate users and filters the attack packets. A Denial of service attack is generally launched to make a service unavailable even to an unauthorized user. If this attack uses many computers across the world, it is called Distributed Denial of service attack. Replay attack is retransmission of a data transmission which used to gain authentication in a fraudulent manner. These replayed packets or attack packets are identified. This scheme is less expensive and the implementation of this scheme needs minimal interaction with routers. The scheme is like firewall system, so that the occurrence of an attack is recognized quickly and a punitive action is taken without any loss genuine packets.

  17. Simultaneous Attacks by Terrorist Organisations

    Directory of Open Access Journals (Sweden)

    Kathleen Deloughery

    2013-12-01

    Full Text Available While terror attacks that are a part of a coordinated effort receive attention in the popular media, they have not received much attention in the academic literature. The decision to carry out simultaneous attacks should be examined as one of the choices a terrorist organisation makes about the method of attack. Determining the impact of simultaneous attacks vis-à-vis a single attack can explain why groups would use this method. Up to one quarter of all attacks coded in two major databases, GTD and ITERATE, may be part of a simultaneous campaign. Empirical analysis shows simultaneous attacks are more likely to be successful and cause more fatalities, though not in a one-to-one fashion. These results underline the importance of considering simultaneous attacks in empirical analysis.

  18. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  19. LITERATURE SURVEY ON WORMHOLE ATTACK

    OpenAIRE

    Avinash S. Bundela

    2015-01-01

    Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been identified & corresponding solutions have been proposed. These attacks are caused by the malicious node hence ad hoc wireless network is unprotected from the attacks of the malicious node. Between all these attacks the wormhole att ...

  20. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  1. APPLICATION FOR AIRCRAFT TRACKING

    OpenAIRE

    Ostroumov, Ivan; Kuz’menko, Natalia

    2011-01-01

    Abstract. In the article the important problems of software development for aircraft tracking have beendiscussed. Position reports of ACARS have been used for aircraft tracking around the world.An algorithm of aircraft coordinates decoding and visualization of aircraft position on the map has beenrepresented.Keywords: ACARS, aircraft, internet, position, software, tracking.

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. Sensor Technology and Futuristic Of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    Emmanuel Rugambage Ndayishimiye

    2016-08-01

    Full Text Available The Next Generation fighter Aircraft seeks a fighter with higher abilities in areas such as reach, persistence, survivability, net-centricity, situation awareness, human system integration and weapons effects. The future system will have to counter foe armed with next generation advanced electronic attack, sophisticated integrated air defense systems, directed energy weapons, passive detection, integrated self-protection and cyber-attack capabilities. It must be capable to operate in the anti-access area-denial (A2/AD environment that will exist in the next coming years.

  4. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  5. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  6. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are...... caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. Flutter Clearance of the F-18 High-angle-of-attack Research Vehicle with Experimental Wingtip Instrumentation Pods

    Science.gov (United States)

    Freudinger, Lawrence C.

    1989-01-01

    An F-18 aircraft was modified with wingtip instrumentation pods for use in NASA's high-angle-of-attack research program. Ground vibration and flight flutter testing were performed to clear an acceptable flight envelope for the aircraft. Flight test utilized atmospheric turbulence for structural excitation; the aircraft displayed no adverse aeroelastic trends within the envelope tested. The data presented in this report include mode shapes from the ground vibration and estimates of frequency and damping as a function of Mach number.

  9. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  10. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  11. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  12. Application of dynamical systems theory to nonlinear aircraft dynamics

    Science.gov (United States)

    Culick, Fred E. C.; Jahnke, Craig C.

    1988-01-01

    Dynamical systems theory has been used to study nonlinear aircraft dynamics. A six degree of freedom model that neglects gravity has been analyzed. The aerodynamic model, supplied by NASA, is for a generic swept wing fighter and includes nonlinearities as functions of the angle of attack. A continuation method was used to calculate the steady states of the aircraft, and bifurcations of these steady states, as functions of the control deflections. Bifurcations were used to predict jump phenomena and the onset of periodic motion for roll coupling instabilities and high angle of attack maneuvers. The predictions were verified with numerical simulations.

  13. FLOODING ATTACK AWARE SECURE AODV

    OpenAIRE

    Madhavi, S; K. Duraiswamy

    2013-01-01

    Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the ...

  14. Sulfate attack expansion mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  15. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  16. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  17. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  18. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  19. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  20. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  1. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the...... security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  2. Suicide Attacks on the Rise

    OpenAIRE

    CCS Research Staff

    2008-01-01

    This article was published in Culture and Conflict Review (March 2008), v.2 no.2 "The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star ...

  3. Propulsion controlled aircraft computer

    Science.gov (United States)

    Cogan, Bruce R. (Inventor)

    2010-01-01

    A low-cost, easily retrofit Propulsion Controlled Aircraft (PCA) system for use on a wide range of commercial and military aircraft consists of an propulsion controlled aircraft computer that reads in aircraft data including aircraft state, pilot commands and other related data, calculates aircraft throttle position for a given maneuver commanded by the pilot, and then displays both current and calculated throttle position on a cockpit display to show the pilot where to move throttles to achieve the commanded maneuver, or is automatically sent digitally to command the engines directly.

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  5. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  6. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  8. Database on aircraft accidents

    International Nuclear Information System (INIS)

    The Reactor Safety Subcommittee in the Nuclear Safety and Preservation Committee published the report 'The criteria on assessment of probability of aircraft crash into light water reactor facilities' as the standard method for evaluating probability of aircraft crash into nuclear reactor facilities in July 2002. In response to the report, Japan Nuclear Energy Safety Organization has been collecting open information on aircraft accidents of commercial airplanes, self-defense force (SDF) airplanes and US force airplanes every year since 2003, sorting out them and developing the database of aircraft accidents for latest 20 years to evaluate probability of aircraft crash into nuclear reactor facilities. This year, the database was revised by adding aircraft accidents in 2010 to the existing database and deleting aircraft accidents in 1991 from it, resulting in development of the revised 2011 database for latest 20 years from 1991 to 2010. Furthermore, the flight information on commercial aircrafts was also collected to develop the flight database for latest 20 years from 1991 to 2010 to evaluate probability of aircraft crash into reactor facilities. The method for developing the database of aircraft accidents to evaluate probability of aircraft crash into reactor facilities is based on the report 'The criteria on assessment of probability of aircraft crash into light water reactor facilities' described above. The 2011 revised database for latest 20 years from 1991 to 2010 shows the followings. The trend of the 2011 database changes little as compared to the last year's one. (1) The data of commercial aircraft accidents is based on 'Aircraft accident investigation reports of Japan transport safety board' of Ministry of Land, Infrastructure, Transport and Tourism. 4 large fixed-wing aircraft accidents, 58 small fixed-wing aircraft accidents, 5 large bladed aircraft accidents and 114 small bladed aircraft accidents occurred. The relevant accidents for evaluating

  9. Acute ischemic cerebral attack

    Directory of Open Access Journals (Sweden)

    Franco-Garcia Samir

    2010-12-01

    Full Text Available The decrease of the cerebral blood flow below the threshold of autoregulation led to changes of cerebral ischemia and necrosis that traduce in signs and symtoms of focal neurologic dysfunction called acute cerebrovascular symdrome (ACS or stroke. Two big groups according to its etiology are included in this category the hemorragic that constitue a 20% and the ischemic a 80% of cases. Great interest has wom the ischemic ACS because of its high social burden, being the third cause of no violent death in the world and the first of disability. Many risk factors favor the presentation of these events and some of them are susceptible of modification and therfore are objetives of primary prevention just as the control of diabetes, hypertension and the practice of healthy habits of life. The advances in the knowledge of the physiopatology, had taken to sustantial change in the nomenclature and management of ischemic ACS. Within these changes it was substituted the term cerebrovascular accident fo acute stroke, making emphasis in the key rol of a timely management with goals of time similiar to the acute coronary syndrome. It was redefined the time of acute ischemic attack to a one hour. Once stablished the cerebrovascular attack the semiology of symtoms with frecuency will led us make a topographic diagnosis of the in injury that joined to the cerebral TAC will allow us to exclude an hemorragic event and to start the treatment. In the management of these patients its essential the coordination of the differents teams of work, from the early recognition of symtoms on the part of patients andthe family, the rapid activation and response of emergency systems and the gearing of health care institutions. Are pillars of treatment: the abcde of reanimatiion, to avoid the hiperpirexis, the seizures, the hipoglicemy, the hiperglicemy, to achieve the thrombolysis in the first three hours of the begining of symtoms, to use antiplatelets, antithrombotic profilaxis

  10. Panic Attacks and Panic Disorders

    OpenAIRE

    Fontaine, Rejean; Beaudry, Paul

    1984-01-01

    The diagnosis and treatment of panic attacks and panic disorders have progressed markedly during the last decade. Unlike phobic disorders, the key feature of panic disorders is the many panic attacks that are mostly spontaneous or not caused by a particular situation. Recent studies linking its pathogenesis with lactate infusion tests are reviewed. For treatment, psychotherapy combined with in vivo exposure and pharmacotherapy is more efficacious than either treatment alone. In most cases, ps...

  11. Impersonation Attack on EKE Protocol

    OpenAIRE

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  12. Migraine attacks the Basal Ganglia

    OpenAIRE

    Bigal Marcelo; Brawn Jennifer; Pendse Gautam; Nutile Lauren; Becerra Lino; Maleki Nasim; Burstein Rami; Borsook David

    2011-01-01

    Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unr...

  13. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  14. Intelligent control of agile aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Mohler, R.R.; Zakrzewski, R.R. [Dept. of Electrical and Computer Engineering, Corvallis, OR (United States)

    1994-12-31

    A brief overview of adaptive and computer-aided flight control is presented as background for the evolution of recent research on nonlinear intelligent control. Here, several nonlinear control algorithms are investigated but emphasis is given to nearly time-optimal, neural-net generated feedback control which is trained on ideal minimum-time, open-loop trajectories. The minimum-time policies are computed by a new version of the switching-line-variational method (gradient algorithm). Critical control constraints and a benchmark for performance as well as a basis for training are obtained for the system design. This further demonstrates the need for an integrated controls and aircraft system design for full utilization of nonlinear control capability. Complex nonlinear simulations show the effectiveness of the derived nonlinear feedback controller for the high-angle-of-attack research vehicle (HARV) with stabilator and thrust-vector control. For example, angle of attack is controlled from near zero to sixty degrees in about two seconds with appropriate trim conditions at both ends. Such control greatly enhances maneuverability and general flight envelope admissibility.

  15. Design of a Three Surfaces R/C Aircraft Model

    Directory of Open Access Journals (Sweden)

    D. P. Coiro

    2002-01-01

    Full Text Available Design of a three lifting surfaces radio-controlled model has been carried out at Dipartimento di Progettazione Aeronautica (DPA by the authors in the last year. The model is intended to be a UAV prototype and is now under construction. The main goal of this small aircraft's design is to check the influence of the canard surface on the aircraft's aerodynamic characteristics and flight behavior, especially at high angles of attack. The aircraft model is also intended to be a flying platform to test sensors, measurement and acquisition systems for research purposes and a valid and low-cost teaching instrument for flight dynamics and flight maneuvering. The aircraft has been designed to fly with and without canard, and all problems relative to aircraft balance and stability have been carefully analyzed and solved. The innovative configuration and the mixed wooden-composite material structure has been obtained with very simple shapes and all the design is focused on realizing a low-cost model. A complete aerodynamic analysis of the configuration up to high angles of attack and a preliminary aircraft stability and performance prediction will be presented.

  16. VoIP Malware: Attack Tool & Attack Scenarios

    OpenAIRE

    Nassar, Mohamed; State, Radu; Festor, Olivier

    2009-01-01

    With the appearance of new Internet services like Voice over IP and IP television, malwares are in the way to update and extend their targets. In this paper, we discuss the emergence of a new generation of malwares attacking VoIP infrastructures and services. Such malwares constitute a real threat to the currently deployed VoIP architectures without strong security measures in place. We present one implemented environment that can be used to evaluate such attacks. Our ``VoIP bots'' support a ...

  17. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  18. A NASA study of the impact of technology on future carrier based tactical aircraft - Overview

    Science.gov (United States)

    Wilson, S. B., III

    1992-01-01

    This paper examines the impact of technology on future carrier based tactical aircraft. The results were used in the Center for Naval Analysis Future Carrier Study. The NASA Team designed three classes of aircraft ('Fighter', 'Attack', and 'Multimission') with two different technology levels. The Multimission aircraft were further analyzed by examining the penalty on the aircraft for both catapult launch/arrested landing recovery (Cat/trap) and short take-off/vertical landing (STOVL). The study showed the so-called STOVL penalty was reduced by engine technology and the next generation Strike Fighter will pay more penalty for Cat/trap than for STOVL capability.

  19. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica...

  20. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  1. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  2. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  3. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of a...

  4. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  5. Designing A Conventional Aircraft

    OpenAIRE

    Sonei, Arash

    2014-01-01

    This paper is explaining the important design phases of dimensioning an unmanned conventional aircraft from scratch and will also design one according to a few chosen requirements. The design phases discussed will be all from wing dimensioning to stability and spin recovery, aircraft performance requirements and how to select a motor which overcomes these. As well as the optimal rate of climb for improved efficiency is discussed. In the end an aircraft which manages the set requirements and i...

  6. Lightning effects on aircraft

    Science.gov (United States)

    1977-01-01

    Direct and indirect effects of lightning on aircraft were examined in relation to aircraft design. Specific trends in design leading to more frequent lightning strikes were individually investigated. These trends included the increasing use of miniaturized, solid state components in aircraft electronics and electric power systems. A second trend studied was the increasing use of reinforced plastics and other nonconducting materials in place of aluminum skins, a practice that reduces the electromagnetic shielding furnished by a conductive skin.

  7. Intrinsic and External Factors and Influences on the Motivation of Suicide Attackers

    Directory of Open Access Journals (Sweden)

    Gregor Bruce

    2013-09-01

    Full Text Available Suicide terrorism is the most extreme example of asymmetrical warfare. It is dramatic, frightening and can be very effective for the terrorist group which employs it. The psychological effects are out of proportion to the damage caused. The individual attackers have a mixture of motivations and the combination of motivators varies between the individual attackers, their groups and their causes. The terms “suicide terrorism”, “suicide attacks”, “suicide missions” and “suicide bombing” have specific meanings. Pape (1 limits the term “suicide attack” to an attack which is only successful with the death of the terrorist. The terrorist deploys in the expectation of certain death to ensure the success of the mission. “Suicide bombers”are a specific example of this genre as are hijackers who fly aircraft into buildings. “Suicide missions” are carried out by terrorists who realistically do not expect to survive the mission and do not have an escape plan but sometimes survive. The success of the mission is not dependent on their death. Examples are the 1972 attack on Lod Airport and the 2008 attack on Mumbai. “Suicide terrorism” is an all-embracing term that covers all of these events. Participants in suicide attacks have significant differences in their aims, psychological profiles and motivation from those who participate in suicide missions. This paper is specifically directed to the motivation of suicide attackers.

  8. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang

    2012-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to

  9. Generic attack approaches for industrial control systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  10. Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2014-01-01

    Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is...

  11. Micro-cantilever flow sensor for small aircraft

    KAUST Repository

    Ghommem, Mehdi

    2013-10-01

    We extend the use of cantilever beams as flow sensors for small aircraft. As such, we propose a novel method to measure the airspeed and the angle of attack at which the air travels across a small flying vehicle. We measure beam deflections and extract information about the surrounding flow. Thus, we couple a nonlinear beam model with a potential flow simulator through a fluid-structure interaction scheme. We use this numerical approach to generate calibration curves that exhibit the trend for the variations of the limit cycle oscillations amplitudes of flexural and torsional vibrations with the air speed and the angle of attack, respectively. © The Author(s) 2013.

  12. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  13. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  14. Diabetes Ups Risk of Heart Attack Death

    Science.gov (United States)

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  15. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  16. Heart attack - what to ask your doctor

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000231.htm Heart attack - what to ask your doctor To use the ... features on this page, please enable JavaScript. A heart attack occurs when blood flow to a part of ...

  17. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  18. DULOXETINE-RELATED PANIC ATTACKS

    OpenAIRE

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-01-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients’ trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who respon...

  19. Coyote Attacks: An Increasing Suburban Problem

    OpenAIRE

    Timm, Robert M.; Baker, Rex O.; Bennett, Joe R.; Coolahan, Craig C.

    2004-01-01

    Coyote attacks on humans and pets have increased within the past 5 years in California. We discuss documented occurrences of coyote aggression and attacks on people, using data from USDA Wildlife Services, the California Department of Fish & Game, and other sources. Forty-eight such attacks on children and adults were verified from 1998 through 2003, compared to 41 attacks during the period 1988 through 1997; most incidents occurred in Southern California near the suburban-wildland interfac...

  20. Sybil attack in Wireless Sensor Network

    OpenAIRE

    Abirami.K; Santhi.B

    2013-01-01

    Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for secur...

  1. Faked states attack and quantum cryptography protocols

    CERN Document Server

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  2. Panic attacks simulate presence of somatic illnesses

    OpenAIRE

    Latas Milan; Soldatović Ivan; Stamenović Marko; Starčević Vladan

    2009-01-01

    Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnos...

  3. A Perspective into Regulatory Requirements for Intentional Aircraft Crash

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang Yun; Park, Jong Seuk; Chung, Yun Suk [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Inn Seock [ISSA Technology, Maryland (Korea, Republic of); Choi, Eong Soo; Kim, Jong Hyun [ACT Co., Daejeon (Korea, Republic of)

    2010-10-15

    In the aftermath of the 9/11 terrorist attacks on the United States, there was heightened interest worldwide in protecting nuclear power plants against intentional aircraft attack by terrorists. This paper presents our perspective into regulatory requirements for intentional aircraft crash that were set forth in foreign countries, including the latest rulemaking by the U.S. Nuclear Regulatory Commission (NRC), i.e., 10 CFR 50.54(hh) and 10 CFR 50.150 that have been made effective in May and July of 2009, respectively. In light of these international efforts to further enhance safety of NPPs, a study is also underway at the Korea Institute of Nuclear Safety (KINS) to establish an effective and efficient regulatory approach in consideration of the state of the art in this area

  4. A Perspective into Regulatory Requirements for Intentional Aircraft Crash

    International Nuclear Information System (INIS)

    In the aftermath of the 9/11 terrorist attacks on the United States, there was heightened interest worldwide in protecting nuclear power plants against intentional aircraft attack by terrorists. This paper presents our perspective into regulatory requirements for intentional aircraft crash that were set forth in foreign countries, including the latest rulemaking by the U.S. Nuclear Regulatory Commission (NRC), i.e., 10 CFR 50.54(hh) and 10 CFR 50.150 that have been made effective in May and July of 2009, respectively. In light of these international efforts to further enhance safety of NPPs, a study is also underway at the Korea Institute of Nuclear Safety (KINS) to establish an effective and efficient regulatory approach in consideration of the state of the art in this area

  5. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  6. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Stroke More Understand Your Risks to Prevent a Heart Attack Updated:Aug 2,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  7. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  8. A Novel Attack against Android Phones

    CERN Document Server

    Backes, Michael; von Styp-Rekowsky, Philipp

    2011-01-01

    In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.

