WorldWideScience

Sample records for attack aircraft

  1. Nonlinear analysis of NPP safety against the aircraft attack

    Energy Technology Data Exchange (ETDEWEB)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk [Faculty of Civil Engineering, STU in Bratislava, Radlinského 11, 813 68 Bratislava (Slovakia); Králik, Juraj, E-mail: kralik@fa.stuba.sk [Faculty of Architecture, STU in Bratislava, Námestie Slobody 19, 812 45 Bratislava (Slovakia)

    2016-06-08

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  2. Nonlinear analysis of NPP safety against the aircraft attack

    Science.gov (United States)

    Králik, Juraj; Králik, Juraj

    2016-06-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  3. Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft

    Science.gov (United States)

    2009-06-12

    COST, CAPABILITY, AND THE HUNT FOR A LIGHTWEIGHT GROUND ATTACK AIRCRAFT A thesis presented to the Faculty of the U.S. Army...Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...Candidate: Maj. Steven J. Tittel Thesis Title: Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft Approved by

  4. MATHEMATICAL MODEL OF THE MOTION OF A LIGHT ATTACK AIRCRAFT WITH EXTERNAL LOAD SLINGS IN THE EXTREME AREA OF FLIGHT MODES ACCORDING TO THE ANGLE OF ATTACK

    Directory of Open Access Journals (Sweden)

    A. Popov Sergey

    2017-01-01

    Full Text Available For the time being, a combat-capable trainer aircraft has already been used as a light attack aircraft. The quality of mission effectiveness evaluation depends on the degree of relevance of mathematical models used. It is known that the mis- sion efficiency is largely determined by maneuvering capabilities of the aircraft which are realized most fully in extreme angle of attack flight modes. The article presents the study of the effect of Reynolds number, angle of attack and position on the external sling on the parameters characterizing the state of separated-vortex flow, which was conducted using soft- ware complexes such as Solid Works and Ansys Fluent. There given the dependences of the observed parameters for sta- tionary and nonstationary cases of light attack aircraft movement. The article considers the influence of time constants, which characterize the response rate and delaying of separated flow development and attached flow recovery on the state of separated-vortex flow. The author mentions how the speed of angle of attack change influences lift coefficient of a light attack aircraft with external slings due to response rate and delaying of separated flow development and attached flow recovery. The article describes the mathematical model invented by the authors. This is the model of the movements of light attack aircraft with external slings within a vertical flight maneuver, considering the peculiarities of separated-vortex flow. Using this model, there has been obtained the parameters of light attack aircraft output path from the pitch using large an- gles of attack. It is demonstrated that not considering the peculiarities of the separated-vortex flow model of light attack aircraft movements leads to certain increase of height loss at the pullout of the maneuver, which accordingly makes it pos- sible to decrease the height of the beginning of the pullout.

  5. The effects of angle-of-attack indication on aircraft control in the event of an airspeed indicator malfunction

    Science.gov (United States)

    Boesser, Claas Tido

    Analysis of accident data by the Federal Aviation Administration, the National Transportation Safety Board, and other sources show that loss of control is the leading cause of aircraft accidents. Further evaluation of the data indicates that the majority of loss of control accidents are caused by the aircraft stalling. In response to these data, the Federal Aviation Administration and the General Aviation Joint Steering Committee emphasize the importance of stall and angle-of-attack awareness during flight. The high-profile crash of Air France Flight 447, in which pilots failed to recover from a self-induced stall, reinforced concerns over the need for improved stall and angle-of-attack awareness and reinvigorated interest in the debate over the effectiveness of angle-of-attack information displays. Further support for aerodynamic information in the form of an angle-of-attack indicator comes from core cognitive engineering principles. These principles argue for the provision of information about system functioning and dynamics as a means to ensure a human is always in position to recover a system when technology is unable. The purpose of this research was to empirically evaluate the importance of providing pilots with feedback about fundamental aircraft aerodynamics, especially during non-standard situations and unexpected disturbances. An experiment was conducted using a flight simulator to test the effects of in-cockpit angle-of-attack indication on aircraft control following an airspeed indicator malfunction on final approach. Participants flew a final approach with a target airspeed range of 60 to 65 knots. Once participants slowed the aircraft for final approach, the airspeed indicator needle would be stuck at an indication of 70 knots. One group of participants flew the final approach with an angle-of-attack indicator while the other group lacked such an instrument. Examination of aircraft performance data along the final approach showed that, when confronted

  6. Quasi-periodic dynamics of a high angle of attack aircraft

    Science.gov (United States)

    Rohith, G.; Sinha, Nandan K.