  9. A comparison of flight input techniques for parameter estimation of highly-augmented aircraft

    OpenAIRE

    Gates, Russell J.

    1995-01-01

    Parameter estimation is an inverse process in which stability derivatives are determined from time history flight data by matching the aircraft mathematical model's computed response with the measured response of the aircraft. Accurate parameter estimation depends mainly on instrumentation and input technique. Input technique is the focus of this thesis in which both classical inputs and optimal inputs were applied under the same flight conditions to the High Angle of Attack Research Vehicle ...

  10. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  11. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  12. Attacking Embedded Systems through Power Analysis

    Directory of Open Access Journals (Sweden)

    Dr. Sastry JKR

    2011-03-01

    Full Text Available Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. There are several attacking systems discussed in the literature each requiring a kind of counter attacking system. Power Analysis and variations of power analysis are the significant attacking mechanisms discussed in the literature. Crypto servers are the main areas of attacking as they deal with securing the data that flow in-between several components of the embedded systems. Most of the attacking systems suggested in the litterer suffer from lack of experimental models to emulate the attacking system. An attacking system could be amply proved when several samples of data are used for attacking and the samples of data provides for knowledge base. In this paper an experimental setup is proposed which is an embedded system itself for creation of a Knowledgebase which shall form the basis for attacking. The experimental setup required for undertaking the actual attacking with the usage of the knowledgebase is also presented. Further the proposed attacking system is applied for mission critical system and the experimental results obtained through the simulation are also presented.

  13. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  14. SOLAR AIRCRAFT DESIGN

    OpenAIRE

    RAHMATI, Sadegh; GHASED, Amir

    2015-01-01

    Abstract. Generally domain Aircraft uses conventional fuel. These fuel having limited life, high cost and pollutant. Also nowadays price of petrol and other fuels are going to be higher, because of scarcity of those fuels. So there is great demand of use of non-exhaustible unlimited source of energy like solar energy. Solar aircraft is one of the ways to utilize solar energy. Solar aircraft uses solar panel to collect the solar radiation for immediate use but it also store the remaining part ...

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. Application of nonlinear feedback control theory to supermaneuverable aircraft

    Science.gov (United States)

    Garrard, William L.; Enns, Dale F.

    1991-01-01

    Controlled flight at extremely high angles of attack, far exceeding the stall angle, and/or at high angular rates is sometimes referred to as supermaneuvering flight. The objective was to examine methods for design of control laws for aircraft performing supermaneuvers. Since the equations which govern the motion of aircraft during supermaneuvers are nonlinear, this study concentrated on nonlinear control law design procedures. The two nonlinear techniques considered were Nonlinear Quadratic Regulator (NLQR) theory and nonlinear dynamic inversion. A conventional gain scheduled proportional plus integral (P + I) controller was also developed to serve as a baseline design typical of current control laws used in aircraft. A mathematical model of a generic supermaneuverable aircraft was developed from data obtained from the literature. A detailed computer simulation of the aircraft was also developed. This simulation allowed the flying of proposed supermaneuvers and was used to evaluate the performance of the control law designs and to generate linearized models of the aircraft at different flight conditions.

  17. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  18. Aircraft electromagnetic compatibility

    Science.gov (United States)

    Clarke, Clifton A.; Larsen, William E.

    1987-01-01

    Illustrated are aircraft architecture, electromagnetic interference environments, electromagnetic compatibility protection techniques, program specifications, tasks, and verification and validation procedures. The environment of 400 Hz power, electrical transients, and radio frequency fields are portrayed and related to thresholds of avionics electronics. Five layers of protection for avionics are defined. Recognition is given to some present day electromagnetic compatibility weaknesses and issues which serve to reemphasize the importance of EMC verification of equipment and parts, and their ultimate EMC validation on the aircraft. Proven standards of grounding, bonding, shielding, wiring, and packaging are laid out to help provide a foundation for a comprehensive approach to successful future aircraft design and an understanding of cost effective EMC in an aircraft setting.

  19. Depreciation of aircraft

    Science.gov (United States)

    Warner, Edward P

    1922-01-01

    There is a widespread, and quite erroneous, impression to the effect that aircraft are essentially fragile and deteriorate with great rapidity when in service, so that the depreciation charges to be allowed on commercial or private operation are necessarily high.

  20. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems. The facility allows for the simulation of a...

  1. Solar thermal aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, Charles L. (Livermore, CA)

    2007-09-18

    A solar thermal powered aircraft powered by heat energy from the sun. A heat engine, such as a Stirling engine, is carried by the aircraft body for producing power for a propulsion mechanism, such as a propeller. The heat engine has a thermal battery in thermal contact with it so that heat is supplied from the thermal battery. A solar concentrator, such as reflective parabolic trough, is movably connected to an optically transparent section of the aircraft body for receiving and concentrating solar energy from within the aircraft. Concentrated solar energy is collected by a heat collection and transport conduit, and heat transported to the thermal battery. A solar tracker includes a heliostat for determining optimal alignment with the sun, and a drive motor actuating the solar concentrator into optimal alignment with the sun based on a determination by the heliostat.

  2. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  3. Improving rotorcraft survivability to RPG attack using inverse methods

    Science.gov (United States)

    Anderson, D.; Thomson, D. G.

    2009-09-01

    This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs). The basis of this approach is the application of inverse simulation techniques pioneered for simulation of aggressive helicopter manoeuvres to the RPG engagement problem. In this research, improvements in survivability are achieved by computing effective evasive manoeuvres. The first step in this process uses the missile approach warning system camera (MAWS) on the aircraft to provide angular information of the threat. Estimates of the RPG trajectory and impact point are then estimated. For the current flight state an appropriate evasion response is selected then realised via inverse simulation of the platform dynamics. Results are presented for several representative engagements showing the efficacy of the approach.

  4. To mitigate Black-hole attack with CBDS in MANET

    OpenAIRE

    Navjot; Er.Pooja Ran

    2015-01-01

    Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperati...

  5. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  6. Aircraft Data Acquisition

    Directory of Open Access Journals (Sweden)

    Elena BALMUS

    2016-03-01

    Full Text Available The introduction of digital systems instead of analog ones has created a major separation in the aviation technology. Although the digital equipment made possible that the increasingly faster controllers take over, we should say that the real world remains essentially analogue [4]. Fly-by-wire designers attempting to control and measure the real feedback of an aircraft were forced to find a way to connect the analogue environment to their digital equipment. In order to manage the implications of this division in aviation, data optimization and comparison has been quite an important task. The interest in using data acquisition boards is being driven by the technology and design standards in the new generation of aircraft and the ongoing efforts of reducing weight and, in some cases addressing the safety risks. This paper presents a sum of technical report data from post processing and diversification of data acquisition from Arinc 429 interface on a research aircraft platform. Arinc 429 is by far the most common data bus in use on civil transport aircraft, regional jets and executive business jets today. Since its introduction on the Boeing 757/767 and Airbus aircraft in the early 1980s hardly any aircraft has been produced without the use of this data bus. It was used widely by the air transport indu

  7. Review Article: Influenza Transmission on Aircraft

    Science.gov (United States)

    Adlhoch, Cornelia

    2016-01-01

    Background: Air travel is associated with the spread of influenza through infected passengers and potentially through in-flight transmission. Contact tracing after exposure to influenza is not performed systematically. We performed a systematic literature review to evaluate the evidence for influenza transmission aboard aircraft. Methods: Using PubMed and EMBASE databases, we identified and critically appraised identified records to assess the evidence of such transmission to passengers seated in close proximity to the index cases. We also developed a bias assessment tool to evaluate the quality of evidence provided in the retrieved studies. Results: We identified 14 peer-reviewed publications describing contact tracing of passengers after possible exposure to influenza virus aboard an aircraft. Contact tracing during the initial phase of the influenza A(H1N1)pdm09 pandemic was described in 11 publications. The studies describe the follow-up of 2,165 (51%) of 4,252 traceable passengers. Altogether, 163 secondary cases were identified resulting in an overall secondary attack rate among traced passengers of 7.5%. Of these secondary cases, 68 (42%) were seated within two rows of the index case. Conclusion: We found an overall moderate quality of evidence for transmission of influenza virus aboard an aircraft. The major limiting factor was the comparability of the studies. A majority of secondary cases was identified at a greater distance than two rows from the index case. A standardized approach for initiating, conducting, and reporting contact tracing could help to increase the evidence base for better assessing influenza transmission aboard aircraft. PMID:27253070

  8. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  9. Classification of Attacks in Wireless Sensor Networks

    OpenAIRE

    Messai, Mohamed-Lamine

    2014-01-01

    In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are dis...

  10. Detection Block Model for SQL Injection Attacks

    OpenAIRE

    Diksha G. Kumar; Madhumita Chatterjee

    2014-01-01

    With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack te...

  11. A low cost maritime control aircraft-ship-weapons system. [antiship missile defense

    Science.gov (United States)

    Fluk, H.

    1981-01-01

    It is pointed out that the long-range antiship standoff missile is emerging as the foremost threat on the seas. Delivered by high speed bombers, surface ships, and submarines, a missile attack can be mounted against selected targets from any point on the compass. An investigation is conducted regarding the configuration of a system which could most efficiently identify and destroy standoff threats before they launch their weapons. It is found that by using ships for carrying and launching missiles, and employing aircraft with a powerful radar only for search and missile directing operations, aircraft cost and weight can be greatly reduced. The employment of V/STOL aircraft in preference to other types of aircraft makes it possible to use ships of smaller size for carrying the aircraft. However, in order to obtain an all-weather operational capability for the system, ships are selected which are still big enough to display the required stability in heavy seas.

  12. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to...... properties of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  13. Detecting Denial of Service Attacks in Tor

    Science.gov (United States)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  14. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  15. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  16. IDENTIFICATION OF AIRCRAFT HAZARDS

    International Nuclear Information System (INIS)

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7)

  17. IDENTIFICATION OF AIRCRAFT HAZARDS

    Energy Technology Data Exchange (ETDEWEB)

    K.L. Ashley

    2005-03-23

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7).

  18. Identification of Aircraft Hazards

    Energy Technology Data Exchange (ETDEWEB)

    K. Ashley

    2006-12-08

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7).

  19. Aircraft Operations Classification System

    Science.gov (United States)

    Harlow, Charles; Zhu, Weihong

    2001-01-01

    Accurate data is important in the aviation planning process. In this project we consider systems for measuring aircraft activity at airports. This would include determining the type of aircraft such as jet, helicopter, single engine, and multiengine propeller. Some of the issues involved in deploying technologies for monitoring aircraft operations are cost, reliability, and accuracy. In addition, the system must be field portable and acceptable at airports. A comparison of technologies was conducted and it was decided that an aircraft monitoring system should be based upon acoustic technology. A multimedia relational database was established for the study. The information contained in the database consists of airport information, runway information, acoustic records, photographic records, a description of the event (takeoff, landing), aircraft type, and environmental information. We extracted features from the time signal and the frequency content of the signal. A multi-layer feed-forward neural network was chosen as the classifier. Training and testing results were obtained. We were able to obtain classification results of over 90 percent for training and testing for takeoff events.

  20. Identification of Aircraft Hazards

    International Nuclear Information System (INIS)

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7)

  1. Agent Based Preventive Measure for UDP Flood Attack in DDoS Attacks

    Directory of Open Access Journals (Sweden)

    AARTI SINGH,

    2010-08-01

    Full Text Available Distributed Denial-of-Service (DDoS attack is an attack which makes victim resources and services unavailable to its intended users. In particular, User Datagram Protocol (UDP flood attack in DDoS attacks is a method causing host based denial of service. It occurs when attacker sends UDP packets to a random port on the victim system,causing responses to be sent to forged IP address. The basic thrust of this paper is agent based solution for UDP lood attack because software agent technology seems to be a strong candidate for defending DDoS attacks and very few researchers have thought of deploying agents towards providing solution for UDP attack earlier.

  2. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  3. Hazards from aircraft

    International Nuclear Information System (INIS)

    The siting of nuclear power plants has created innumerable environmental concerns. Among the effects of the ''man-made environment'' one of increasing importance in recent nuclear plant siting hazards analysis has been the concern about aircraft hazards to the nuclear plant. These hazards are of concern because of the possibility that an aircraft may have a malfunction and crash either near the plant or directly into it. Such a crash could be postulated to result, because of missile and/or fire effects, in radioactive releases which would endanger the public health and safety. The majority of studies related to hazards from air traffic have been concerned with the determination of the probability associated with an aircraft striking vulnerable portions of a given plant. Other studies have focused on the structural response to such a strike. This work focuses on the problem of strike probability. 13 references

  4. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  5. A Efficient Approach for Password Attacks

    Directory of Open Access Journals (Sweden)

    I. Naga Geethika

    2014-03-01

    Full Text Available Online password guessing attacks has emerged as a major problem in password based systems. To avoid this we implemented many solutions day by day to restrict bruteforce attacks and password guessing attacks and dictionary attacks. The approach in this paper is that using of mobile alert messages and giving options to the mobile user for more security that will intimate admin that someone is trying to hack his email. The legal users/attackers are challenged to answer the code that is sent to the mobile to retrieve the login page when the number of failed login attempts from a single machine crosses certain threshold value. This protocol uses either the IP addresses of the machines or the browser cookies, or both to identify the machines from which successful logins are made previously. A machine is said to be known when a successful login is made from it and its IP address is added to whitelist. The main goal of this protocol is to limit the attackers with a few failed login attempts made from each unknown machine and forcing them to challenge the security options. Attackers can have a threshold value (For ex 5 which is Whenever a user/attacker types an invalid username.

  6. Panic attacks simulate presence of somatic illnesses

    Directory of Open Access Journals (Sweden)

    Latas Milan

    2009-01-01

    Full Text Available Introduction. Panic attacks are characterized with sudden attacks of anxiety with numerous somatic symptoms, such as palpitations, tachycardia, tachypnea, nausea, vertigo. The objective of this study was to analyze symptoms of panic attacks in patients with panic disorder, especially, to determine the specific relationship of somatic and neurological symptoms of panic attacks in boundaries of somatic systems. Material and methods. The study sample consisted of 97 patients with primary diagnosis of panic disorder, without any acute, severe and unstable somatic illness. The presence and frequency of symptoms of panic attacks were estimated by the Panic Disorder Questionnaire. Results. The study results indicate that the most frequent symptoms of panic attacks were cardiological signs (heart pounding or racing and trembling, followed by unsteady and fainting feeling symptoms, sweating, respiratory symptoms and gastroenterological symptoms. The results of correlation analyses indicate that symptoms of panic attacks classified into cardio-vascular, gastro-enterological, respiratory and neuro-otological systems show statistically significant correlations. Conclusion. The results of analyses of symptoms of panic attacks point to their intercorrelation. This specific association of the symptoms, if they are examined on their own in the patients, could lead to false clinical manifestation of some somatic illness. Therefore, it is necessary to analyze adequately and make the proper differential diagnosis of patients with panic disorder.

  7. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  8. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  9. The cost of attack in competing networks.

    Science.gov (United States)

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  10. Automated Detection System for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Dr K.V.N.Sunitha

    2010-10-01

    Full Text Available Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. One of these attacks is SQL Injection vulnerability (SQLIV, which can give attackers unrestricted access to the databases that underlie Web applications and has become increasingly frequent and serious. The intent is that Web applications will limit the kinds of queries that can be generated to a safe subset of all possible queries, regardless of what input users provide. SQL Injection attacks are possible due to the design drawbacks of the web sites, which interact with back-end databases. Successful attacks may damage more. We introduce a system that deals with new automated technique for preventing SQLIA based on the novel concept of regular expressions is to detect SQL Injection attacks. The proposed system can detect the attacks that are from Internet and Insider Attacks, by analyzing the packets of the network servers.

  11. Advanced Aircraft Material

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Prince

    2013-06-01

    Full Text Available There has been long debate on “advanced aircraft material” from past decades & researchers too came out with lots of new advanced material like composites and different aluminum alloys. Now days a new advancement that is in great talk is third generation Aluminum-lithium alloy. Newest Aluminum-lithium alloys are found out to have low density, higher elastic modulus, greater stiffness, greater cryogenic toughness, high resistance to fatigue cracking and improved corrosion resistance properties over the earlier used aircraft material as mentioned in Table 3 [1-5]. Comparison had been made with nowadays used composite material and is found out to be more superior then that

  12. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  13. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  14. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  15. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers....

  16. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  17. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Optical communications for transport aircraft

    Science.gov (United States)

    Stengel, Robert

    1994-01-01

    Optical communications for transport aircraft are discussed. The problem involves: increasing demand for radio-frequency bands from an enlarging pool of users (aircraft, ground and sea vehicles, fleet operators, traffic control centers, and commercial radio and television); desirability of providing high-bandwidth dedicated communications to and from every aircraft in the National Airspace System; need to support communications, navigation, and surveillance for a growing number of aircraft; and improved meteorological observations by use of probe aircraft. The solution involves: optical signal transmission support very high data rates; optical transmission of signals between aircraft, orbiting satellites, and ground stations, where unobstructed line-of-sight is available; conventional radio transmissions of signals between aircraft and ground stations, where optical line-of-sight is unavailable; and radio priority given to aircraft in weather.

  20. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  1. Long Range Aircraft Trajectory Prediction

    OpenAIRE

    Magister, Tone

    2009-01-01

    The subject of the paper is the improvement of the aircraft future trajectory prediction accuracy for long-range airborne separation assurance. The strategic planning of safe aircraft flights and effective conflict avoidance tactics demand timely and accurate conflict detection based upon future four–dimensional airborne traffic situation prediction which is as accurate as each aircraft flight trajectory prediction. The improved kinematics model of aircraft relative flight considering flight ...

  2. Auralization of novel aircraft configurations

    OpenAIRE

    Arntzen, M.; Bertsch, E.L.; Simons, D.G.

    2015-01-01

    A joint initiative of NLR, DLR, and TU Delft has been initiated to streamline the process of generating audible impressions of novel aircraft configurations. The integrated approach adds to the value of the individual tools and allows predicting the sound of future aircraft before they actually fly. Hence, an existing process for the aircraft design and system noise prediction at DLR has been upgraded to generate the required input data for an aircraft auralization framework developed by NLR ...

  3. Research on First Attack Probability Model of an Attacker Level Bombing Anti-air Radars

    Institute of Scientific and Technical Information of China (English)

    LUO Peng-cheng; MU Fu-ling; ZHOU Jing-lun

    2007-01-01

    The paper mainly studies the first attack probability (FAP) of an attacker level bombing anti-air radars through analyzing the radiant point orientation and attack (RPOA) process of attackers. Firstly, the searching target process is analyzed, and a corresponding target finding model is brought forward. Secondly, the target approaching process is concretely analyzed when the attacker levelly bombs the anti-air radar, and a corresponding target approaching model is presented. Finally, a demonstration is given to analyze the major factors in the model and prove its validity.

  4. Aircraft noise prediction

    Science.gov (United States)

    Filippone, Antonio

    2014-07-01

    This contribution addresses the state-of-the-art in the field of aircraft noise prediction, simulation and minimisation. The point of view taken in this context is that of comprehensive models that couple the various aircraft systems with the acoustic sources, the propagation and the flight trajectories. After an exhaustive review of the present predictive technologies in the relevant fields (airframe, propulsion, propagation, aircraft operations, trajectory optimisation), the paper addresses items for further research and development. Examples are shown for several airplanes, including the Airbus A319-100 (CFM engines), the Bombardier Dash8-Q400 (PW150 engines, Dowty R408 propellers) and the Boeing B737-800 (CFM engines). Predictions are done with the flight mechanics code FLIGHT. The transfer function between flight mechanics and the noise prediction is discussed in some details, along with the numerical procedures for validation and verification. Some code-to-code comparisons are shown. It is contended that the field of aircraft noise prediction has not yet reached a sufficient level of maturity. In particular, some parametric effects cannot be investigated, issues of accuracy are not currently addressed, and validation standards are still lacking.

  5. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  8. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  9. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  10. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  11. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  12. RAPTOR: Routing Attacks on Privacy in Tor

    OpenAIRE

    Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Chiang, Mung; Mittal, Prateek

    2015-01-01

    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of...

  13. Security Attacks On MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Chiragkumar V. Patel

    2013-10-01

    Full Text Available The paper gives idea about various routing protocols for Mobile Ad-Hoc Network against security issues. MANET is vulnerable to various security attacks due to its dynamically changing topology, self configurable nature and lack of centralized control. Malicious node can significantly degrade the performance and reliability of Ad-hoc Network routing protocols. From the survey it has been made quite clear that basic MANET protocols are vulnerable to various routing attacks. While Secure AODV (SAODV routing protocol performs quite well to improve performance in presence of security attack in MANET.

  14. Who Is at Risk for a Heart Attack?

    Science.gov (United States)

    ... on Twitter. Who Is at Risk for a Heart Attack? Certain risk factors make it more likely that ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  15. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    OpenAIRE

    Patel, A K; Jaypalsinh. A. Gohil; D.T. Meva

    2010-01-01

    Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between commun...

  16. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  17. Recovery of infrastructure networks after localised attacks

    Science.gov (United States)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  18. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  19. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  20. Karachi Commander Escapes Attack, 10 Dead

    Institute of Scientific and Technical Information of China (English)

    潘志强

    2004-01-01

    KARACHI: The army commander in the Pakistani city of Karachi narrowly① escaped assassination② yesterday when gunmen attacked his convoy③ with gunfire and a bomb, killing at least 10 and wounding his driver, officials said.

  1. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  2. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  3. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  4. Desynchronization Attacks on RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  5. Dengue Virus May Bolster Zika's Attack

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to ... 23, 2016 (HealthDay News) -- Prior exposure to the dengue fever virus may increase the severity of Zika ...

  6. Fault attacks on two software countermeasures

    OpenAIRE

    Moro, Nicolas; Heydemann, Karine; Dehbaoui, Amine; Robisson, Bruno; Encrenaz, Emmanuelle

    2014-01-01

    Short version of the article "Experimental evaluation of two software countermeasures against fault attacks" presented at the 2014 IEEE Symposium on Hardware-Oriented Security and Trust (HOST) in May 2014.

  7. CASE STUDY OF SQL INJECTION ATTACKS

    OpenAIRE

    Sonakshi*, Rakesh Kumar, Girdhar Gopal

    2016-01-01

    Today, most of the web applications are associated with database at back-end so there are possibilities of SQL injection attacks (SQLIA) on it. A number of preventive measures have also been discovered by various researchers to overcome this attack, but which measure is more convenient and provides fast access to application without compromising the security is also a major concern nowadays. This paper provides a clear distinction among different types of SQLIAs and how these can be performed...

  8. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  9. Panic Attack during Elective Gastrointestinal Endoscopy

    OpenAIRE

    Charalampos Mitsonis; Nikolaos Dimopoulos; Marianna Zavrou; Vassiliki Psarra; Christos Giofkos; Christos Fiorakis; Athanasios Dimitriadis; Dimitrios Valavanis; Eleni Vousoura; Iannis Zervas; Efstathios Papavassiliou

    2011-01-01

    Background. Esophagogastroduodenoscopy (EGD) and colonoscopy (CS) can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE). Methods. The study population comprised of 79 Greek outpatie...

  10. Attacks in WEB Based Embedded Applications

    OpenAIRE

    C. Yaashuwanth; Ramesh, R.

    2010-01-01

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded system case, it has life and death consequence attached to it. Many of these embedded systems work in hazardous environment where a system failure results to catastrophic effec...

  11. Wireless Sensor Networks Attacks and Solutions

    OpenAIRE

    Alajmi, Naser

    2014-01-01

    A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requirements and security attacks in wireless sensor networks. Also, indicate to the benchmarks for the se...

  12. Cluster headache attacks and multiple sclerosis

    OpenAIRE

    Gentile, Salvatore; Ferrero, Margherita; Vaula, Giovanna; Rainero, Innocenzo; Pinessi, Lorenzo

    2007-01-01

    We report the case of a patient who developed typical cluster headache attacks and was diagnosed as having multiple sclerosis (MS) at the same time. The headache attacks resolved after i.v. treatment with methylprednisolone. MR imaging showed a pontine demyelinating lesion involving the trigeminal nerve root inlet area, on the same side as the pain. The association between cluster headache and MS has been rarely described before. This case suggests that in patients with cluster headache neuro...

  13. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  14. Two Improved Multiple-Differential Collision Attacks

    OpenAIRE

    An Wang; Liji Wu; Zongyue Wang; Xuexin Zheng; Man Chen; Jing Ma

    2014-01-01

    In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementat...

  15. Various Database Attacks and its Prevention Techniques

    OpenAIRE

    K.A.VarunKumar; M.Prabakaran; Ajay Kaurav; S.Sibi Chakkaravarthy; Thiyagarajan, S; Pokala Venkatesh

    2014-01-01

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness of the database. Intrusion detection system is used to detect whether the attack is carried on the database. In this paper we surveyed different types of database att...

  16. Private Circuits II versus Fault Injection Attacks

    OpenAIRE

    Rakotomalala, Henitsoa; Ngo, Xuan Thuy; Najm, Zakaria; Danger, Jean-Luc; Guilley, Sylvain

    2015-01-01

    —Cryptographic implementations are subject to physical attacks. Private circuits II is a proven protection against a strong attacker, able to read and write on a finite number of chosen internal nodes. In practice, side-channel analyses and fault injections are less accurate: typically, classical injection techniques (clock and power glitches, electromagnetic pulses, etc.) can be reproducible, but they do not allow to choose the targeted nodes (the situation is different for software dual-rai...

  17. Logical Modes of Attack in Argumentation Networks

    OpenAIRE

    Gabbay, Dov M.; Garcez, A. S. D. Avila

    2009-01-01

    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the meta level to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, the...

  18. Session Initiation Protocol Attacks and Challenges

    OpenAIRE

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  19. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  20. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  1. Dynamic stability testing of aircraft - Needs versus capabilities

    Science.gov (United States)

    Orlik-Rueckemann, K. J.

    1973-01-01

    Highlights of a recent survey of the future needs for dynamic stability information for such aerospace vehicles as the Space Shuttle and advanced high-performance military aircraft, indicating the importance of obtaining this information for high-angle-of-attack high-Reynolds-number conditions. A review of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives reveals an almost total lack of such capabilities for Mach numbers above 0.1 at angles of attack higher than 25 deg. In addition, capabilities to obtain certain new cross-coupling derivatives and information on effects of the coning motion are almost completely lacking. Recommendations are made regarding equipment that should be constructed to remedy this situation.

  2. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  3. Inlet, engine, airframe controls integration development for supercruising aircraft

    Science.gov (United States)

    Houchard, J. H.; Carlin, C. M.; Tjonneland, E.

    1983-01-01

    In connection with a consideration of advanced military aircraft systems, attention is given to research for improving the technology of the design of supersonic cruise aircraft. Syberg et al. (1981) have shown that an analytic design method is now available to accurately predict the flow characteristics of axisymmetric supersonic inlets, including off-design angle of attack operation. On the basis of information regarding the inlet flow characteristics, the control system designer can begin the inlet design and development, before wind tunnel testing has begun. The present investigation is concerned with details and status of inlet control technology. A detailed representation of a supersonic propulsion system is developed. This development demonstrates the feasibility of the selected hybrid computational concept.

  4. Guidance Systems of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    K.N. Rajanikanth

    2005-07-01

    Full Text Available Mission performance of a fighter aircraft is crucial for survival and strike capabilities in todays' aerial warfare scenario. The guidance functions of such an aircraft play a vital role inmeeting the requirements and accomplishing the mission success. This paper presents the requirements of precision guidance for various missions of a fighter aircraft. The concept ofguidance system as a pilot-in-loop system is pivotal in understanding and designing such a system. Methodologies of designing such a system are described.

  5. 19 CFR 122.64 - Other aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Other aircraft. 122.64 Section 122.64 Customs... AIR COMMERCE REGULATIONS Clearance of Aircraft and Permission To Depart § 122.64 Other aircraft. Clearance or permission to depart shall be requested by the aircraft commander or agent for aircraft...

  6. Rotary Balance Wind Tunnel Testing for the FASER Flight Research Aircraft

    Science.gov (United States)

    Denham, Casey; Owens, D. Bruce

    2016-01-01

    Flight dynamics research was conducted to collect and analyze rotary balance wind tunnel test data in order to improve the aerodynamic simulation and modeling of a low-cost small unmanned aircraft called FASER (Free-flying Aircraft for Sub-scale Experimental Research). The impetus for using FASER was to provide risk and cost reduction for flight testing of more expensive aircraft and assist in the improvement of wind tunnel and flight test techniques, and control laws. The FASER research aircraft has the benefit of allowing wind tunnel and flight tests to be conducted on the same model, improving correlation between wind tunnel, flight, and simulation data. Prior wind tunnel tests include a static force and moment test, including power effects, and a roll and yaw damping forced oscillation test. Rotary balance testing allows for the calculation of aircraft rotary derivatives and the prediction of steady-state spins. The rotary balance wind tunnel test was conducted in the NASA Langley Research Center (LaRC) 20-Foot Vertical Spin Tunnel (VST). Rotary balance testing includes runs for a set of given angular rotation rates at a range of angles of attack and sideslip angles in order to fully characterize the aircraft rotary dynamics. Tests were performed at angles of attack from 0 to 50 degrees, sideslip angles of -5 to 10 degrees, and non-dimensional spin rates from -0.5 to 0.5. The effects of pro-spin elevator and rudder deflection and pro- and anti-spin elevator, rudder, and aileron deflection were examined. The data are presented to illustrate the functional dependence of the forces and moments on angle of attack, sideslip angle, and angular rate for the rotary contributions to the forces and moments. Further investigation is necessary to fully characterize the control effectors. The data were also used with a steady state spin prediction tool that did not predict an equilibrium spin mode.

  7. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  8. Detecting and Localizing Wireless Network Attacks Techniques

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2010-03-01

    Full Text Available In order to increase employee productivity within a feasible budget, we have to track newtechnologies, investigate and choose the best plan and implementation of these technologies.WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequencyspectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize andidentify wireless network attacks, which present a unique set of challenges to IT and securityprofessionals. All efforts were focusing on the ability to identity based attacks in which amalicious device uses forged MAC addresses to masquerade as a specific client or to createmultiple illegitimate identities. Also, to be sure that the network is able to robustly identify eachtransmitter independently of packet contents, allowing detection of a large class of identity-basedattacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators,amplifiers, directional antennas, software radios, but he cannot be at the location of user or at thelocation of access points. However, we have to choose the best design, implementation, andevaluation techniques in order to secure our network from attackers, where our choice willdepend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

  9. Analysis of Asymmetric Aircraft Aerodynamics Due to an Experimental Wing Glove

    Science.gov (United States)

    Hartshorn, Fletcher

    2011-01-01

    Aerodynamic analysis on a business jet with a wing glove attached to one wing is presented and discussed. If a wing glove is placed over a portion of one wing, there will be asymmetries in the aircraft as well as overall changes in the forces and moments acting on the aircraft. These changes, referred to as deltas, need to be determined and quantified to make sure the wing glove does not have a drastic effect on the aircraft flight characteristics. TRANAIR, a non-linear full potential solver was used to analyze a full aircraft, with and without a glove, at a variety of flight conditions and angles of attack and sideslip. Changes in the aircraft lift, drag and side force, along with roll, pitch and yawing moment are presented. Span lift and moment distributions are also presented for a more detailed look at the effects of the glove on the aircraft. Aerodynamic flow phenomena due to the addition of the glove and its fairing are discussed. Results show that the glove used here does not present a drastic change in forces and moments on the aircraft, but an added torsional moment around the quarter-chord of the wing may be a cause for some structural concerns.

  10. Rapid evaluation of buildings and infrastructure to accidental and deliberate aircraft impact

    Energy Technology Data Exchange (ETDEWEB)

    Tennant, D., E-mail: tennant@wai.com [Weidlinger Associates, Inc., 6301 Indian School Road NE, Suite 501, Albuquerque, NM 87122 (United States); Levine, H., E-mail: levine@ca.wai.com [Weidlinger Associates, Inc., 399 W. El Camino Real, Suite 200, Mountain View, CA 94040 (United States); Mould, J.; Vaughan, D. [Weidlinger Associates, Inc., 399 W. El Camino Real, Suite 200, Mountain View, CA 94040 (United States)

    2014-04-01

    Recent events involving the impact of large transport aircraft such as the Boeing 767 and 757 into the World Trade Center Towers and the Pentagon have revealed the vulnerability of such structures to terrorist attack. Incidents involving smaller general aviation aircraft have shown the damage that this class of plane can do beyond a protected perimeter. These incidents have elicited inquiries with regard to the effects of impacts of these aircraft types into other critical facilities including aboveground and below ground storage facilities, nuclear power plants, damns and other military and civilian installations. A significant capability to evaluate these threats has been developed during the past 10 years. Small medium and large aircraft have been impacted into buried and aboveground reinforced concrete and light steel frame storage facilities. Both explicit aircraft models and Riera functions (a simplified aircraft impact loading function) have been used to generate an extensive data base. The effects of engines impacting have been studied separately as penetrators. Illustrated in this paper is validation of computational tools for impacts into structures and the initial development of a generalized evaluation tool for rapid evaluation of threats and consequence of aircraft impact into protected facilities.

  11. Rapid evaluation of buildings and infrastructure to accidental and deliberate aircraft impact

    International Nuclear Information System (INIS)

    Recent events involving the impact of large transport aircraft such as the Boeing 767 and 757 into the World Trade Center Towers and the Pentagon have revealed the vulnerability of such structures to terrorist attack. Incidents involving smaller general aviation aircraft have shown the damage that this class of plane can do beyond a protected perimeter. These incidents have elicited inquiries with regard to the effects of impacts of these aircraft types into other critical facilities including aboveground and below ground storage facilities, nuclear power plants, damns and other military and civilian installations. A significant capability to evaluate these threats has been developed during the past 10 years. Small medium and large aircraft have been impacted into buried and aboveground reinforced concrete and light steel frame storage facilities. Both explicit aircraft models and Riera functions (a simplified aircraft impact loading function) have been used to generate an extensive data base. The effects of engines impacting have been studied separately as penetrators. Illustrated in this paper is validation of computational tools for impacts into structures and the initial development of a generalized evaluation tool for rapid evaluation of threats and consequence of aircraft impact into protected facilities

  12. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  13. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  14. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  15. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  16. Chemistry in aircraft plumes

    Energy Technology Data Exchange (ETDEWEB)

    Kraabol, A.G.; Stordal, F.; Knudsen, S. [Norwegian Inst. for Air Research, Kjeller (Norway); Konopka, P. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Wessling (Germany). Inst. fuer Physik der Atmosphaere

    1997-12-31

    An expanding plume model with chemistry has been used to study the chemical conversion of NO{sub x} to reservoir species in aircraft plumes. The heterogeneous conversion of N{sub 2}O{sub 5} to HNO{sub 3}(s) has been investigated when the emissions take place during night-time. The plume from an B747 has been simulated. During a ten-hour calculation the most important reservoir species was HNO{sub 3} for emissions at noon. The heterogeneous reactions had little impact on the chemical loss of NO{sub x} to reservoir species for emissions at night. (author) 4 refs.

  17. Structural integrity in aircraft.

    Science.gov (United States)

    Hardrath, H. F.

    1973-01-01

    The paper reviews briefly the current design philosophies for achieving long, efficient, and reliable service in aircraft structures. The strengths and weaknesses of these design philosophies and their demonstrated records of success are discussed. The state of the art has not been developed to the point where designing can be done without major test inspection and maintenance programs. A broad program of research is proposed through which a viable computerized design scheme will be provided during the next decade. The program will organize and correlate existing knowledge on fatigue and fracture behavior, identify gaps in this knowledge, and guide specific research to upgrade design capabilities.

  18. Aircraft Inspection for the General Aviation Aircraft Owner.

    Science.gov (United States)

    Federal Aviation Administration (DOT), Washington, DC. Flight Standards Service.

    Presented is useful information for owners, pilots, student mechanics, and others with aviation interests. Part I of this booklet outlines aircraft inspection requirements, owner responsibilities, inspection time intervals, and sources of basic information. Part II is concerned with the general techniques used to inspect an aircraft. (Author/JN)

  19. Proposed Methodology for Securing Wireless LANs from Wormhole Attack

    Directory of Open Access Journals (Sweden)

    A.K. Patel

    2010-05-01

    Full Text Available Wormhole attacks enable an attacker with limited Resources and no cryptographic material to wreak havoc on wireless networks. Initial research focused that this attack is possible only on Adhoc networks, but in present condition wormhole attack is possible on infrastructure based wireless LANs also. We propose architecture and analyze the possibility of wormhole attack along with a countermeasure to avoid such an attack. The proposed mechanism involves the shared information between communicating Access Points to prevent Rouge Access Points from masquerading as false neighbours. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.

  20. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  1. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  2. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  3. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  4. Early Detection of SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hossain Shahriar

    2013-07-01

    Full Text Available SQL Injection (SQLI is a common vulnerability found in web applications.The starting point of SQLIattack is the client-side (browser. If attack inputs can be detected early at the browse side, then it could bethwarted early by not forwarding the malicious inputs to the server-side for further processing.This paperpresents a client-side approach to detect SQLI attacks1. The client-side accepts shadow SQL queries fromthe server-side and checks any deviation betweenshadow queries with dynamic queries generated withuser supplied inputs. We measure the deviation of shadow query and dynamic query based on conditionalentropy metrics and propose four metrics in this direction. We evaluate the approach with three PHPapplications containing SQLI vulnerabilities. The evaluation results indicate that our approach can detectwell-known SQLI attacks early at the client-side and impose negligible overhead.