    2017-01-01

    High angle of attack maneuvers closer to stall is a commonly accessed flight regime especially in case of fighter aircrafts. Stall and post-stall dynamics are dominated by nonlinearities which make the analysis difficult. Presence of external factors such as wind makes the system even more complex. Rich nonlinearities point to the possibility of existence of chaotic solutions. Past studies in this area confirm the development of such solutions. These studies are mainly concentrated on very high angle of attack regimes, which may not be practically easily accessible. This paper examines the possibility of existence of chaotic solutions in the lower, more accessible areas in the post stall domain. The analysis is composed of the study of effect of external wind as an agent to drive the system towards the possibility of a chaotic solution. Investigations reveal presence of quasi-periodic solutions, which are characterized by two incommensurate frequencies. This solution appears in the time simulation by varying the control parameter viz., wind. The solutions correspond to the values in the lower region of the angle of attack versus elevator bifurcation curve in the post-stall region. A steady wind is considered for the analysis and explores the possibility of chaotic motion by increasing the wind in a step wise manner. It is found that wind adds extra energy to the system which in turn drives the system in to chaos. The analysis is done with the help of phase portrait, Poincare map and amplitude spectrum and a quasi-periodic route to chaos via torus doubling is also presented.

  7. Survey of needs and capabilities for wind tunnel testing of dynamic stability of aircraft at high angles of attack

    Science.gov (United States)

    Orlik-Ruckemann, K. J.

    1973-01-01

    A survey was conducted relative to future requirements for dynamic stability information for such aerospace vehicles as the space shuttle and advanced high performance military aircraft. High-angle-of-attack and high-Reynolds number conditions were emphasized. A review was made of the wind-tunnel capabilities in North America for measuring dynamic stability derivatives, revealing an almost total lack of capabilities that could satisfy these requirements. Recommendations are made regarding equipment that should be constructed to remedy this situation. A description is given of some of the more advanced existing capabilities, which can be used to at least partly satisfy immediate demands.

  8. Research on Aircraft Attack Angle Control Considering Servo-Loop Dynamics

    Directory of Open Access Journals (Sweden)

    Xiaodong Liu

    2015-01-01

    Full Text Available This paper presents a novel robust attack angle control approach, which can effectively suppress the impacts from system uncertainties and servo-loop dynamics. A second-order linear model of electromechanical servo loop is considered in the modeling and design processes. With regard to the block-structure models facing attack angle control, the multiple robust surfaces and dynamic surface control (DSC approaches are both employed. By means of Lyapunov function method, the stability conditions of attack angle control systems are, respectively, given without/with considering the servo-loop dynamics in design process. Computer simulation results present that, compared with the attack angle control scheme which does not consider the servo-loop dynamics in design process, the proposed scheme can guarantee that the whole attack angle control system possesses the better comprehensive performances. Moreover, it is easy to be realized in engineering application.

  9. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    Science.gov (United States)

    2016-08-01

    have practically demonstrated the ability to completely control an unmanned drone by manipulating the GPS signal it receives with no indication to the...System ( GPS ) input to the navigation system that enables the aircraft to provide accurate positional data to the operator.8 Exploitation of all...omnidirectional antennae which increase the chance of interception and jamming. 17 Navigation systems on unmanned aircraft rely heavily on the GPS

  10. Aircraft

    Science.gov (United States)

    Hibbs, B.D.; Lissaman, P.B.S.; Morgan, W.R.; Radkey, R.L.