  5. Safety of a Commercial Aircraft after Damage to Airframe due to Terrorist Attack

    OpenAIRE

    Lošťák, Miroslav

    2012-01-01

    Teroristické útoky znamenají dnes velké nebezpečí pro civilní dopravní letouny. V této práci jsou analyzovány možné způsoby útoků a je vybrán nejnebezpečnější. Jedná se o teroristický útok z vnějšku letounu za použití tříštivé bojové hlavice rakety. Tato bojová hlavice působí poškození draku letounu rojem střepin vzniklých při výbuchu. Je definován způsob určení zasažené plochy letounu za použití analytické geometrie. Analytickými rovnicemi jsou popsány geometrie rozptylu střepin a geometrie ...

  6. Quantifying Public Response towards Islam on Twitter after Paris Attacks

    OpenAIRE

    Magdy, Walid; Darwish, Kareem; Abokhodair, Norah

    2015-01-01

    The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in general. This created a global discussion between those attacking and those defending Islam and M...

  7. Altus aircraft on runway

    Science.gov (United States)

    1996-01-01

    The remotely piloted Altus aircraft flew several developmental test flights from Rogers Dry Lake adjacent to NASA's Dryden Flight Research Center, Edwards, Calif., in 1996. The Altus--the word is Latin for 'high'--is a variant of the Predator surveillance drone built by General Atomics/Aeronautical Systems, Inc. It is designed for high-altitude, long-duration scientific sampling missions, and is powered by a turbocharged four-cylinder piston engine. The first Altus was developed under NASA's Environmental Research Aircraft and Sensor Technology program, while a second Altus was built for a Naval Postgraduate School/Department of Energy program. A pilot in a control station on the ground flew the craft by radio signals, using visual cues from a video camera in the nose of the Altus and information from the craft's air data system. Equipped with a single-stage turbocharger during the 1996 test flights, the first Altus reached altitudes in the 37,000-foot range, while the similarly-equipped second Altus reached 43,500 feet during developmental flights at Dryden in the summer of 1997. The NASA Altus also set an endurance record of more than 26 hours while flying a science mission in late 1996 and still had an estimated 10 hours of fuel remaining when it landed. Now equipped with a two-stage turbocharger, the NASA Altus maintained an altitude of 55,000 feet for four hours during flight tests in 1999.

  8. Radial cylinder aircraft engines

    OpenAIRE

    Šimíček, Petr

    2015-01-01

    Práce je zaměřena na konstrukční řešení letadlových hvězdicových motorů. Úvod je pojednáním o historii letadlových hvězdicových motorů a jejich vývoji v historickém kontextu. Druhá část je zaměřena na konstrukci letadlových hvězdicových motorů, následně jsou uvedena některá zajímavá konstrukční řešení a porovnání s motorem jiného druhu konstrukce. The bachelor's thesis is focused on design of aircraft radial engines. Home is a treatise on the history of aircraft radial engines and their de...

  9. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare. PMID:27358016

  10. Effect of migraine attacks on paracetamol absorption.

    OpenAIRE

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine atta...

  11. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  12. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  13. Fast Collision Attack on MD5

    OpenAIRE

    Stevens, Marc

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfill restrictions to properly rotate the differentials in the first round. We will present a new algorithm to find the first block and we will use an algorithm of Klima to find the second block. To o...

  14. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  15. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  16. Aviation industry-research in aircraft finance

    OpenAIRE

    Ehrenthal, Joachim C.F.

    2010-01-01

    Aircraft values are key to aircraft financing decisions: Aircraft values act as a source of security for providers of debt capital and lessors failing to re-place aircraft, and as a source of upside potential to equity investors. Yet, aircraft values cannot be precisely and continuously monitored. This is because neither actual primary nor secondary aircraft transaction prices are disclosed. Various types of third party valuation estimates exist, but relying solely on third party appraisa...

  17. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  18. MISSILES AND AIRCRAFT (PART1

    Directory of Open Access Journals (Sweden)

    C.M. Meyer

    2012-02-01

    Full Text Available Many sources maintain that the role played by air power in the 1973 Yom Kippur War was important. Other interpretations state that control of air space over the battlefield areas, (either by aircraft or anti-aircraft defences, was vital.

  19. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia

    OpenAIRE

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Introduction Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. Methods The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (200...

  20. Cryptographic Attacks and Countermeasures - A Mathematical View

    OpenAIRE

    Canright, David; Stanica, Pantelimon

    2009-01-01

    2009 CyberSecurity Summit, Naval Postgraduate School 1st NPS Cyber Summit was held at the Naval Postgraduate School in Monterey, California on October 29, 2009. Sessions were held on the following topics: security requirements, Kerchkoffs' principle, mathematics of cybersecurity, the data encryption standard, nonlinear equations, Cyber attacks on Bluetooth EQ, Crypto properties of S-boxes.

  1. Modified localized attack on complex network

    Science.gov (United States)

    Dong, Gaogao; Du, Ruijin; Hao, Huifang; Tian, Lixin

    2016-01-01

    Since a shell structure contains a wealth of information, it is not only very important for understanding the transport properties of the network, but also essential to identify influential spreaders in complex networks. Nodes within each shell can be classified into two categories: protected nodes and unprotected nodes. In this paper, we propose a generalization of the localized attack, modified localized attack, which means that when a randomly chosen node (root node) is under attack, protected nodes will not be removed, but unprotected nodes in the nearest shells will fail. We numerically and analytically study the system robustness under this attack by taking an Erdös-Rényi (ER) network, a regular random (RR) network and a scale-free (SF) network as examples. Moreover, a fraction of nodes belonging to giant component S and a critical threshold q c , where S approaches to zero, are given. The result implies that increasing connection density has been found to be useful to significantly improve network robustness.

  2. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  3. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  4. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  5. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  6. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the variables, with…

  7. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  8. Nonepileptic attack disorder among married women

    Directory of Open Access Journals (Sweden)

    Dhanaraj M

    2005-01-01

    Full Text Available Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized ′attack.′ The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. Results: The mean duration of illness was 18 months, and the pattern of the attack was ′fall and lying still′ in 53% and ′fall with generalized motor movements′ in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (c2 = 9.02, P = 0.003 and constant quarrel with other family members (c2 = 5.19, P = 0.02. The prevalence of sexual abuse was low (7%. Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (c2 = 4.52, P = 0.03 and lower frequency of attack at the time of reporting (c2 = 3.88, P = 0.05 correlated with good outcomes. Conclusion : Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  9. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  10. Fault Tolerant Control Design for the Longitudinal Aircraft Dynamics using Quantitative Feedback Theory

    OpenAIRE

    Ossmann, Daniel

    2015-01-01

    Flight control laws of modern aircraft are scheduled with respect to flight point parameters. The loss of the air data measurement system implies inevitably the loss of relevant scheduling information. A strategy to design a fault tolerant longitudinal flight control system is proposed which can accommodate the total loss of the angle of attack and the calibrated airspeed measurements. In this scenario the described robust longitudinal control law is employed ensuring a control performance ...

  11. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  12. Yaw Control At High Angles Of Attack

    Science.gov (United States)

    Murri, Daniel G.; Rao, Dhanvada M.

    1988-01-01

    Hinged, conformal forebody strakes provide control when rudders become ineffective. Device consists of symmetric pair of longitudinally hinged strakes designed to fold completely into forebody contour. Strakes rotate individually out into external flow. Asymmetric flow produced by deployed strake generates sideward force causing aircraft to yaw.

  13. Commercial aircraft composite technology

    CERN Document Server

    Breuer, Ulf Paul

    2016-01-01

    This book is based on lectures held at the faculty of mechanical engineering at the Technical University of Kaiserslautern. The focus is on the central theme of societies overall aircraft requirements to specific material requirements and highlights the most important advantages and challenges of carbon fiber reinforced plastics (CFRP) compared to conventional materials. As it is fundamental to decide on the right material at the right place early on the main activities and milestones of the development and certification process and the systematic of defining clear requirements are discussed. The process of material qualification - verifying material requirements is explained in detail. All state-of-the-art composite manufacturing technologies are described, including changes and complemented by examples, and their improvement potential for future applications is discussed. Tangible case studies of high lift and wing structures emphasize the specific advantages and challenges of composite technology. Finally,...

  14. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim. PMID:16936505

  15. Aircraft recognition and pose estimation

    Science.gov (United States)

    Hmam, Hatem; Kim, Jijoong

    2000-05-01

    This work presents a geometry based vision system for aircraft recognition and pose estimation using single images. Pose estimation improves the tracking performance of guided weapons with imaging seekers, and is useful in estimating target manoeuvres and aim-point selection required in the terminal phase of missile engagements. After edge detection and straight-line extraction, a hierarchy of geometric reasoning algorithms is applied to form line clusters (or groupings) for image interpretation. Assuming a scaled orthographic projection and coplanar wings, lateral symmetry inherent in the airframe provides additional constraints to further reject spurious line clusters. Clusters that accidentally pass all previous tests are checked against the original image and are discarded. Valid line clusters are then used to deduce aircraft viewing angles. By observing that the leading edges of wings of a number of aircraft of interest are within 45 to 65 degrees from the symmetry axis, a bounded range of aircraft viewing angles can be found. This generic property offers the advantage of not requiring the storage of complete aircraft models viewed from all aspects, and can handle aircraft with flexible wings (e.g. F111). Several aircraft images associated with various spectral bands (i.e. visible and infra-red) are finally used to evaluate the system's performance.

  16. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  17. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  18. Flight mechanics of a tailless articulated wing aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Paranjape, Aditya A; Chung, Soon-Jo; Selig, Michael S, E-mail: sjchung@illinois.edu [Department of Aerospace Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 (United States)

    2011-06-15

    This paper investigates the flight mechanics of a micro aerial vehicle without a vertical tail in an effort to reverse-engineer the agility of avian flight. The key to stability and control of such a tailless aircraft lies in the ability to control the incidence angles and dihedral angles of both wings independently. The dihedral angles can be varied symmetrically on both wings to control aircraft speed independently of the angle of attack and flight path angle, while asymmetric dihedral can be used to control yaw in the absence of a vertical stabilizer. It is shown that wing dihedral angles alone can effectively regulate sideslip during rapid turns and generate a wide range of equilibrium turn rates while maintaining a constant flight speed and regulating sideslip. Numerical continuation and bifurcation analysis are used to compute trim states and assess their stability. This paper lays the foundation for design and stability analysis of a flapping wing aircraft that can switch rapidly from flapping to gliding flight for agile manoeuvring in a constrained environment.

  19. Flight mechanics of a tailless articulated wing aircraft

    International Nuclear Information System (INIS)

    This paper investigates the flight mechanics of a micro aerial vehicle without a vertical tail in an effort to reverse-engineer the agility of avian flight. The key to stability and control of such a tailless aircraft lies in the ability to control the incidence angles and dihedral angles of both wings independently. The dihedral angles can be varied symmetrically on both wings to control aircraft speed independently of the angle of attack and flight path angle, while asymmetric dihedral can be used to control yaw in the absence of a vertical stabilizer. It is shown that wing dihedral angles alone can effectively regulate sideslip during rapid turns and generate a wide range of equilibrium turn rates while maintaining a constant flight speed and regulating sideslip. Numerical continuation and bifurcation analysis are used to compute trim states and assess their stability. This paper lays the foundation for design and stability analysis of a flapping wing aircraft that can switch rapidly from flapping to gliding flight for agile manoeuvring in a constrained environment.

  20. Flight Dynamics of Flexible Aircraft with Aeroelastic and Inertial Force Interactions

    Science.gov (United States)

    Nguyen, Nhan T.; Tuzcu, Ilhan

    2009-01-01

    This paper presents an integrated flight dynamic modeling method for flexible aircraft that captures coupled physics effects due to inertial forces, aeroelasticity, and propulsive forces that are normally present in flight. The present approach formulates the coupled flight dynamics using a structural dynamic modeling method that describes the elasticity of a flexible, twisted, swept wing using an equivalent beam-rod model. The structural dynamic model allows for three types of wing elastic motion: flapwise bending, chordwise bending, and torsion. Inertial force coupling with the wing elasticity is formulated to account for aircraft acceleration. The structural deflections create an effective aeroelastic angle of attack that affects the rigid-body motion of flexible aircraft. The aeroelastic effect contributes to aerodynamic damping forces that can influence aerodynamic stability. For wing-mounted engines, wing flexibility can cause the propulsive forces and moments to couple with the wing elastic motion. The integrated flight dynamics for a flexible aircraft are formulated by including generalized coordinate variables associated with the aeroelastic-propulsive forces and moments in the standard state-space form for six degree-of-freedom flight dynamics. A computational structural model for a generic transport aircraft has been created. The eigenvalue analysis is performed to compute aeroelastic frequencies and aerodynamic damping. The results will be used to construct an integrated flight dynamic model of a flexible generic transport aircraft.

  1. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  2. 36 CFR 331.14 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 331.14 Section 331..., KENTUCKY AND INDIANA § 331.14 Aircraft. (a) The operation of aircraft on WCA lands and waters is prohibited... prohibited. (c) The provisions of this section shall not be applicable to aircraft engaged on...

  3. 48 CFR 246.408-71 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Aircraft. 246.408-71... Aircraft. (a) The Federal Aviation Administration (FAA) has certain responsibilities and prerogatives in connection with some commercial aircraft and of aircraft equipment and accessories (Pub. L. 85-726 (72...

  4. 36 CFR 327.4 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 327.4 Section 327.4... Aircraft. (a) This section pertains to all aircraft including, but not limited to, airplanes, seaplanes, helicopters, ultra-light aircraft, motorized hang gliders, hot air balloons, any non-powered flight devices...

  5. 14 CFR 141.39 - Aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft. 141.39 Section 141.39 Aeronautics... CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.39 Aircraft. (a... certificate or provisional pilot school certificate must show that each aircraft used by the school for...

  6. 40 CFR 87.6 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Aircraft safety. 87.6 Section 87.6... POLLUTION FROM AIRCRAFT AND AIRCRAFT ENGINES General Provisions § 87.6 Aircraft safety. The provisions of... met within the specified time without creating a safety hazard....

  7. Studies on the Seizure of Rudder on the Flight Safety of an Aircraft

    Institute of Scientific and Technical Information of China (English)

    GENG Jianzhong; WU Huzi; DUAN Zhuoyi

    2013-01-01

    The demands of aircraft quality design criterion on main control system failure and subsequently instantaneous response were analyzed.According to the simulation,the flight characteristics of an aircraft were studied in different angle of rudder seizure.It demonstrated that when rudder seizure with high angle and pilot could not take action immediately,the flight parameters would change sharply.The yaw angle increased 50 degrees in 5 minutes,side velocity could attain 40 meters per-second,the angle of attack and sideslip would surpass 30 degrees,roll rate would reach-20 degrees per second,side load would arrive 0.6g.Simultaneity the angle of attack exceeded the limited angle,the aircraft would stall.If control wasn' t working,the disaster would happen.These phenomena supply the sufficient information of the rudder malfunction.The validity of correcting yaw moment by asymmetry thrust was testified,the simulation results showed that even rudder seizure in most serious conditions,adopting asymmetry thrust can correct yaw moment caused by the rudder seizure.The judgment standards of flight safety level for the state of malfunction were given.The safety level was assessed caused by the rudder seizure.For an aircraft with two engines on one side,the pilots need to adjust the 4 engines to balance the asymmetric moment,the work load is increased enormously.According the flight safety standards,the safety level is level Ⅲ.

  8. CFD zonal modeling of leading-edge ice effects for a complete aircraft

    Science.gov (United States)

    Summa, J. M.; Strash, D. J.; Lednicer, D. A.

    1993-01-01

    A simplified, uncoupled zonal procedure was utilized to assess the capability of numerically simulating icing effects on a Boeing 727-200 aircraft. The computational approach combines potential flow, plus boundary layer simulations by VSAERO for the un-iced aircraft forces and moments, with Navier-Stokes simulations by ARC3D for the incremental forces and moments due to iced components. These are compared with wind tunnel longitudinal force and moment data. Although the computational results compared favorably with the test data in the linear angle of attack range, it is clear that for general aircraft icing calculations, a multiblock Navier-Stokes code will be required for the viscous component of this zonal method.

  9. Western Pacific Typhoon Aircraft Fixes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Western Pacific typhoon aircraft reconnaissance data from the years 1946 - 1965 and 1978, excluding 1952, were transcribed from original documents, or copy of...

  10. Electromagnetic Interference In New Aircraft

    Science.gov (United States)

    Larsen, William E.

    1991-01-01

    Report reviews plans to develop tests and standards to ensure that digital avionics systems in new civil aircraft immune to electromagnetic interference (EMI). Updated standards reflect more severe environment and vulnerabilities of modern avionics.

  11. VTOL to Transonic Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The cyclogyro, an aircraft propulsion concept with the potential for VTOL to the lower bounds of transonic flight, is conceptually simple but structurally and...

  12. Alloy design for aircraft engines

    Science.gov (United States)

    Pollock, Tresa M.

    2016-08-01

    Metallic materials are fundamental to advanced aircraft engines. While perceived as mature, emerging computational, experimental and processing innovations are expanding the scope for discovery and implementation of new metallic materials for future generations of advanced propulsion systems.

  13. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  14. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  15. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date. PMID:26115644

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  17. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  18. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof;

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In...... this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible...... attacks in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  19. Heart Attack Before 50 Ups Early Death Risk

    Science.gov (United States)

    ... 160692.html Heart Attack Before 50 Ups Early Death Risk But healthy living can improve those odds, ... 30, 2016 (HealthDay News) -- The risk of early death after a heart attack has lessened over the ...

  20. Nonlinear optical cryptosystem resistant to standard and hybrid attacks

    Science.gov (United States)

    Sinha, Aloka

    2016-06-01

    We propose a nonlinear optical cryptosystem that is resistant to amplitude-phase retrieval attacks, known-plaintext attack and chosen-plaintext attack. A squaring operation is introduced in the encryption path, which thwarts the iterative attacks. This nonlinear operation tends to amplify the error in the estimation during an iterative attack. The decryption process requires the use of a square-root operation. Thus, in the reverse path also, the attacks encounter the nonlinear square-root operation. These two nonlinearities make the iterative attacks unstable, thereby leading to non-convergence of the mean square error (MSE). Our technique is also resistant to hybrid attacks. The technique is general and is shown to work on a variety of images of the type grayscale and binary. Numerical simulation results corroborate the effectiveness of the proposed cryptosystem.