    1998-09-22

    This disclosure provides a solar rechargeable aircraft that is inexpensive to produce, is steerable, and can remain airborne almost indefinitely. The preferred aircraft is a span-loaded flying wing, having no fuselage or rudder. Travelling at relatively slow speeds, and having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing`s top surface, the aircraft uses only differential thrust of its eight propellers to turn. Each of five sections of the wing has one or more engines and photovoltaic arrays, and produces its own lift independent of the other sections, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface. The aircraft is capable of a top speed of about ninety miles per hour, which enables the aircraft to attain and can continuously maintain altitudes of up to sixty-five thousand feet. Regenerative fuel cells in the wing store excess electricity for use at night, such that the aircraft can sustain its elevation indefinitely. A main spar of the wing doubles as a pressure vessel that houses hydrogen and oxygen gases for use in the regenerative fuel cell. The aircraft has a wide variety of applications, which include weather monitoring and atmospheric testing, communications, surveillance, and other applications as well. 31 figs.

  11. PAN AIR analysis of the NASA/MCAIR 279-3: An advanced supersonic V/STOL fighter/attack aircraft

    Science.gov (United States)

    Madson, Michael D.; Erickson, Larry L.

    1986-01-01

    PAN AIR is a computer program for predicting subsonic or supersonic linear potential flow about arbitrary configurations. The program was applied to a highly complex single-engine-cruise V/STOL fighter/attack aircraft. Complexities include a close-coupled canard/wing, large inlets, and four exhaust nozzles mounted directly under the wing and against the fuselage. Modeling uncertainties involving canard wake location and flow-through approximation through the inlet and the exhaust nozzles were investigated. The recently added streamline capability of the program was utilized to evaluate visually the predicted flow over the model. PAN AIR results for Mach numbers of 0.6, 0.9, and angles of attack of 0, 5, and 10 deg. were compared with data obtained in the Ames 11- by 11-Foot Transonic Wind tunnel, at a Reynolds number of 3.69 x 10 to the 6th power based on c bar.

  12. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  13. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  14. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  15. Heart attack

    Science.gov (United States)

    ... heart attack. A stent is a small, metal mesh tube that opens up (expands) inside a coronary ... e228. PMID: 25260718 www.ncbi.nlm.nih.gov/pubmed/25260718 . Anderson JL. ST segment elevation acute myocardial ...

  16. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 27,2017 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  17. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  18. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  19. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  20. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  2. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  3. Nocturnal panic attacks

    OpenAIRE

    Lopes Fabiana L.; Nardi Antonio E.; Nascimento Isabella; Valença Alexandre M.; Zin Walter A

    2002-01-01

    The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sle...

  4. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  5. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  6. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  7. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  8. Heart attack - discharge

    Science.gov (United States)

    ... attack Heart bypass surgery Heart bypass surgery - minimally invasive Heart pacemaker High blood cholesterol levels High blood pressure Implantable cardioverter-defibrillator Smoking - tips on how to ...

  9. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  10. The "automatic stabilizer" and angle of attack assessor: human factors contributions of the Wright brothers.

    Science.gov (United States)

    Mohler, S R

    1996-06-01

    The Wright brothers followed their invention of the first practical airplane (1903) with a second epochal invention, the angle of attack sensor and aircraft stabilizer (1908). Both inventions were patented and details of each are contained in the respective patents for these two aeronautical advances. This paper emphasizes how the angle of attack sensor actuated an "automatic stabilizer." This approach decreased pilot workload, and variations of the Wright's invention are incorporated today in many types of aircraft.

  11. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  13. Collision avoidance for aircraft in abort landing

    Science.gov (United States)

    Mathwig, Jarret

    We study the collision avoidance between two aircraft flying in the same vertical plane: a host aircraft on a glide path and an intruder aircraft on a horizontal trajectory below that of the host aircraft and heading in the opposite direction. Assuming that the intruder aircraft is uncooperative, the host aircraft executes an optimal abort landing maneuver: it applies maximum thrust setting and maximum angle of attack lifting the flight path over the original path, thereby increasing the timewise minimum distance between the two aircraft and, in this way, avoiding the potential collision. In the presence of weak constraints on the aircraft and/or the environment, the angle of attack must be brought to the maximum value and kept there until the maximin point is reached. On the other hand, in the presence of strong constraints on the aircraft and the environment, desaturation of the angle of attack might have to take place before the maximin point is reached. This thesis includes four parts. In the first part, after an introduction and review of the available literature, we reformulate and solve the one-subarc Chebyshev maximin problem as a two-subarc Bolza-Pontryagin problem in which the avoidance and the recovery maneuvers are treated simultaneously. In the second part, we develop a guidance scheme (gamma guidance) capable of approximating the optimal trajectory in real time. In the third part, we present the algorithms employed to solve the one-subarc and two-subarc problems. In the fourth part, we decompose the two-subarc Bolza-Pontryagin problem into two one-subarc problems: the avoidance problem and the recovery problem, to be solved in sequence; remarkably, for problems where the ratio of total maneuver time to avoidance time is sufficiently large (≥5), this simplified procedure predicts accurately the location of the maximin point as well as the maximin distance.

  14. Mathematical Attacks on RSA Cryptosystem

    OpenAIRE

    Imad K. Salah; Abdullah Darwish; Saleh Oqeili

    2006-01-01

    In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  15. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicle...

  16. Aircraft Disinsection

    Science.gov (United States)

    Some countries may require aircraft coming from countries where certain insects or insect-borne diseases are present, such as malaria and Zika virus, to be treated with insecticide. Find out about regulation of pesticides for this treatment.

  17. Amphibious Aircraft

    Data.gov (United States)

    National Aeronautics and Space Administration — A brief self composed research article on Amphibious Aircrafts discussing their use, origin and modern day applications along with their advantages and disadvantages...

  18. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  19. Aerodynamic characteristics of airplanes at high angles of attack

    Science.gov (United States)

    Chambers, J. R.; Grafton, S. B.

    1977-01-01

    An introduction to, and a broad overiew of, the aerodynamic characteristics of airplanes at high angles of attack are provided. Items include: (1) some important fundamental phenomena which determine the aerodynamic characteristics of airplanes at high angles of attack; (2) static and dynamic aerodynamic characteristics near the stall; (3) aerodynamics of the spin; (4) test techniques used in stall/spin studies; (5) applications of aerodynamic data to problems in flight dynamics in the stall/spin area; and (6) the outlook for future research in the area. Although stalling and spinning are flight dynamic problems of importance to all aircraft, including general aviation aircraft, commercial transports, and military airplanes, emphasis is placed on military configurations and the principle aerodynamic factors which influence the stability and control of such vehicles at high angles of attack.

  20. Angle-of-attack estimation for analysis of CAT encounters

    Science.gov (United States)

    Bach, R. E., Jr.; Parks, E. K.

    1985-01-01

    Recent studies of clear-air turbulence (CAT) encounters involving wide-body airliners have been based upon flight-path wind estimates made by analyzing digital flight-data-recorder (DFDR) records and radar records. Such estimates require a time history of the aircraft angle of attack, a record that is not usually included in the DFDR measurement set. This paper describes a method for reconstructing angle of attack that utilizes available flight record and aircraft-specific information associated with an aerodynamic model of the lift coefficient. Results from two wide-body incidents in which vane measurements of angle of attack were recorded show good agreement between measured and calculated time histories. This research has been performed in cooperation with the National Transportation Safety Board to provide a better understanding of the CAT phenomenon.

  1. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  4. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  5. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  6. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  7. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  8. Launch under attack

    Energy Technology Data Exchange (ETDEWEB)

    Steinbruner, J.

    1984-01-01

    The strategy of launch under attack calls for launching nuclear weapons on warning that attacking weapons are on their way. The political pressures for adopting this strategy are symptomatic of an increasing instability in the nuclear balance. The author describes a Brookings Institute model, which indicates that the problems of decentralized control and precise timing could lead to failures in retargeting procedures. The major concern is that the strategy imposes powerful incentives for preemption as the most promising means of conducting nuclear war.

  9. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are c......The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio......-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  10. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  11. Cooperating attackers in neural cryptography

    Science.gov (United States)

    Shacham, Lanir N.; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the “majority-flipping attacker,” does not decay with the parameters of the model. This attacker’s outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  13. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  14. Flight test evaluation and analysis of the l-39c albartros for the light attack mission

    Science.gov (United States)

    Hays, Mitchell J.