  1. Concrete Deterioration under Alternate Action of Carbonation and Sulfate Attack

    Directory of Open Access Journals (Sweden)

    Fenglan Li

    2013-11-01

    Full Text Available By micro- and macro-observations, the study reveals the deterioration mechanisms of concrete under alternate action of carbonation and sodium sulfate solution attack (C-SA comparied with the single sodium sulfate solution attack (SA. The studies indicate that in both cases, the main attack product is ettringite, some gypsum is checked only in the first layer of case SA, the thaumasite form of sulfate attack is not initiated in case C-SA. Compared with the single sodium sulfate solution attack, although the carbonation layer mitigates the extent of sulfate attack in limited exposure period, the alternate action of carbonation and sulfate attack still leads to strength degradation to some extent. The effect of carbonation on sulfate attack for longer exposure period deserves further research.

  2. Sex Suffers for Younger Adults After Heart Attack

    Science.gov (United States)

    ... gov/news/fullstory_160722.html Sex Suffers for Younger Adults After Heart Attack Lack of interest a ... 2016 (HealthDay News) -- After a heart attack, many younger adults experience sexual difficulties -- and women more so ...

  3. Heart Attack Help? There's an App for That

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159504.html Heart Attack Help? There's an App for That Emergency medicine ... American Heart Association. When someone is suffering a heart attack, stroke or cardiac arrest, quick action can be ...

  4. Extensions of the Cube Attack Based on Low Degree Annihilators

    Science.gov (United States)

    Zhang, Aileen; Lim, Chu-Wee; Khoo, Khoongming; Wei, Lei; Pieprzyk, Josef

    At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

  5. Heart Attack: Tips for Recovering and Staying Well

    Science.gov (United States)

    ... version Heart Attack | Tips for Recovering and Staying Well If you have had a heart attack, you ... healthy diet. The food you eat affects how well your blood flows through your heart and arteries. ...

  6. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  7. Securing iris recognition systems against masquerade attacks

    OpenAIRE

    Galbally Herrero, Javier; Gómez-Barrero, Marta; Ross, Arun A.; Fiérrez, Julián; Ortega-García, Javier

    2013-01-01

    Javier Galbally ; Marta Gomez-Barrero ; Arun Ross ; Julian Fierrez ; Javier Ortega-Garcia; "Securing iris recognition systems against masquerade attacks", Biometric and Surveillance Technology for Human and Activity Identification X, Proc. SPIE 8712 (May 31, 2013); doi:10.1117/12.2015690. Copyright 2013 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in...

  8. Transient ischemic attack after Mesobuthus gibbosus envenomation

    OpenAIRE

    Golcuk, Yalcin; Ozsarac, Murat; Bilge, Adnan; Golcuk, Burcu; Cinar, Bilge Piri; Hayran, Mustafa

    2014-01-01

    Endometriosis Mesobuthus gibbosus is a medically important venomous scorpion in western of Turkey which causes significant morbidity. Envenoming of this species scorpion results with varying degrees of local symptoms and clinically important systemic effects. This case describes an authenticated first case of transient ischemic attack in a 68 year-old-woman following envenoming by M. gibbosus in Turkey.Keywords: Scorpion, Envenomation, Emergency department

  9. Visualizing Endpoint Security Technologies using Attack Trees

    OpenAIRE

    Pettersson , Stefan

    2008-01-01

    Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memo...

  10. Towards a translational model of panic attacks

    OpenAIRE

    Luiz Carlos Schenberg

    2010-01-01

    About 20 years ago, Deakin and Graeff proposed that whereas generalized anxiety disorder is produced by the overactivity of 5-HT excitatory projections from dorsal raphe nucleus to the areas of prefrontal cortex and amygdala which process distal threat, panic attacks are a dysfunction of 5-HT inhibitory projections from dorsal raphe nucleus to the dorsal periaqueductal gray matter, thereby releasing the responses to proximal threat, innate fear or anoxia. Besides, they suggested that the decr...

  11. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  12. An Analysis of Various Attacks in MANET

    OpenAIRE

    M.Udhayamoorthi; C. Senthilkumar; Dr S. Karthik; Dr. T.Kalaikumaran

    2014-01-01

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. According to the perspective of our paper, we try to connect the current status of computers era to adhoc networking. As adhoc networks has been unleashing several updated technologies, it is the most growing area in the field of networks in information and communication Engineering has ever seen .we start with area introduction, deeply reviewed about the various attacks es...

  13. Attacks and Counterattacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nusrat Fatema

    2013-12-01

    Full Text Available WSN is formed by autonomous nodes with partial memo ry, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The applicat ion field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides so lutions for the WSN threats.

  14. Quantum Key Distribution against Trojan Horse Attacks

    Institute of Scientific and Technical Information of China (English)

    CAI Qing-Yu; LV Hua

    2007-01-01

    Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks. Our scheme is not an improvement of the communication apparatus, but the improvement of quantum communication protocol itself. We show that our modified schemes may be implemented with current technology.

  15. Nonepileptic attack disorder among married women

    OpenAIRE

    Dhanaraj M; Rangaraj R; Arulmozhi T; Vengatesan A

    2005-01-01

    Aim : To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Design: Prospective cohort study with 1-year follow-up. Setting: A tertiary care teaching hospital. Subjects: Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. Materials and Methods: The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the...

  16. Securing iris recognition systems against masquerade attacks

    Science.gov (United States)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  17. NETWORK SECURITY: ATTACKS, TOOLS AND TECHNIQUES

    OpenAIRE

    Mhatre Suvidnya Shashikant; Potadar Devangi; Salvi Bhageshree

    2015-01-01

    Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network admini st rators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network.

  18. Challenges in Aircraft Noise Prediction

    OpenAIRE

    Filippone A

    2014-01-01

    This contribution addresses the problem of aircraft noise prediction using theoretical methods. The problem is set in context with the needs at several levels to produce noise characterisation from commercial aircraft powered by gas turbine engines. We describe very briefly the computational model (whilst referring the reader to the appropriate literature), and provide examples of noise predictions and comparisons with measured data, where possible. We focus on the issue of stochastic analysi...

  19. Neural networks for aircraft control

    Science.gov (United States)

    Linse, Dennis

    1990-01-01

    Current research in Artificial Neural Networks indicates that networks offer some potential advantages in adaptation and fault tolerance. This research is directed at determining the possible applicability of neural networks to aircraft control. The first application will be to aircraft trim. Neural network node characteristics, network topology and operation, neural network learning and example histories using neighboring optimal control with a neural net are discussed.

  20. Attack Detection By Clustering And Classification Approach

    Directory of Open Access Journals (Sweden)

    Priyanka J. Pathak, Prof. Snehlata Dongre

    2012-04-01

    Full Text Available Intrusion detection is a software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Security is becoming big issue for all networks. Hackers and intruders have made many successful attempts to bring down high profile company networks and web services. Intrusion Detection System (IDS is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. The work is implemented in two phases, in first phase clustering by K-means is done and in next step of classification is done with k-nearest neighbours and decision trees. The objects are clustered or grouped based on the principle of maximizing the intra-class similarity and minimizing the interclass similarity. This paper proposes an approach which make the clusters of similar attacks and in next step of classification with K nearest neighbours and Decision trees it detect the attack types. This method is advantageous over single classifier as it detect better class than single classifier system.

  1. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    OpenAIRE

    Honglong Chen; Wei Lou; Xice Sun; Zhi Wang

    2010-01-01

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against worm...

  2. A Structured Multi-signature Scheme Against Forgery Attack

    Directory of Open Access Journals (Sweden)

    Wenjun Luo

    2011-12-01

    Full Text Available There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

  3. Migraineurs with exercise-triggered attacks have a distinct migraine

    OpenAIRE

    Koppen, Hille; van Veldhoven, Peter LJ

    2013-01-01

    Background Sport as a migraine trigger has been reported, but extensive information on these triggered attacks and the patients experiencing these attacks is lacking. Goal of this study was to investigate the lifetime prevalence of exercise triggered migraine attacks in migraine patients and if patients with exercise triggered attacks experience specific prodromal or ictal migraine symptoms. Methods 103 consecutive migraine patients seen during their first visit at a Dutch headache clinic wer...

  4. Machine Learning Methods for Attack Detection in the Smart Grid

    OpenAIRE

    Ozay, Mete; Esnaola, Inaki; Vural, Fatos T. Yarman; Kulkarni, Sanjeev R.; Poor, H. Vincent

    2015-01-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed appro...

  5. Detecting man-in-the-middle attacks by precise timing

    OpenAIRE

    Aziz, Benjamin; Hamilton, G.

    2009-01-01

    Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a s...

  6. Innovations in Aircraft Design

    Science.gov (United States)

    1997-01-01

    The Boeing 777 carries with it basic and applied research, technology, and aerodynamic knowledge honed at several NASA field centers. Several Langley Research Center innovations instrumental to the development of the aircraft include knowledge of how to reduce engine and other noise for passengers and terminal residents, increased use of lightweight aerospace composite structures for increased fuel efficiency and range, and wind tunnel tests confirming the structural integrity of 777 wing-airframe integration. Test results from Marshall Space Flight Center aimed at improving the performance of the Space Shuttle engines led to improvements in the airplane's new, more efficient jet engines. Finally, fostered by Ames Research Center, the Boeing 777 blankets that protect areas of the plane from high temperatures and fire have a lineage to Advanced Flexible Reusable Surface Insulation used on certain areas of the Space Shuttle. According to Boeing Company estimates, the 777 has captured three-quarters of new orders for airplanes in its class since the program was launched.

  7. Aircraft exhaust sulfur emissions

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R.C.; Anderson, M.R.; Miake-Lye, R.C.; Kolb, C.E. [Aerodyne Research, Inc., Billerica, MA (United States). Center for Chemical and Environmental Physics; Sorokin, A.A.; Buriko, Y.I. [Scientific Research Center `Ecolen`, Moscow (Russian Federation)

    1997-12-31

    The extent to which fuel sulfur is converted to SO{sub 3} during combustion and the subsequent turbine flow in supersonic and subsonic aircraft engines is estimated numerically. The analysis is based on: a flamelet model with non-equilibrium sulfur chemistry for the combustor, and a one-dimensional, two-stream model with finite rate chemical kinetics for the turbine. The results indicate that between 2% and 10% of the fuel sulfur is emitted as SO{sub 3}. It is also shown that, for a high fuel sulfur mass loading, conversion in the turbine is limited by the level of atomic oxygen at the combustor exit, leading to higher SO{sub 2} oxidation efficiency at lower fuel sulfur loadings. While SO{sub 2} and SO{sub 3} are the primary oxidation products, the model results further indicate H{sub 2}SO{sub 4} levels on the order of 0.1 ppm for supersonic expansions through a divergent nozzle. This source of fully oxidized S(6) (SO{sub 3} + H{sub 2}SO{sub 4}) exceeds previously calculated S(6) levels due to oxidation of SO{sub 2} by OH in the exhaust plume outside the engine nozzle. (author) 26 refs.

  8. Optimization in fractional aircraft ownership

    Science.gov (United States)

    Septiani, R. D.; Pasaribu, H. M.; Soewono, E.; Fayalita, R. A.

    2012-05-01

    Fractional Aircraft Ownership is a new concept in flight ownership management system where each individual or corporation may own a fraction of an aircraft. In this system, the owners have privilege to schedule their flight according to their needs. Fractional management companies (FMC) manages all aspects of aircraft operations, including utilization of FMC's aircraft in combination of outsourced aircrafts. This gives the owners the right to enjoy the benefits of private aviations. However, FMC may have complicated business requirements that neither commercial airlines nor charter airlines faces. Here, optimization models are constructed to minimize the number of aircrafts in order to maximize the profit and to minimize the daily operating cost. In this paper, three kinds of demand scenarios are made to represent different flight operations from different types of fractional owners. The problems are formulated as an optimization of profit and a daily operational cost to find the optimum flight assignments satisfying the weekly and daily demand respectively from the owners. Numerical results are obtained by Genetic Algorithm method.

  9. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  10. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  11. A Review of Man-in-the-Middle Attacks

    OpenAIRE

    Gangan, Subodh

    2015-01-01

    This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.

  12. Vulnerability Assessment by Learning Attack Specifications in Graphs

    OpenAIRE

    Franqueira, Virginia N L; Lopes, Raul H. C.

    2007-01-01

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies to networks in general, including social networks and computer grid.

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  14. Aircraft Cabin Environmental Quality Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Gundel, Lara; Kirchstetter, Thomas; Spears, Michael; Sullivan, Douglas

    2010-05-06

    The Indoor Environment Department at Lawrence Berkeley National Laboratory (LBNL) teamed with seven universities to participate in a Federal Aviation Administration (FAA) Center of Excellence (COE) for research on environmental quality in aircraft. This report describes research performed at LBNL on selecting and evaluating sensors for monitoring environmental quality in aircraft cabins, as part of Project 7 of the FAA's COE for Airliner Cabin Environmental Research (ACER)1 effort. This part of Project 7 links to the ozone, pesticide, and incident projects for data collection and monitoring and is a component of a broader research effort on sensors by ACER. Results from UCB and LBNL's concurrent research on ozone (ACER Project 1) are found in Weschler et al., 2007; Bhangar et al. 2008; Coleman et al., 2008 and Strom-Tejsen et al., 2008. LBNL's research on pesticides (ACER Project 2) in airliner cabins is described in Maddalena and McKone (2008). This report focused on the sensors needed for normal contaminants and conditions in aircraft. The results are intended to complement and coordinate with results from other ACER members who concentrated primarily on (a) sensors for chemical and biological pollutants that might be released intentionally in aircraft; (b) integration of sensor systems; and (c) optimal location of sensors within aircraft. The parameters and sensors were selected primarily to satisfy routine monitoring needs for contaminants and conditions that commonly occur in aircraft. However, such sensor systems can also be incorporated into research programs on environmental quality in aircraft cabins.

  15. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  16. Upset Simulation and Training Initiatives for U.S. Navy Commercial Derived Aircraft

    Science.gov (United States)

    Donaldson, Steven; Priest, James; Cunningham, Kevin; Foster, John V.

    2012-01-01

    Militarized versions of commercial platforms are growing in popularity due to many logistical benefits in the form of commercial off-the-shelf (COTS) parts, established production methods, and commonality for different certifications. Commercial data and best practices are often leveraged to reduce procurement and engineering development costs. While the developmental and cost reduction benefits are clear, these militarized aircraft are routinely operated in flight at significantly different conditions and in significantly different manners than for routine commercial flight. Therefore they are at a higher risk of flight envelope exceedance. This risk may lead to departure from controlled flight and/or aircraft loss1. Historically, the risk of departure from controlled flight for military aircraft has been mitigated by piloted simulation training and engineering analysis of typical aircraft response. High-agility military aircraft simulation databases are typically developed to include high angles of attack (AoA) and sideslip due to the dynamic nature of their missions and have been developed for many tactical configurations over the previous decades. These aircraft simulations allow for a more thorough understanding of the vehicle flight dynamics characteristics at high AoA and sideslip. In recent years, government sponsored research on transport airplane aerodynamic characteristics at high angles of attack has produced a growing understanding of stall/post-stall behavior. This research along with recent commercial airline training initiatives has resulted in improved understanding of simulator-based training requirements and simulator model fidelity.2-5 In addition, inflight training research over the past decade has produced a database of pilot performance and recurrency metrics6. Innovative solutions to aerodynamically model large commercial aircraft for upset conditions such as high AoA, high sideslip, and ballistic damage, as well as capability to accurately

  17. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  18. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  19. WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Shree Om

    2011-01-01

    Full Text Available Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack.

  20. Attack Graph-Based Risk Assessment and Optimisation Approach

    Directory of Open Access Journals (Sweden)

    Mohammed Alhomidi

    2014-06-01

    Full Text Available Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA. Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimization solutions a range of solutions can be presented to a user of the methodology.

  1. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism...

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.;

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  3. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  4. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Paydar

    2012-01-01

    Full Text Available Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h. Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51 years. One hundred thirty-five (66.8% patients were males. Twenty-six (12.8% were children. Burn was the most prevalent cause of admission. Five (13.5% patients needed chest tube insertion and eight (21% needed skin grafts due to burn. Overall, 12 patients expired (5%. Three (25% of them were children (2 and 6, and 11 years old. Mortality rate was significantly higher among the children than adults (P value <0.05. The most important cause of death was head trauma which was seen in five (41.6% of the expired patients followed by burn (including air way burn in four (33%, and internal bleeding in three (25%. Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05. Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  5. Analysis of aircraft maintenance models

    Directory of Open Access Journals (Sweden)

    Vlada S. Sokolović

    2011-10-01

    Full Text Available This paper addressed several organizational models of aircraft maintenance. All models presented so far have been in use in Air Forces, so that the advantages and disadvantages of different models are known. First it shows the current model of aircraft maintenance as well as its basic characteristics. Then the paper discusses two organizational models of aircraft maintenance with their advantages and disadvantages. The advantages and disadvantages of different models are analyzed based on the criteria of operational capabilities of military units. In addition to operational capabilities, the paper presents some other criteria which should be taken into account in the evaluation and selection of an optimal model of aircraft maintenance. Performing a qualitative analysis of some models may not be sufficient for evaluating the optimum choice for models of maintenance referring to the selected set of criteria from the scope of operational capabilities. In order to choose the optimum model, it is necessary to conduct a detailed economic and technical analysis of individual tactical model maintenance. A high-quality aircraft maintenance organization requires the highest state and army authorities to be involved. It is necessary to set clear objectives for all the elements of modern air force technical support programs based on the given evaluation criteria.

  6. Turbofan blade stresses induced by the flow distortion of a VTOL inlet at high angles of attack

    Science.gov (United States)

    Williams, R. C.; Diedrich, J. H.; Shaw, R. J.

    1983-01-01

    A 51-cm-diameter turbofan with a tilt-nacelle VTOL inlet was tested in the Lewis Research Center's 9- by 15-Ft Low Speed Wind Tunnel at velocities up to 72 m/s and angles of attack up to 120 deg. Fan-blade vibratory stress levels were investigated over a full aircraft operating range. These stresses were due to inlet air flow distortion resulting from (1) internal flow separation in the inlet, and (2) ingestion of the exterior nacelle wake. Stress levels are presented, along with an estimated safe operating envelope, based on infinite blade fatigue life.

  7. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  8. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  9. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  10. Competitive reactions to advertising and promotion attacks.

    OpenAIRE

    Steenkamp, Jan-Benedict E.M.; Vincent R. Nijs; Hanssens, Dominique M; Dekimpe, Marnik G.

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  11. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  12. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  13. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  14. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property for the...

  15. Robustness of correlated networks against propagating attacks

    CERN Document Server

    Hasegawa, Takehisa; Nemoto, Koji

    2012-01-01

    We investigate robustness of correlated networks against propagating attacks modeled by a susceptible-infected-removed model. By Monte-Carlo simulations, we numerically determine the first critical infection rate, above which a global outbreak of disease occurs, and the second critical infection rate, above which disease disintegrates the network. Our result shows that correlated networks are robust compared to the uncorrelated ones, regardless of whether they are assortative or disassortative. This behavior is related to the layered network structure inevitably generated by a rewiring procedure we adopt to realize correlated networks.

  16. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  17. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction in an...... improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which is a...

  18. Algorithm project weight calculation aircraft

    Directory of Open Access Journals (Sweden)

    Г. В. Абрамова

    2013-07-01

    Full Text Available The paper describes the process of a complex technical object design on the example of the aircraft, using information technology such as CAD/CAM/CAE-systems, presents the basic models of aircraft which are developed in the process of designing and reflect the different aspects of its structure and function. The idea of control parametric model at complex technical object design is entered, which is a set of initial data for the development of design stations and enables the optimal complex technical object control at all stages of design using modern computer technology. The paper discloses a process of weight design, which is associated with all stages of development aircraft and its production. Usage of a scheduling algorithm that allows to organize weight calculations are carried out at various stages of planning and weighing options to optimize the use of available database of formulas and methods of calculation

  19. MATE. Multi Aircraft Training Environment

    DEFF Research Database (Denmark)

    Hauland, G.; Bove, T.; Andersen, Henning Boje;

    2002-01-01

    A medium fidelity and low cost training device for pilots, called the Multi Aircraft Training Environment (MATE), is developed to replace other low fidelity stand-alone training devices and integrate them into a flexible environment, primarily aimed attraining pilots in checklist procedures. The...... cockpit switches and instruments in MATE are computer-generated graphics. The graphics are back projected onto semi-transparent touch screen panels in a hybrid cockpit mock-up. Thus, the MATE is relativelycheap, it is always available, it is reconfigurable (e.g. between types of aircraft/models to be...... in the MATE prototype was compared with the effects of traditional training that included the use of realaircraft. The experimental group (EXP) trained the pre-start checklist and the engine start checklist for the Saab 340 commuter aircraft in a MATE prototype. The control group (CTR) trained the...

  20. Hydrogen aircraft and airport safety

    International Nuclear Information System (INIS)

    First flight tests with a hydrogen demonstrator aircraft, currently under investigation in the scope of the German-Russia Cryoplane project, are scheduled for 1999. Regular service with regional aircraft may begin around 2005, followed by larger Airbus-type airliners around 2010-2015. The fuel storage aboard such airliners will be of the order of 15 t or roughly 200 m3 LH2. This paper investigates a number of safety problems associated with the handling and air transport of so much hydrogen. The same is done for the infrastructure on the airport. Major risks are identified, and appropriate measures in design and operation are recommended. It is found that hydrogen aircraft are no more dangerous than conventional ones - safer in some respects. (author)

  1. TRAGEN: Computer program to simulate an aircraft steered to follow a specified verticle profile. User's guide

    Science.gov (United States)

    1983-01-01

    The longitudinal dynamics of a medium range twin-jet or tri-jet transport aircraft are simulated. For the climbing trajectory, the thrust is constrained to maximum value, and for descent, the thrust is set at idle. For cruise, the aircraft is held in the trim condition. For climb or descent, the aircraft is steered to follow either (a) a fixed profile which is input to the program or (b) a profile computed at the beginning of that segment of the run. For climb, the aircraft is steered to maintain the given airspeed as a function of altitude. For descent, the aircraft is steered to maintain the given altitude as a function of range-to-go. In both cases, the control variable is angle-of-attack. The given output trajectory is presented and compared with the input trajectory. Step climb is treated just as climb. For cruise, the Breguet equations are used to compute the fuel burned to achieve a given range and to connect given initial and final values of altitude and Mach number.

  2. Correction of static pressure on a research aircraft in accelerated flight using differential pressure measurements

    Directory of Open Access Journals (Sweden)

    A. R. Rodi

    2012-11-01

    Full Text Available A method is described that estimates the error in the static pressure measurement on an aircraft from differential pressure measurements on the hemispherical surface of a Rosemount model 858AJ air velocity probe mounted on a boom ahead of the aircraft. The theoretical predictions for how the pressure should vary over the surface of the hemisphere, involving an unknown sensitivity parameter, leads to a set of equations that can be solved for the unknowns – angle of attack, angle of sideslip, dynamic pressure and the error in static pressure – if the sensitivity factor can be determined. The sensitivity factor was determined on the University of Wyoming King Air research aircraft by comparisons with the error measured with a carefully designed sonde towed on connecting tubing behind the aircraft – a trailing cone – and the result was shown to have a precision of about ±10 Pa over a wide range of conditions, including various altitudes, power settings, and gear and flap extensions. Under accelerated flight conditions, geometric altitude data from a combined Global Navigation Satellite System (GNSS and inertial measurement unit (IMU system are used to estimate acceleration effects on the error, and the algorithm is shown to predict corrections to a precision of better than ±20 Pa under those conditions. Some limiting factors affecting the precision of static pressure measurement on a research aircraft are discussed.

  3. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  4. Drop attack during chest radiography: Case report

    International Nuclear Information System (INIS)

    Chest radiography is the first line of thoracic imaging performed in patients with thoracic diseases. It is probably the most frequently performed type of X-ray examination. It is recommended to be performed in the full upright position except where the patient's condition will not permit. This is because the erect technique allows full expansion of the lungs, prevents engorgement of pulmonary vessels and also helps in fluid level evaluation. However, little is reported on the negative effects associated with erect radiography. Herein, we present a case of drop attack during erect chest radiography. - Highlights: • Radiographers should be aware of the possibilities of drop attach during erect chest radiography. • A patient's determination to stand for chest radiograph may not always relate with the ability. • The causes of some drop attacks may be unknown. • Watching patients during radiographic exposure is essential. • Being alert and working very fast during erect chest examinations is important

  5. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  6. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  7. Application of dynamical systems theory to the high angle of attack dynamics of the F-14

    Science.gov (United States)

    Jahnke, Craig C.; Culick, Fred E. C.

    1990-01-01

    Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14s has been analyzed. The aerodynamic model, supplied by NASA, includes nonlinearities as functions of the angles of attack and sideslip, the rotation rate, and the elevator deflection. A continuation method has been used to calculate the steady states of the F-14 as continuous functions of the control surface deflections. Bifurcations of these steady states have been used to predict the onset of wing rock, spiral divergence, and jump phenomena which cause the aircraft to enter a spin. A simple feedback control system was designed to eliminate the wing rock and spiral divergence instabilities. The predictions were verified with numerical simulations.

  8. Composite components on commercial aircraft

    Science.gov (United States)

    Dexter, H. B.

    1980-01-01

    The paper considers the use of composite components in commercial aircraft. NASA has been active in sponsoring flight service programs with advanced composites for the last 10 years, with 2.5 million total composite component hours accumulated since 1970 on commercial transports and helicopters with no significant degradation in residual strength of composite components. Design, inspection, and maintenance procedures have been developed; a major NASA/US industry technology program has been developed to reduce fuel consumption of commercial transport aircraft through the use of advanced composites.

  9. Future aircraft networks and schedules

    Science.gov (United States)

    Shu, Yan

    2011-07-01

    Because of the importance of air transportation scheduling, the emergence of small aircraft and the vision of future fuel-efficient aircraft, this thesis has focused on the study of aircraft scheduling and network design involving multiple types of aircraft and flight services. It develops models and solution algorithms for the schedule design problem and analyzes the computational results. First, based on the current development of small aircraft and on-demand flight services, this thesis expands a business model for integrating on-demand flight services with the traditional scheduled flight services. This thesis proposes a three-step approach to the design of aircraft schedules and networks from scratch under the model. In the first step, both a frequency assignment model for scheduled flights that incorporates a passenger path choice model and a frequency assignment model for on-demand flights that incorporates a passenger mode choice model are created. In the second step, a rough fleet assignment model that determines a set of flight legs, each of which is assigned an aircraft type and a rough departure time is constructed. In the third step, a timetable model that determines an exact departure time for each flight leg is developed. Based on the models proposed in the three steps, this thesis creates schedule design instances that involve almost all the major airports and markets in the United States. The instances of the frequency assignment model created in this thesis are large-scale non-convex mixed-integer programming problems, and this dissertation develops an overall network structure and proposes iterative algorithms for solving these instances. The instances of both the rough fleet assignment model and the timetable model created in this thesis are large-scale mixed-integer programming problems, and this dissertation develops subproblem schemes for solving these instances. Based on these solution algorithms, this dissertation also presents

  10. Introduction to unmanned aircraft systems

    CERN Document Server

    Marshall, Douglas M; Hottman, Stephen B; Shappee, Eric; Most, Michael Thomas

    2011-01-01

    Introduction to Unmanned Aircraft Systems is the editors' response to their unsuccessful search for suitable university-level textbooks on this subject. A collection of contributions from top experts, this book applies the depth of their expertise to identify and survey the fundamentals of unmanned aircraft system (UAS) operations. Written from a nonengineering civilian operational perspective, the book starts by detailing the history of UASs and then explores current technology and what is expected for the future. Covering all facets of UAS elements and operation-including an examination of s

  11. Nondestructive testing of aging aircraft

    International Nuclear Information System (INIS)

    Aircraft fleet in the US military is getting old, averaging over 40 years. These old planes are planned to be used for additional 20-30 years. Some commercial fleets are getting older as well, though not on the same level. Many NDT methods are in practice and new ones being developed. Corrosion and fatigue are the two main sources of damage to aircraft structures and require cost-effective NDT methods to detect and characterize the damage. Current approaches to this difficult task reviewed.

  12. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  13. Stealth-MITM DoS Attacks on Secure Channels

    CERN Document Server

    Herzberg, Amir

    2009-01-01

    We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and p...

  14. Estimation of nuclear power plant aircraft hazards

    International Nuclear Information System (INIS)

    The standard procedures for estimating aircraft risk to nuclear power plants provide a conservative estimate, which is adequate for most sites, which are not close to airports or heavily traveled air corridors. For those sites which are close to facilities handling large numbers of aircraft movements (airports or corridors), a more precise estimate of aircraft impact frequency can be obtained as a function of aircraft size. In many instances the very large commercial aircraft can be shown to have an acceptably small impact frequency, while the very small general aviation aircraft will not produce sufficiently serious impact to impair the safety-related functions. This paper examines the in between aircraft: primarily twin-engine, used for business, pleasure, and air taxi operations. For this group of aircraft the total impact frequency was found to be approximately once in one million years, the threshold above which further consideration of specific safety-related consequences would be required

  15. Versatile Electric Propulsion Aircraft Testbed Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all-electric aircraft testbed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  16. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    Directory of Open Access Journals (Sweden)

    Narasimha Shashidhar

    2015-07-01

    Full Text Available Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.

  17. Causal Attribution, Perceived Benefits, and Morbidity After a Heart Attack: An 8-Year Study.

    Science.gov (United States)

    Affleck, Glenn; And Others

    1987-01-01

    Interviewed heart attack victims (N=287) seven weeks and eight years after their attack. Explored interrelations among causal attributions for the attack, survivor morbidity, and heart attack recurrence. Found that patients who cited benefits from their misfortune seven weeks after the first attack were less likely to have another attack and had…

  18. Residents' Annoyance Responses to Aircraft Noise Events

    OpenAIRE

    United States, National Aeronautics and Space Administration

    1983-01-01

    In a study conducted in the vicinity of Salt Lake City International Airport, community residents reported their annoyance with individual aircraft flyovers during rating sessions conducted in their homes. Annoyance ratings were obtained at different times of the day. Aircraft noise levels were measured, and other characteristics of the aircraft were noted by trained observers. Metrics commonly used for assessing aircraft noise were compared, but none performed significantly better than A-...

  19. The NASA Aircraft Energy Efficiency program

    Science.gov (United States)

    Klineberg, J. M.

    1979-01-01

    A review is provided of the goals, objectives, and recent progress in each of six aircraft energy efficiency programs aimed at improved propulsive, aerodynamic and structural efficiency for future transport aircraft. Attention is given to engine component improvement, an energy efficient turbofan engine, advanced turboprops, revolutionary gains in aerodynamic efficiency for aircraft of the late 1990s, laminar flow control, and composite primary aircraft structures.

  20. Fiber optic hardware for transport aircraft

    Science.gov (United States)

    White, John A.

    1994-10-01

    Aircraft manufacturers are developing fiber optic technology to exploit the benefits in system performance and manufacturing cost reduction. The fiber optic systems have high bandwidths and exceptional Electromagnetic Interference immunity that exceeds all new aircraft design requirements. Additionally, aircraft manufacturers have shown production readiness of fiber optic systems and design feasibility.

  1. 14 CFR 91.117 - Aircraft speed.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft speed. 91.117 Section 91.117... speed. (a) Unless otherwise authorized by the Administrator, no person may operate an aircraft below 10... than the maximum speed prescribed in this section, the aircraft may be operated at that minimum speed....

  2. 19 CFR 122.37 - Precleared aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Precleared aircraft. 122.37 Section 122.37 Customs... AIR COMMERCE REGULATIONS Landing Requirements § 122.37 Precleared aircraft. (a) Application. This section applies when aircraft carrying crew, passengers and baggage, or merchandise which has...

  3. 14 CFR 252.13 - Small aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Small aircraft. 252.13 Section 252.13 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS SMOKING ABOARD AIRCRAFT § 252.13 Small aircraft. Air carriers shall prohibit smoking on...

  4. 43 CFR 423.41 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Aircraft. 423.41 Section 423.41 Public... Aircraft. (a) You must comply with any applicable Federal, State, and local laws, and with any additional... this part 423, with respect to aircraft landings, takeoffs, and operation on or in the proximity...

  5. 14 CFR 21.127 - Tests: aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Tests: aircraft. 21.127 Section 21.127 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT CERTIFICATION PROCEDURES FOR PRODUCTS AND PARTS Production Under Type Certificate Only § 21.127 Tests: aircraft. (a)...

  6. 50 CFR 27.34 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Aircraft. 27.34 Section 27.34 Wildlife and... WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Vehicles § 27.34 Aircraft. The unauthorized operation of aircraft, including sail planes, and hang gliders, at altitudes resulting...

  7. 36 CFR 13.1004 - Aircraft use.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Aircraft use. 13.1004 Section... § 13.1004 Aircraft use. In extraordinary cases where no reasonable alternative exists, local rural residents who permanently reside in the following exempted community(ies) may use aircraft for access...

  8. 48 CFR 908.7102 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7102 Aircraft. Acquisition of aircraft shall be in accordance with DOE-PMR 41 CFR 109-38.5205. ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Aircraft. 908.7102...

  9. 47 CFR 32.2113 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Aircraft. 32.2113 Section 32.2113... FOR TELECOMMUNICATIONS COMPANIES Instructions for Balance Sheet Accounts § 32.2113 Aircraft. This account shall include the original cost of aircraft and any associated equipment and furnishings...

  10. Policy and the evaluation of aircraft noise

    NARCIS (Netherlands)

    Kroesen, M.; Molin, E.J.E.; Van Wee, G.P.

    2010-01-01

    In this paper, we hypothesize and test the ideas that (1) people’s subjectivity in relation to aircraft noise is shaped by the policy discourse, (2) this results in a limited number of frames towards aircraft noise, (3) the frames inform people how to think and feel about aircraft noise and (4) the

  11. HUMAN FACTOR IMPACT IN MILITARY AIRCRAFT MAINTENANCE

    OpenAIRE

    MARINKOVIC SRBOLJUB J.; DRENOVAC ALEKSANDAR Z.

    2015-01-01

    Aircraft maintenance, as a specific field of military materiel maintenance, is characterized by high reliability standards, based on regulations and technical standards. A system approach to maintenance represents the key element of maintenance quality, while aircraft maintenance staff has a crucial influence on the final outcome of aircraft maintenance.

  12. 14 CFR 91.209 - Aircraft lights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft lights. 91.209 Section 91.209... Requirements § 91.209 Aircraft lights. No person may: (a) During the period from sunset to sunrise (or, in... or the sun is more than 6 degrees below the horizon)— (1) Operate an aircraft unless it has...

  13. 19 CFR 122.42 - Aircraft entry.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Aircraft entry. 122.42 Section 122.42 Customs... AIR COMMERCE REGULATIONS Aircraft Entry and Entry Documents; Electronic Manifest Requirements for Passengers, Crew Members, and Non-Crew Members Onboard Commercial Aircraft Arriving In, Continuing...

  14. 31 CFR 560.528 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Aircraft safety. 560.528 Section 560..., Authorizations and Statements of Licensing Policy § 560.528 Aircraft safety. Specific licenses may be issued on a... the safety of civil aviation and safe operation of U.S.-origin commercial passenger aircraft....

  15. The Impact of Imperfect Information on Network Attack

    CERN Document Server

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  16. Efficient Detection of Sybil attack Based on Cryptography in Vanet

    Directory of Open Access Journals (Sweden)

    Mina Rahbari

    2011-12-01

    Full Text Available Vehicular communications play a substantial role in providing safety transportation by means of safetymessage exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed keyinfrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular adhoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  17. Simulating Cyber-Attacks for Fun and Profit

    CERN Document Server

    Futoransky, Ariel; Orlicki, Jose; Sarraute, Carlos

    2010-01-01

    We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker's standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applications, protocols, users, etc. A novel characteristic of this tool is to simulate vulnerabilities (including 0-days) and exploits, allowing an attacker to compromise machines and use them as pivoting stones to continue the attack. A user can test and modify complex scenarios, with several interconnected networks, where the attacker has no initial connectivity with the objective of the attack. We give a concise description of this new technology, and its possible uses in the security research field, such as pentesting training, study of the impact of 0-days vulnerabilities, evaluation of security countermeasures, and risk...

  18. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  1. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  2. Performance Analysis of Manet Before and After Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Ms.Heena Bhalla

    2012-01-01

    Full Text Available A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks is the Black Hole Attack which absorbs all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper we simulated MANETs with and without Black Hole to study the effects of Black hole attack on network performance. Because of Black Hole Attack the average packet drop increased form 0.25% to 90.69% . The throughput of the network decreased 93.56% due to Black Hole effect.

  3. Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    CERN Document Server

    Rahbari, Mina

    2011-01-01

    Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

  4. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  5. Aircraft Lateral-Directional Stability in Critical Cases via Lyapunov Exponent Criterion

    Directory of Open Access Journals (Sweden)

    Emad N.Abdulwahab

    2013-01-01

    Full Text Available Based on Lyapunov exponent criterion, the aircraft lateral-directional stability during critical flight cases is presented. A periodic motion or limit cycle oscillation isdisplayed. A candidate mechanism for the wing rock limit cycle is the inertia coupling between an unstable lateral-directional (Dutch roll mode with stable longitudinal (short period mode. The coupling mechanism is provided by the nonlinear interaction of motion related terms in the complete set equations of motion. To analyze the state variables of the system, the complete set of nonlinear equations of motion at different high angles of attack are solved. A novel analysis including the variation of roll angle as a function of angle of attack is proposed. Furthermore the variation of Lyapunov exponent parameter as function of time is introduced. The numerical result indicated that the system became lightly damped at high angle of attack with increasing the amplitude of aircraft state variables limit cycle. A good agreement between the numerical result and published work is obtained for the onset of limit cycle oscillation, almost at(?=?20?^°-?23?^° .