    Aircraft test and evaluation is a key component of aircraft development and design verification. Developmental flight test, an early look into aircraft functionality and mission suitability, is conducted early in the aircraft lifecycle to mitigate cost, schedule, and performance risks. This thesis details the ground and flight test of the L-39C "Albatros" for the light attack mission. The L-39C was evaluated as a light attack aircraft to determine aircraft performance, handling qualities, and human-machine interface to support specification validation and document mission utility. The specifications and scenario were generated by instructors at the United States Naval Test Pilot School (USNTPS) as part of the Engineering Test Pilot curriculum. Classical flight test techniques were used to elicit open loop aircraft response and performance characterization. Additionally, various mission representative maneuvers were executed to aid in identification of deficiencies in aircraft handling qualities. This work is adapted from the author's work at the USNTPS and presents data associated with the capstone exercise of the USNTPS Experimental Test Pilot syllabus. The results of this thesis clearly illustrate the suitability of the L-39C for the light attack mission.

  15. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... smolder — that can be destructive. If you think counseling would help your family deal with your heart attack more ... your lifestyle habits through exercise training, education and counseling to ... or with the help of your doctor, nurse, dietitian or other healthcare ...

  16. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  17. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  18. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  19. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  20. Life After a Heart Attack

    Science.gov (United States)

    ... been stable for a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, ... 2009, this project provided six awards at five academic institutions to identify genetic connections to heart, lung, ...

  1. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  2. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  3. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  4. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  5. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  6. Application of dynamical systems theory to nonlinear aircraft dynamics

    Science.gov (United States)

    Culick, Fred E. C.; Jahnke, Craig C.

    1988-01-01

    Dynamical systems theory has been used to study nonlinear aircraft dynamics. A six degree of freedom model that neglects gravity has been analyzed. The aerodynamic model, supplied by NASA, is for a generic swept wing fighter and includes nonlinearities as functions of the angle of attack. A continuation method was used to calculate the steady states of the aircraft, and bifurcations of these steady states, as functions of the control deflections. Bifurcations were used to predict jump phenomena and the onset of periodic motion for roll coupling instabilities and high angle of attack maneuvers. The predictions were verified with numerical simulations.

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. Can You Recognize a Heart Attack? Quiz

    Science.gov (United States)

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Can You Recognize a Heart Attack? Updated:Sep 16, ... a Heart Attack Heart Attack Symptoms in Women “Can you recognize a heart attack?” Quiz • Understand Your ...

  9. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  10. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  11. Tracing Technique for Blaster Attack

    OpenAIRE

    S., Siti Rahayu; Y., Robiah; S., Shahrin; A., Faizal M.; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log...

  12. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  13. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  14. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  15. Attacker profiling in quantitative security assessment based on attack trees

    NARCIS (Netherlands)

    Lenin, Aleksandr; Willemson, Jan; Sari, Dyan Permata

    2014-01-01

    We present the results of research of limiting adversarial budget in attack games, and, in particular, in the failure-free attack tree models presented by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be

  16. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  17. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... and Conditions and Privacy Policy Go Red For Women® presents: View our first-ever short film (opens in new window) by Elizabeth Banks and share with the women you love. Heart Attack • Home • About Heart Attacks ...

  18. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  19. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  20. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  1. Propulsion controlled aircraft computer

    Science.gov (United States)

    Cogan, Bruce R. (Inventor)

    2010-01-01

    A low-cost, easily retrofit Propulsion Controlled Aircraft (PCA) system for use on a wide range of commercial and military aircraft consists of an propulsion controlled aircraft computer that reads in aircraft data including aircraft state, pilot commands and other related data, calculates aircraft throttle position for a given maneuver commanded by the pilot, and then displays both current and calculated throttle position on a cockpit display to show the pilot where to move throttles to achieve the commanded maneuver, or is automatically sent digitally to command the engines directly.

  2. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  3. Homebuilt aircraft crashes.