  6. Aircraft Mechanics: Scope and Sequence.

    Science.gov (United States)

    Nashville - Davidson County Metropolitan Public Schools, TN.

    This scope and sequence guide, developed for an aircraft mechanics vocational education program, represents an initial step in the development of a systemwide articulated curriculum sequence for all vocational programs within the Metropolitan Nashville Public School System. It was developed as a result of needs expressed by teachers, parents, and…

  7. Subsonic Aircraft Safety Icing Study

    Science.gov (United States)

    Jones, Sharon Monica; Reveley, Mary S.; Evans, Joni K.; Barrientos, Francesca A.

    2008-01-01

    NASA's Integrated Resilient Aircraft Control (IRAC) Project is one of four projects within the agency s Aviation Safety Program (AvSafe) in the Aeronautics Research Mission Directorate (ARMD). The IRAC Project, which was redesigned in the first half of 2007, conducts research to advance the state of the art in aircraft control design tools and techniques. A "Key Decision Point" was established for fiscal year 2007 with the following expected outcomes: document the most currently available statistical/prognostic data associated with icing for subsonic transport, summarize reports by subject matter experts in icing research on current knowledge of icing effects on control parameters and establish future requirements for icing research for subsonic transports including the appropriate alignment. This study contains: (1) statistical analyses of accident and incident data conducted by NASA researchers for this "Key Decision Point", (2) an examination of icing in other recent statistically based studies, (3) a summary of aviation safety priority lists that have been developed by various subject-matter experts, including the significance of aircraft icing research in these lists and (4) suggested future requirements for NASA icing research. The review of several studies by subject-matter experts was summarized into four high-priority icing research areas. Based on the Integrated Resilient Aircraft Control (IRAC) Project goals and objectives, the IRAC project was encouraged to conduct work in all of the high-priority icing research areas that were identified, with the exception of the developing of methods to sense and document actual icing conditions.

  8. Aircraft Lightning Electromagnetic Environment Measurement

    Science.gov (United States)

    Ely, Jay J.; Nguyen, Truong X.; Szatkowski, George N.

    2011-01-01

    This paper outlines a NASA project plan for demonstrating a prototype lightning strike measurement system that is suitable for installation onto research aircraft that already operate in thunderstorms. This work builds upon past data from the NASA F106, FAA CV-580, and Transall C-180 flight projects, SAE ARP5412, and the European ILDAS Program. The primary focus is to capture airframe current waveforms during attachment, but may also consider pre and post-attachment current, electric field, and radiated field phenomena. New sensor technologies are being developed for this system, including a fiber-optic Faraday polarization sensor that measures lightning current waveforms from DC to over several Megahertz, and has dynamic range covering hundreds-of-volts to tens-of-thousands-of-volts. A study of the electromagnetic emission spectrum of lightning (including radio wave, microwave, optical, X-Rays and Gamma-Rays), and a compilation of aircraft transfer-function data (including composite aircraft) are included, to aid in the development of other new lightning environment sensors, their placement on-board research aircraft, and triggering of the onboard instrumentation system. The instrumentation system will leverage recent advances in high-speed, high dynamic range, deep memory data acquisition equipment, and fiber-optic interconnect.

  9. Human Response to Aircraft Noise

    NARCIS (Netherlands)

    Kroesen, M.

    2011-01-01

    How can it be that one person is extremely annoyed by the sounds of aircrafts, while his neighbour claims not to be bothered at all? The present thesis attempts to explain this observation by applying a range of quantitative methods to field data gathered among residents living near large airports.

  10. Survival analysis of aging aircraft

    Science.gov (United States)

    Benavides, Samuel

    This study pushes systems engineering of aging aircraft beyond the boundaries of empirical and deterministic modeling by making a sharp break with the traditional laboratory-derived corrosion prediction algorithms that have shrouded real-world failures of aircraft structure. At the heart of this problem is the aeronautical industry's inability to be forthcoming in an accurate model that predicts corrosion failures in aircraft in spite of advances in corrosion algorithms or improvements in simulation and modeling. The struggle to develop accurate corrosion probabilistic models stems from a multitude of real-world interacting variables that synergistically influence corrosion in convoluted and complex ways. This dissertation, in essence, offers a statistical framework for the analysis of structural airframe corrosion failure by utilizing real-world data while considering the effects of interacting corrosion variables. This study injects realism into corrosion failures of aging aircraft systems by accomplishing four major goals related to the conceptual and methodological framework of corrosion modeling. First, this work connects corrosion modeling from the traditional, laboratory derived algorithms to corrosion failures in actual operating aircraft. This work augments physics-based modeling by examining the many confounding and interacting variables, such as environmental, geographical and operational, that impact failure of airframe structure. Examined through the lens of censored failure data from aircraft flying in a maritime environment, this study enhances the understanding between the triad of the theoretical, laboratory and real-world corrosion. Secondly, this study explores the importation and successful application of an advanced biomedical statistical tool---survival analysis---to model censored corrosion failure data. This well-grounded statistical methodology is inverted from a methodology that analyzes survival to one that examines failures. Third, this

  11. Profiling cyber attackers using case-based reasoning

    OpenAIRE

    Kapetanakis, Stelios; Filippoupolitis, Avgoustinos; Loukas, George; Al Murayziq, Tariq Saad

    2014-01-01

    Computer security would arguably benefit from more information on the characteristics of the particular human attacker behind a security incident. Nevertheless, technical security mechanisms have always focused on the at- tack's characteristics rather than the attacker's. The latter is a challenging prob- lem, as relevant data cannot easily be found. We argue that the cyber traces left by a human attacker during an intrusion attempt can help towards building a profile of the particular person...

  12. Effectiveness and detection of denial of service attacks in Tor

    OpenAIRE

    Danner, Norman; DeFabbia-Kane, Sam; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the...

  13. Effectiveness and detection of denial of service attacks in Tor

    CERN Document Server

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.

  14. ADTool: Security Analysis with Attack-Defense Trees (Extended Version)

    OpenAIRE

    Kordy, Barbara; Kordy, Piotr; Mauw, Sjouke; Schweitzer, Patrick

    2013-01-01

    The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack-defense trees.

  15. Preparedness for mass-casualty attacks on public transportation

    OpenAIRE

    Holgersson, Annelie

    2016-01-01

    Background: Public transportation constitutes a vulnerable sector in modern day society with a high probability of generating mass casualties if attacked. By preparing for mass-casualty attacks (MCAs), response can become more effective and public transportation can become a less rewarding target. However, preparedness for attacks, much like response, implies resource constraints, and this dissertation pinpoints some major dilemmas that inhibit achieving preparedness for MCAs on public transp...

  16. Non-harmful insertion of data mimicking computer network attacks

    Science.gov (United States)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  17. The nocturnal panic attacks: polysomnographic features and comorbidities

    OpenAIRE

    Li, Yan-Lin; CHEN Guo-yan; LEI Ge-sheng; Yang, Ting; Chang-jun SU

    2013-01-01

    Background Panic disorder refers to the repeated or unexpected anxiety or panic attacks. It makes patients feel extreme pain. Although the episodes of most patients with panic disorder happen at daytime, the nocturnal panic attacks (NPA) are quite common. Paients pay more attention to NPA. Insomnia is more serious in patients with NPA than those patients with panic disorder attack at daytime. Many patients may occur anxiety and avoidance behavior after NPA. Patients are often afraid of sleep...

  18. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    OpenAIRE

    Mohammad Abdus Salam; Nayana Halemani

    2016-01-01

    Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and m...

  19. An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks

    CERN Document Server

    Avoine, Gildas

    2008-01-01

    Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier accepts a fake proof of identity, whether or not a relay attack occurs.

  20. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  1. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  2. Trojan Horse attacks on Quantum Key Distribution systems

    OpenAIRE

    Gisin, Nicolas; Fasel, Sylvain; Kraus, Barbara; Zbinden, Hugo; Ribordy, Grégoire

    2005-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to th...

  3. Backside polishing detector: a new protection against backside attacks

    OpenAIRE

    Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David

    2015-01-01

    Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this from the backside of the chip gives some advantages since no metal layers interfere between the hacker and the signals of interest. The bulk silicon is thinned from hundreds to some tens of micrometers in order to improve the performance of the attack. In thi...

  4. Hybrid Approach to Detect SQLi Attacks and Evasion Techniques

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    —Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our ...

  5. Improving Web Application Firewalls to detect advanced SQL injection attacks

    OpenAIRE

    Makiou, Abdelhamid; Begriche, Youcef; Serhrouchni, Ahmed

    2014-01-01

    Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our m...

  6. Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

    OpenAIRE

    Deka, Deepjyoti; Baldick, Ross; Vishwanath, Sriram

    2015-01-01

    Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable' data injection attacks in literature. For 'hidden' attacks, it is shown that with jamming, t...

  7. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...

  8. Code Pointer Masking: Hardening applications against code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2011-01-01

    In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application's control flow. We have implemented a prototype of our solution in a C-compiler for Linux. The evaluatio...

  9. Sheep production and stray dogs attacks in Beira Interior - Portugal

    OpenAIRE

    Rodrigues, J.P.V.; Andrade, L.P.; Carvalho, J.; Ferreira, A.; Monteiro, J.S.T.; Alberto, D.

    2008-01-01

    Livestock production in extensive systems (mainly with sheep) if faced with a high level of attacks/predation done by stray dogs, wolves and other carnivores. In the region, sheep predation by stray dogs is recognised; foxes and Egyptians mongooses also attack lambs. The incidente of attacks on livestock animals was evaluated in Beira Interior, Portugal, based on inquiries (n=156) with the last actualisation in 2007.

  10. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  11. Network Coding Security: Attacks and Countermeasures

    CERN Document Server

    Lima, Luísa; Oliveira, Paulo F; Barros, João

    2008-01-01

    By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the differences between attack scenarios in which network coding is particularly vulnerable and other relevant cases in which the intrinsic properties of network coding allow for stronger and more efficient security solutions than classical routing. Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution. Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.

  12. On the offensive against brain attack

    Energy Technology Data Exchange (ETDEWEB)

    Wheatcraft, D.

    1997-06-01

    The Center for Healthcare Technologies at Lawrence Livermore National Laboratory has undertaken a stroke initiative whose purpose is to provide the medical community with the tools that will allow doctors to diagnose and treat stroke as aggressively as they do heart attack. A multidisciplinary team of stroke-initiative researchers is collaborating with academic medical centers and private companies to move these tools from the research and development stage through clinical trials, regulatory approval, and manufacture so that they can benefit many thousands of people who have strokes each year. Tools the team has developed fall into four categories: microsensors for brain and clot characterization, a catheter-based system using laser energy to break up clots in the blood vessels of the brain, laser-tissue interaction models in support of laser {open_quotes}clot busting,{close_quotes} and microtools for treating the aneurysms that cause hemorrhagic stroke.

  13. Securing Oracle Database from Search Engines Attack

    Directory of Open Access Journals (Sweden)

    N. M. A. Ayad

    2012-09-01

    Full Text Available Database security has recently become A victim of misused search engines. This can be accomplished simply by searching for a URL containing the name of the vulnerable web page or application. Oracle ships several sample web applications along with its databases. The security holes in these applications allow a web user to exploit SQL Injection to submit arbitrary SQL statements to the database. These applications are enabled by default, listening on port 7777, and known to be vulnerable to SQL Injection. This paper focuses on exploiting search engines to attack oracle database using SQL injection technique from web applications, when a website is vulnerable by SQL injection and this side is connected by oracle database vulnerable by SQL injection.

  14. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  15. Cyber Attacks and the Use of Force in International Law

    OpenAIRE

    Valo, Janne

    2014-01-01

    The thesis reviews the issue of cyber attacks and international law in terms of jus ad bellum, the law concerning the recourse to force by states. The thesis takes the view that the existing rules on the use of force, namely Articles 2(4) and 51 of the United Nations Charter and the corresponding rules of customary international law apply to attacks regardless of the way they are carried out and thus, they apply to cyber attacks as well. Two central examples of different kinds of cyber attack...

  16. A Survey on Detecting Wormhole Attack in Manet

    Directory of Open Access Journals (Sweden)

    Bipin N. Patel

    2014-03-01

    Full Text Available A Mobile Ad Hoc Network (MANET is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. We have presented several existing techniques to detect wormhole attack in mobile ad hoc networks.

  17. Defending Wormhole Attack in Wireless Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nisha S.Raote

    2011-09-01

    Full Text Available The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.

  18. Prevention Of WormholeAttacks In Geographic Routing Protocol

    Directory of Open Access Journals (Sweden)

    E.Poornima,

    2011-01-01

    Full Text Available As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSRprotocol and analysis and simulations are performed in network simulator (NS-2.

  19. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  20. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  1. Performance analysis of black hole attacks in geographical routing MANET

    Directory of Open Access Journals (Sweden)

    H.J Shanthi

    2014-10-01

    Full Text Available The MANET (Mobile Adhoc Network is vulnerable to several types of attacks. The most commonly classified attack is black hole attack, which is carried by single or multiple attackers, advertising itself of having a short fresh route to transmit data. The aim is to ensure security against the black hole attack and analyze the performance in geographical routing. The simple method is to send data as small blocks instead of entire data. The traffic is monitored independently in its neighborhood. The mechanism uses geographic information to detect variance in neighbor relations and node movements. We analyze the black hole attack in two popular location based protocol LAR and DREAM. It provides the stimulation study of black hole attack with the minimum attacker and also provides analysis on the parameters such as throughput, packet delivery and delay done with OMNET++ simulator. The simulation results show that packet loss increases and throughput decreases in the network with a black hole node in geographical routing. The proposed mechanism can be combined with existent routing protocols to defend against black hole attacks.

  2. Fake BTS Attacks of GSM System on Software Radio Platform

    OpenAIRE

    Yubo Song; Kan Zhou; Xi Chen

    2012-01-01

    The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is...

  3. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  4. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  5. User Authentication with Provable Security against Online Dictionary Attacks

    Directory of Open Access Journals (Sweden)

    Yongzhong He

    2009-05-01

    Full Text Available Dictionary attacks are the best known threats on the password-based authentication schemes. Based on Reverse Turing Test (RTT, some usable and scalable authentication schemes are proposed to defeat online dictionary attacks mounted by automated programs. However it is found that these authentication schemes are vulnerable to various online dictionary attacks. In this paper, a practical decision function is presented, based on which RTT authentication schemes are constructed and shown to be secure against all the known online dictionary attacks. After formally modeling of the adversary, the static and dynamic security of the authentication schemes are proved formally.

  6. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  7. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  8. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  9. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  10. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  11. Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack

    International Nuclear Information System (INIS)

    A security enhanced double random phase-amplitude encryption (DRPAE) scheme is immune against the powerful known-plaintext attack, due to the insertion of an undercover amplitude random mask at the Fourier plane in the conventional double random phase encryption (DRPE) scheme. However, DRPAE, which nullifies the high level known-plaintext attack, is found to be susceptible to a simple impulse function attack. Information about the exact distribution of the amplitude mask as well as that of the Fourier plane random phase mask is divulged from an impulse function attack. A variant form of the impulse function attack is also able to show that the DRPAE scheme is as linear as the conventional DRPE scheme. Numerical simulation results validate the effectiveness of the simple impulse attack on the DRPAE scheme. (paper)

  12. Stability-Augmentation Devices for Miniature Aircraft

    Science.gov (United States)

    Wood, RIchard M.

    2005-01-01

    Non-aerodynamic mechanical devices are under consideration as means to augment the stability of miniature autonomous and remotely controlled aircraft. Such aircraft can be used for diverse purposes, including military reconnaissance, radio communications, and safety-related monitoring of wide areas. The need for stability-augmentation devices arises because adverse meteorological conditions generally affect smaller aircraft more strongly than they affect larger aircraft: Miniature aircraft often become uncontrollable under conditions that would not be considered severe enough to warrant grounding of larger aircraft. The need for the stability-augmentation devices to be non-aerodynamic arises because there is no known way to create controlled aerodynamic forces sufficient to counteract the uncontrollable meteorological forces on miniature aircraft. A stability-augmentation device of the type under consideration includes a mass pod (a counterweight) at the outer end of a telescoping shaft, plus associated equipment to support the operation of the aircraft. The telescoping shaft and mass pod are stowed in the rear of the aircraft. When deployed, they extend below the aircraft. Optionally, an antenna for radio communication can be integrated into the shaft. At the time of writing this article, the deployment of the telescoping shaft and mass pod was characterized as passive and automatic, but information about the deployment mechanism(s) was not available. The feasibility of this stability-augmentation concept was demonstrated in flights of hand-launched prototype aircraft.

  13. An Indistinguishability Model for Evaluating Diverse Classes of Phishing Attacks and Quantifying Attack Efficacy

    OpenAIRE

    Narasimha Shashidhar; Lei Chen

    2015-01-01

    Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected...

  14. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  15. Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks

    OpenAIRE

    2014-01-01

    Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detect...

  16. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...

  17. A Lanchester model of submarine attack on a carrier battlegroup

    OpenAIRE

    Eagle, James N.

    1987-01-01

    A Lanchester model is developed for a battlegroup ASW engagement. Two variations are included. In the first, long-range missile firing submarines, short-range missile or torpedo firing submarines, and submarines firing only torpedoes distribute their attack uniformly over battlegroup escort ships and carriers. In the second variation, the attack is concentrated on the carriers.

  18. Performance evaluation of DSR Protocol under DoS attack

    Directory of Open Access Journals (Sweden)

    Ms. Trupti Patel

    2012-03-01

    Full Text Available A mobile ad-hoc network (MANET consists of mobile hosts equipped with wireless communication devices. A Mobile Ad hoc Network is a self-organizing, infrastructure less, multi-hop network. The transmission of a mobile host is received by all hosts within its transmission range due to the broadcast nature of wireless communication and unidirectional antenna. If two wireless hosts are out of their transmission ranges in the ad hoc networks, other mobile hosts located between them can forward their message, which effectively builds connected networks among the mobile hosts in the deployed area. One main challenge in design of these networks is their vulnerable nature to security attack. These attacks can be deployed by insider or outsider attacker. Sometime, the node from network can be attacker. This is happen because of mobility of nodes and changing network topology. There are different kind of attacks available in literature and can be implemented on MANET. One of these attacks is Grey Hole attack that has dangerous effect on Mobile Ad-Hoc Network. In this paper, we study the effect of Grey Hole attack on Dynamic Source Routing (DSR protocol in Mobile Ad-Hoc Network.

  19. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  20. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes that "Dateline NBC'"s…

  1. An active attack on a multiparty key exchange protocol

    Directory of Open Access Journals (Sweden)

    Reto Schnyder

    2016-01-01

    Full Text Available The multiparty key exchange introduced in Steiner et al. and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

  2. Rebound Attack on the Full LANE Compression Function

    DEFF Research Database (Denmark)

    Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica; Sasaki, Yu; Martin Schlaeffer, Martin

    In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct a...

  3. Survey of Attacks on Mobile AdhocWireless Networks

    Directory of Open Access Journals (Sweden)

    Vikas Solomon Abel

    2011-02-01

    Full Text Available Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also security is an important issue keeping in view the Internet connectivity and attack on the MANET protocols.

  4. Strategies and scenarios of CSRF attacks against the CAPTCHA forms

    Directory of Open Access Journals (Sweden)

    Hossein Moradi

    2015-01-01

    Full Text Available In this article, we’ve tried to examine the hypothesis of the robustness of a form by using CAPTCHA against CSRF and login CSRF attacks. Our investigations showed that unlike public opinion, common attacks to bypass CAPTCHAs such as Optical Character Recognition (OCR and 3rd party human attacks are not applicable in the CSRF case and instead, Clickjacking is the most important scenario of CSRF and login CSRF attacks against a secure session-dependent CAPTCHA form. Remember that the Clickjacking is also applicable to bypass the well-known CSRF protections, such as the secret token and the Referer header. Therefore, although the frequent application of CAPTCHA on every page of a website negatively impacts the user experience, but the robustness of a robust session-dependent CAPTCHA against the CSRF and login CSRF attacks is almost the same as the session-dependent security token. Moreover, when a website is using a session-independent or week pattern of CAPTCHA, attackers can bypass the CAPTCHAs and launch the CSRF or login CSRF attacks by using XSS, session hijacking, replay attacks or submitting a random response.

  5. Is There Anybody There? A Psychodynamic View of Panic Attack.

    Science.gov (United States)

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  6. Biochemistry of how plants resist insect attack determined

    OpenAIRE

    Trulove, Susan

    2010-01-01

    Many plants, including crops, release volatiles in response to insect attack. The chemical compounds can be a defense or can be an aromatic call for help to attract enemies of the attacking insect. Researchers from Virginia Tech, Michigan State University, and Georg-August-University Göttingen have discovered how plants produce the defensive compounds.

  7. Preventing ADDOS Attack by Using Secure TRNG Based Port Hopping

    Directory of Open Access Journals (Sweden)

    T. Siva

    2013-01-01

    Full Text Available Now a day`s each and every where we are using client-server communication for different information service systems. Normally client server communication can be differentiating by using IP Address and Protocol Port number from one machine to another machine. In network environment we are already having DOS/DDOS Attacks Another Subset of this attack scenario is DOS/DDOS attack is Application Denial of Service(ADOSattack ,In this the adversary attacks open Ports/Ideal ports present at server side for this the adversary Know need huge machines ,zombie systems and no need sending packets of data with high bandwidth. To control this type of A-DOS attacks the existing enterprise security devices are not suitable like firewalls, anti-viruses and IDS/IPS Systems why because the adversary not using high bandwidth, spam messages, zombie`s or botnet`s for their attack scenarios.To safeguard this type of DOS/DDOS or Application denial of service attacks we are having some port hopping mechanisms i.e Port hopping by using Pseudo Random Number Generation (PRNGbased port hopping ,Acknowledgement based port hopping and proactive Reinitialization based on this existing once and their disadvantages like in PRNG attackers can predict the random number generation by using pre-calculated list or based on mathemathical functions .we introduce new port hopping technique i.e True Random Number Generation based port hopping

  8. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    Science.gov (United States)

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil. PMID:17607468

  9. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed. PMID:25527240

  10. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  11. Survey of Attacks on Mobile AdhocWireless Networks

    OpenAIRE

    Vikas Solomon Abel

    2011-01-01

    Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also security is an important issue keeping in view the Internet connectivity and attack on the MANET protocols.

  12. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  13. New Attacks on Animal Researchers Provoke Anger and Worry

    Science.gov (United States)

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  14. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  15. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D; Saper, Joel R; Ashina, Messoud; Kost, James T; Froman, Samar; Leibensperger, Heather; Lines, Christopher R; Ho, Tony W

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...

  16. Perception of aircraft Deviation Cues

    Science.gov (United States)

    Martin, Lynne; Azuma, Ronald; Fox, Jason; Verma, Savita; Lozito, Sandra

    2005-01-01

    To begin to address the need for new displays, required by a future airspace concept to support new roles that will be assigned to flight crews, a study of potentially informative display cues was undertaken. Two cues were tested on a simple plan display - aircraft trajectory and flight corridor. Of particular interest was the speed and accuracy with which participants could detect an aircraft deviating outside its flight corridor. Presence of the trajectory cue significantly reduced participant reaction time to a deviation while the flight corridor cue did not. Although non-significant, the flight corridor cue seemed to have a relationship with the accuracy of participants judgments rather than their speed. As this is the second of a series of studies, these issues will be addressed further in future studies.

  17. Aircraft noise and birth weight

    Energy Technology Data Exchange (ETDEWEB)

    Knipschild, P.; Meijer, H.; Salle, H.

    1981-05-01

    Data from six infant welfare centres in the vicinity of Amsterdam airport were analysed. Birth weights of 902 infants were related to aircraft noise levels to which the mother was exposed in pregnancy. The analysis was restricted to deliveries in hospital, single births and mothers aged 20-34 years. In high noise areas the mean birth weight was 69 g lower than in low noise areas. Of the infants in high noise areas 24% had a birth weight less than 3000 g, compared with 18% in low noise areas. In the analysis the effect of sex of the infant, birth order and to some extent socio-economic status were taken into account. An effect of smoking seemed unlikely. The results, together with existing knowledge, give some suggestion that aircraft noise can decrease birth weight.

  18. Aircraft emissions at Turkish airports

    International Nuclear Information System (INIS)

    This paper deals with estimating aircraft landing and take-off (LTO) emissions (HC, CO, NOx, SO2) at 40 Turkish airports including the biggest airports, i.e. Ataturk International Airport (AIA) in Istanbul, Antalya Airport in Antalya and Esenboga Airport in Ankara in 2001. The calculation model is based on flight data recorded by the State Airports Authority. The flight data include the type and number of aircraft, number of passengers, amount of cargo etc., which depend on day-time and date. For the emission calculations the International Civil Aviation Organization (ICAO)-Engine emission data bank, which includes minimum and maximum values for both fuel flow rates and emissions factors, is used. By using first the minimum and then the maximum values from the data bank, two estimations of aircraft LTO emissions at Turkish airports are calculated: i.e. minimum and maximum estimations. Total LTO emissions from aircraft at Turkish airports are estimated to be between 7614.34 and 8338.79 t/year. These results are comparable with those from USA airports. Approximately half of these amounts are produced at AIA. To predict future emissions, it is estimated that an increase of 25% in LTO cycles might cause a rise of between 31 and 33% in emissions. The estimations show that a decrease of 2 min in taxiing time results in a decrease of 6% in LTO emissions. The estimation model used in this study can be used for expansions and planning of airports from an environmental point of view. (author)

  19. Challenges of aircraft design integration

    OpenAIRE

    Kafyeke, F.; Abdo, M.; Pepin, F; Piperni, P.; Laurendeau, E.

    2007-01-01

    The design of a modern airplane brings together many disciplines: structures, aerodynamics, controls, systems, propulsion with complex interdependencies and many variables. Recent aircraft programs, such as Bombardier's Continental Jet program use participants located around the world and selected for their cost, quality and delivery capability. These participants share the risk on the program and must therefore be fully implicated in the design. A big challenge is to provide information on c...

  20. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  1. Toward Improved CFD Predictions of Slender Airframe Aerodynamics Using the F-16XL Aircraft (CAWAPI-2)

    Science.gov (United States)

    Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce

    2014-01-01

    A coordinated project has been underway to improve CFD predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angleof- attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the CFD failed to provide acceptable results. In this paper the background, objectives and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multi-code, multiorganizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.

  2. Output feedback non-linear decoupled control synthesis and observer design for manoeuvring aircraft

    Science.gov (United States)

    Singh, S. N.; Schy, A. A.

    1980-01-01

    A study of the applicability of nonlinear decoupling theory to the design of control systems using output feedback for maneuvering aircraft is presented. The response variables chosen for decoupled control were angular velocity components along roll, pitch, and yaw axes, angle of attack (p), and angle of sideslip, using aileron, rudder, and elevator controls. An observer design for a class of nonlinear systems was presented and this method was used to estimate angle of attack and sideslip; an approximate observer was obtained by neglecting derivatives of p and aileron deflection angles and it was used in a simulation study. A simulation study showed that precise rapid combined lateral and longitudinal maneuvers can be performed; it was also demonstrated that a bank-angle-command outer loop could be designed for precise bank angles changes and simultaneous large lift maneuvers.

  3. Optimal attack strategy of complex networks based on tabu search

    Science.gov (United States)

    Deng, Ye; Wu, Jun; Tan, Yue-jin

    2016-01-01

    The problem of network disintegration has broad applications and recently has received growing attention, such as network confrontation and disintegration of harmful networks. This paper presents an optimized attack strategy model for complex networks and introduces the tabu search into the network disintegration problem to identify the optimal attack strategy, which is a heuristic optimization algorithm and rarely applied to the study of network robustness. The efficiency of the proposed solution was verified by comparing it with other attack strategies used in various model networks and real-world network. Numerical experiments suggest that our solution can improve the effect of network disintegration and that the "best" choice for node failure attacks can be identified through global searches. Our understanding of the optimal attack strategy may also shed light on a new property of the nodes within network disintegration and deserves additional study.

  4. An Active Defense Mechanism for TCP SYN flooding attacks

    CERN Document Server

    Kumarasamy, Saravanan

    2012-01-01

    Distributed denial-of-service attacks on public servers have recently become a serious problem. To assure that network services will not be interrupted and more effective defense mechanisms to protect against malicious traffic, especially SYN floods. One problem in detecting SYN flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of a SYN flood attack. Another problem is single-point defenses (e.g. firewalls) lack the scalability needed to handle an increase in the attack traffic. We have designed a new defense mechanism to detect the SYN flood attacks. First, we introduce a mechanism for detecting SYN flood traffic more accurately by taking into consideration the time variation of arrival traffic. We investigate the statistics regarding the arrival rates of both normal TCP SYN packets and SYN flood attack packets. We then describe a new detection mechanism based on these statistics. Through the trace driven approach defense nodes which recei...

  5. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping; the...... recalling or speaking words. A significant percentage of patients also reported a change in olfaction. There were several inconsistencies between the features of prospectively recorded and retrospectively reported attacks. Headache, nausea, photophobia, and phonophobia were all less common in prospectively...

  6. A Taxonomy of Attacks on the DNP3 Protocol

    Science.gov (United States)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  7. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  8. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen (Cornell University, Ithaca, NY); Carlson, Rolf Erik; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  9. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  10. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  11. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  12. Stochastic Methods for Aircraft Design

    Science.gov (United States)

    Pelz, Richard B.; Ogot, Madara

    1998-01-01

    The global stochastic optimization method, simulated annealing (SA), was adapted and applied to various problems in aircraft design. The research was aimed at overcoming the problem of finding an optimal design in a space with multiple minima and roughness ubiquitous to numerically generated nonlinear objective functions. SA was modified to reduce the number of objective function evaluations for an optimal design, historically the main criticism of stochastic methods. SA was applied to many CFD/MDO problems including: low sonic-boom bodies, minimum drag on supersonic fore-bodies, minimum drag on supersonic aeroelastic fore-bodies, minimum drag on HSCT aeroelastic wings, FLOPS preliminary design code, another preliminary aircraft design study with vortex lattice aerodynamics, HSR complete aircraft aerodynamics. In every case, SA provided a simple, robust and reliable optimization method which found optimal designs in order 100 objective function evaluations. Perhaps most importantly, from this academic/industrial project, technology has been successfully transferred; this method is the method of choice for optimization problems at Northrop Grumman.

  13. Aircraft systems design methodology and dispatch reliability prediction

    OpenAIRE

    Bineid, Mansour

    2005-01-01

    Aircraft despatch reliability was the main subject of this research in the wider content of aircraft reliability. The factors effecting dispatch reliability, aircraft delay, causes of aircraft delays, and aircraft delay costs and magnitudes were examined. Delay cost elements and aircraft delay scenarios were also studied. It concluded that aircraft dispatch reliability is affected by technical and non-technical factors, and that the former are under the designer's control. It showed that ...

  14. A Synthesis of Hybrid RANS/LES CFD Results for F-16XL Aircraft Aerodynamics

    Science.gov (United States)

    Luckring, James M.; Park, Michael A.; Hitzel, Stephan M.; Jirasek, Adam; Lofthouse, Andrew J.; Morton, Scott A.; McDaniel, David R.; Rizzi, Arthur M.

    2015-01-01

    A synthesis is presented of recent numerical predictions for the F-16XL aircraft flow fields and aerodynamics. The computational results were all performed with hybrid RANS/LES formulations, with an emphasis on unsteady flows and subsequent aerodynamics, and results from five computational methods are included. The work was focused on one particular low-speed, high angle-of-attack flight test condition, and comparisons against flight-test data are included. This work represents the third coordinated effort using the F-16XL aircraft, and a unique flight-test data set, to advance our knowledge of slender airframe aerodynamics as well as our capability for predicting these aerodynamics with advanced CFD formulations. The prior efforts were identified as Cranked Arrow Wing Aerodynamics Project International, with the acronyms CAWAPI and CAWAPI-2. All information in this paper is in the public domain.

  15. Factors affecting handling qualities of a lift-fan aircraft during steep terminal area approaches

    Science.gov (United States)

    Gerdes, R. M.; Hynes, C. S.

    1975-01-01

    The XV-5B lift-fan aircraft was used to explore the factors affecting handling qualities in the terminal area. A 10 deg ILS approach task was selected to explore these problems. Interception of the glide slope at 457.2 m, glide slope tracking, deceleration along the glide slope to a spot hover were considered. Variations in airplane deck angle, deceleration schedule, and powered-lift management were studied. The overall descent performance envelope was identified on the basis of fan stall, maximum comfortable descent rate, and controllability restrictions. The collective-lift stick provided precise glide slope tracking capability. The pilot preferred a deck-parallel attitude for which he used powered lift to control glide slope and pitch attitude to keep the angle of attack near zero. Workload was reduced when the deceleration schedule was delayed until the aircraft was well established on the glide slope, since thrust vector changes induced flight path disturbances.

  16. A computer code (SKINTEMP) for predicting transient missile and aircraft heat transfer characteristics

    Science.gov (United States)

    Cummings, Mary L.

    1994-09-01

    A FORTRAN computer code (SKINTEMP) has been developed to calculate transient missile/aircraft aerodynamic heating parameters utilizing basic flight parameters such as altitude, Mach number, and angle of attack. The insulated skin temperature of a vehicle surface on either the fuselage (axisymmetric body) or wing (two-dimensional body) is computed from a basic heat balance relationship throughout the entire spectrum (subsonic, transonic, supersonic, hypersonic) of flight. This calculation method employs a simple finite difference procedure which considers radiation, forced convection, and non-reactive chemistry. Surface pressure estimates are based on a modified Newtonian flow model. Eckert's reference temperature method is used as the forced convection heat transfer model. SKINTEMP predictions are compared with a limited number of test cases. SKINTEMP was developed as a tool to enhance the conceptual design process of high speed missiles and aircraft. Recommendations are made for possible future development of SKINTEMP to further support the design process.

  17. Prodromes and predictors of migraine attack.

    Science.gov (United States)

    Rossi, Paolo; Ambrosini, Anna; Buzzi, M Gabriella

    2005-01-01

    Premonitory symptoms of migraine include a wide and heterogeneous collection of cognitive, psychic and physical changes preceding and forewarning of an attack by a few hours to 2-3 days. To date, premonitory symptoms have received little attention in the literature, being treated more as a curiosity than as a primary feature of migraine. This paper provides an extensive critical review of this neglected area of migraine research in the light of the recent advances in our understanding of the pathogenetic mechanisms of migraine. Epidemiological and clinical studies that have investigated the premonitory symptoms of migraine lack scientific rigour, producing conflicting results, whilst genetic and pathophysiological investigations are still in their very early stages. There is evidence supporting the idea that premonitory symptoms could be used as a phenotypical marker to identify subgroups of migraineurs which could show correlations with specific clinical expressions of the disease, genotypes, or responses to treatments. Future studies are needed to clarify the clinical, pathophysiological and therapeutic significance of premonitory symptoms. PMID:16483459

  18. Multilayer Approach to Defend Phishing Attacks

    CERN Document Server

    Dhinakaran, Cynthia; Lee, Jae Kwang

    2011-01-01

    Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; therefore a continuous evaluation of phishing only helps us combat phisher effectiveness. In our study, we collected seven hundred thousand spam from a corporate server for a period of 13 months from February 2008 to February 2009. From the collected data, we identified different kinds of phishing scams and mode of operation. Our observation shows that phishers are dynamic and depend more on social engineering techniques rather than software vulnerabilities. We believe that this study will develop more efficient anti-phishing methodologies. Based on our analysis, we developed an anti-phishing methodology and implemented in ou...

  19. Intergranular attack evaluation from hideout return

    International Nuclear Information System (INIS)

    Intergranular Attack (IGA) is the secondary side corrosion mechanism on PWR steam generator tubing, which can occur most frequently even with a good waterchemistry. It has moderately developed in a few French units. Consequently, several remedies have been implemented, such as sodium content decrease in makeup water and application of more stringent chemistry specifications. In order to evaluate the local chemistry in restricted areas where IGA may occur, a large hideout return programme has been carried out on many units. It shows that free alkalinity returning during shutdown is usually ranging from 0.5 to 5 g of sodium per steam generator, and that the required time to let it return is about 40 hours. However, high temperature pH calculations indicate that such an amount of alkalinity can correspond to a potentially corrosive solution in restricted areas, where a concentration factor of 105 to 107 can be reached, inducing a pH of 10 at 300oC. Studies are still in progress in order to define when a shutdown should be required to allow hideout return and help to prevent IGA. (author)

  20. Assessment and treatment of nocturnal panic attacks.

    Science.gov (United States)

    Craske, Michelle G; Tsao, Jennie C I

    2005-06-01

    Nocturnal panic (NP), waking from sleep in a state of panic, is a common occurrence among patients with panic disorder, with 44-71% reporting at least one such attack. NP is a non-REM event that is distinct from sleep terrors, sleep apnea, nightmares or dream-induced arousals. This review outlines recent advances in the characterization of NP, as well as current approaches to the assessment and treatment of NP. In contrast to earlier work, more recent studies suggest that patients with NP do not differ from patients without NP on sleep architecture, sleep physiology, self-reported sleep quality and severity of panic disorder. However, more precise measurement of physiological precipitants and features is warranted. Assessment of NP focuses on ruling out other explanations for NP, with differential diagnosis based on interviews, sleep polysomnography and ambulatory recording of sleep. Psychological treatment (cognitive-behavioral therapy) targets misappraisals of anxiety sensations, hyperventilatory response, and conditioned reactions to internal, physical cues. Recent evidence supports the efficacy of this approach, however, controlled studies on pharmacological agents in the treatment of NP are lacking. Research is needed to examine the effects of combined cognitive-behavioral therapy and medications, compared to medication alone in the treatment of NP. PMID:15893248