    Science.gov (United States)

    Hasselquist, A; Baker, S P

    1999-06-01

    While the number of general aviation crashes has decreased over the 5 yr prior to 1993, the total number of homebuilt aircraft crashes has increased by nearly 25%. Research was undertaken to analyze these crashes and identify causal factors or unique problems associated with homebuilt aircraft. Some 200 National Transportation Safety Board computer records and two-page descriptive briefs were analyzed for homebuilt aircraft crashes during 1993. Using descriptive epidemiology, variables were looked at in detail and comparisons were made with general aviation crashes during the-same year. Despite accounting for only 3% of all hours flown in general aviation certified aircraft for 1993, homebuilt aircraft accounted for 10% of the crashes and experienced a higher fatal crash rate. Crashes due to mechanical failure and crashes on takeoff and climb were more common in homebuilt aircraft as compared with general aviation. Other significant causal factors for homebuilt aircraft crashes included: minimal flight time in type specific aircraft, improper maintenance and improper design or assembly. Greater emphasis needs to be placed on educating homebuilt aircraft owners in the importance of following Federal Aviation Administration guidelines for certification and air worthiness testing. Understanding the aircraft's specifications and design limitations prior to the initial flight and properly maintaining the aircraft should also help to reverse the trend in the number of these crashes and subsequent lives lost. A system for assuring that all home-built aircraft are certified and more accurate reporting of flight hours are needed for accurate tracking of homebuilt aircraft crash rates.

  4. Switching LPV Control for High Performance Tactical Aircraft

    Science.gov (United States)

    Lu, Bei; Wu, Fen; Kim, SungWan

    2004-01-01

    This paper examines a switching Linear Parameter-Varying (LPV) control approach to determine if it is practical to use for flight control designs within a wide angle of attack region. The approach is based on multiple parameter-dependent Lyapunov functions. The full parameter space is partitioned into overlapping subspaces and a family of LPV controllers are designed, each suitable for a specific parameter subspace. The hysteresis switching logic is used to accomplish the transition among different parameter subspaces. The proposed switching LPV control scheme is applied to an F-16 aircraft model with different actuator dynamics in low and high angle of attack regions. The nonlinear simulation results show that the aircraft performs well when switching among different angle of attack regions.

  5. Allergens might trigger migraine attacks.

    Science.gov (United States)

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  6. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  7. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  8. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  9. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... interesting quantitative problems, that can be solved through an encoding into Satisfiability Modulo Theories. The flexibility and effectiveness of the approach is demonstrated on the study of a national-scale authentication system, whose attack tree is computed thanks to a Java implementation...

  10. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  11. Some legal challenges posed by remote attack

    National Research Council Canada - National Science Library

    William Boothby

    2012-01-01

      Abstract Attacking from a distance is nothing new, but with the advent of certain new technologies, attacks can be undertaken in which the attacker remains very remote from the scene where force will be employed...

  12. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  13. Unmanned aircraft systems

    Science.gov (United States)

    Unmanned platforms have become increasingly more common in recent years for acquiring remotely sensed data. These aircraft are referred to as Unmanned Airborne Vehicles (UAV), Remotely Piloted Aircraft (RPA), Remotely Piloted Vehicles (RPV), or Unmanned Aircraft Systems (UAS), the official term used...

  14. Design of a Three Surfaces R/C Aircraft Model

    Directory of Open Access Journals (Sweden)

    D. P. Coiro

    2002-01-01

    Full Text Available Design of a three lifting surfaces radio-controlled model has been carried out at Dipartimento di Progettazione Aeronautica (DPA by the authors in the last year. The model is intended to be a UAV prototype and is now under construction. The main goal of this small aircraft's design is to check the influence of the canard surface on the aircraft's aerodynamic characteristics and flight behavior, especially at high angles of attack. The aircraft model is also intended to be a flying platform to test sensors, measurement and acquisition systems for research purposes and a valid and low-cost teaching instrument for flight dynamics and flight maneuvering. The aircraft has been designed to fly with and without canard, and all problems relative to aircraft balance and stability have been carefully analyzed and solved. The innovative configuration and the mixed wooden-composite material structure has been obtained with very simple shapes and all the design is focused on realizing a low-cost model. A complete aerodynamic analysis of the configuration up to high angles of attack and a preliminary aircraft stability and performance prediction will be presented.

  15. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  16. What Causes a Heart Attack?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... blood pressure and excess protein in the urine. Preeclampsia is linked to an increased lifetime risk of heart disease, including CHD, heart attack, heart failure , and high blood pressure. Screening and Prevention Lowering your risk factors for coronary heart disease ...

  18. Community Noise Exposure Resulting from Aircraft Operations. Volume 3. Acoustic Data on Military Aircraft: Air Force Attack/Fighter Aircraft

    Science.gov (United States)

    1978-02-01

    MWOflOUNOJN» t\\JfVi(T*J-iDU>e3C\\lfO^ ^ (VJ O K UN W O fVJ N (\\i T^ »-1 -M ^ «UN^- tcc ^OvO^OOCJ O CT K m <Si «> •*■ f. <rc3<y>c3(r*K. ^DK. fsj (O f...NTN*-l ts-^^ KUNT ^fOWvOK ^ (\\J rfl fO fiw <i> vO UN UN -t *C «-* ro C3 K) •-H T« ^ UN M ra ao T-t o cj o o o cr —. CT1 r- U* (Ni

  19. CAS, interdiction, and attack helicopters

    OpenAIRE

    Groenke, Andrew S.

    2005-01-01

    Within days of a major failed strike by attack helicopters during Operation Iraqi Freedom (OIF) analysts were questioning the value of such platforms on the modern battlefield. As OIF moved from combat to stability operations, helicopter losses from enemy action actually increased seemingly strengthening the argument of those who see the helicopter as unsuitable to some combat operations. Attack helicopter operations have diverged into two distinct categories, interdiction and close air sup...

  20. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  1. Detecting GNSS spoofing attacks using INS coupling

    Science.gov (United States)

    Tanil, Cagatay

    Vulnerability of Global Navigation Satellite Systems (GNSS) users to signal spoofing is a critical threat to positioning integrity, especially in aviation applications, where the consequences are potentially catastrophic. In response, this research describes and evaluates a new approach to directly detect spoofing using integrated Inertial Navigation Systems (INS) and fault detection concepts based on integrity monitoring. The monitors developed here can be implemented into positioning systems using INS/GNSS integration via 1) tightly-coupled, 2) loosely-coupled, and 3) uncoupled schemes. New evaluation methods enable the statistical computation of integrity risk resulting from a worst-case spoofing attack - without needing to simulate an unmanageably large number of individual aircraft approaches. Integrity risk is an absolute measure of safety and a well-established metric in aircraft navigation. A novel closed-form solution to the worst-case time sequence of GNSS signals is derived to maximize the integrity risk for each monitor and used in the covariance analyses. This methodology tests the performance of the monitors against the most sophisticated spoofers, capable of tracking the aircraft position - for example, by means of remote tracking or onboard sensing. Another contribution is a comprehensive closed-loop model that encapsulates the vehicle and compensator (estimator and controller) dynamics. A sensitivity analysis uses this model to quantify the leveraging impact of the vehicle's dynamic responses (e.g., to wind gusts, or to autopilot's acceleration commands) on the monitor's detection capability. The performance of the monitors is evaluated for two safety-critical terminal area navigation applications: 1) autonomous shipboard landing and 2) Boeing 747 (B747) landing assisted with Ground Based Augmentation Systems (GBAS). It is demonstrated that for both systems, the monitors are capable of meeting the most stringent precision approach and landing

  2. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology...

  3. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  4. Time-dependent analysis of attacks

    NARCIS (Netherlands)

    Arnold, Florian; Hermanns, H.; Pulungan, Reza; Stoelinga, Mariëlle Ida Antoinette

    The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker’s success as

  5. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  6. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  7. B-52 Launch Aircraft in Flight

    Science.gov (United States)

    2001-01-01

    NASA's venerable B-52 mothership is seen here photographed from a KC-135 Tanker aircraft. The X-43 adapter is visible attached to the right wing. The B-52, used for launching experimental aircraft and for other flight research projects, has been a familiar sight in the skies over Edwards for more than 40 years and is also both the oldest B-52 still flying and the aircraft with the lowest flight time of any B-52. NASA B-52, Tail Number 008, is an air launch carrier aircraft, 'mothership,' as well as a research aircraft platform that has been used on a variety of research projects. The aircraft, a 'B' model built in 1952 and first flown on June 11, 1955, is the oldest B-52 in flying status and has been used on some of the most significant research projects in aerospace history. Some of the significant projects supported by B-52 008 include the X-15, the lifting bodies, HiMAT (highly maneuverable aircraft technology), Pegasus, validation of parachute systems developed for the space shuttle program (solid-rocket-booster recovery system and the orbiter drag chute system), and the X-38. The B-52 served as the launch vehicle on 106 X-15 flights and flew a total of 159 captive-carry and launch missions in support of that program from June 1959 to October 1968. Information gained from the highly successful X-15 program contributed to the Mercury, Gemini, and Apollo human spaceflight programs as well as space shuttle development. Between 1966 and 1975, the B-52 served as the launch aircraft for 127 of the 144 wingless lifting body flights. In the 1970s and 1980s, the B-52 was the launch aircraft for several aircraft at what is now the Dryden Flight Research Center, Edwards, California, to study spin-stall, high-angle-of attack, and maneuvering characteristics. These included the 3/8-scale F-15/spin research vehicle (SRV), the HiMAT (Highly Maneuverable Aircraft Technology) research vehicle, and the DAST (drones for aerodynamic and structural testing). The aircraft supported

  8. Micro-cantilever flow sensor for small aircraft

    KAUST Repository

    Ghommem, Mehdi

    2013-10-01

    We extend the use of cantilever beams as flow sensors for small aircraft. As such, we propose a novel method to measure the airspeed and the angle of attack at which the air travels across a small flying vehicle. We measure beam deflections and extract information about the surrounding flow. Thus, we couple a nonlinear beam model with a potential flow simulator through a fluid-structure interaction scheme. We use this numerical approach to generate calibration curves that exhibit the trend for the variations of the limit cycle oscillations amplitudes of flexural and torsional vibrations with the air speed and the angle of attack, respectively. © The Author(s) 2013.

  9. Switching LPV Control of an F-16 Aircraft via Controller State Reset

    Science.gov (United States)

    Lu, Bei; Wu, Fen; Kim, SungWan

    2004-01-01

    In flight control, the design objective and the aircraft dynamics may be different in low and high angle of attack regions. This paper presents a systematic switching Linear Parameter-varying LPV method to determine if it is practical to use for flight control designs over a wide angle of attack region. The approach is based on multiple parameter-dependent Lyapunov functions a family of LPV controllers are designed, and each of them is suitable for a specific parameter subspace. The state of the controller is reset to guarantee the stability requirement of the Lyapunov function when the switching event occurs. Two parameter-dependent switching logics, hysteresis switching and switching with average dwell times are examined. The proposed switching LPV control scheme is applied to an F-16 aircraft model with different design objectives and aircraft dynamics in low and high angle of attack regions. The nonlinear simulating results using both switching logics are compared.

  10. Numerical simulations of semi-armor-piercing warhead penetrating aircraft carrier target

    Directory of Open Access Journals (Sweden)

    Dong Sangqaing

    2015-01-01

    Full Text Available FEM models of semi-armor-piercing warhead penetrating aircraft carrier deck are established, which are validated by related experimental data. Base on the models, the process of semi-armor-piercing warhead penetrating aircraft carrier deck with different incidence angles and attack angles are carried out. The results show that incidence angles have no remarkable influence on penetration capability of the projectile under the circumstance of zero attack angle. Ductility reaming damage mode and adiabatic plugging damage mode are exhibited in the penetration process. Attack angles have notable influence on penetration capability of the projectile. The FEM models and the results could provide reference for penetration effect research of semi-armor-piercing warhead penetrating aircraft carrier target.

  11. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  12. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  13. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  14. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...

  15. LG-ANALYST: linguistic geometry for master air attack planning

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg

    2003-09-01

    We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.

  16. Meet your Aircraft Quiz

    Science.gov (United States)

    1995-01-01

    This quiz is designed to help a pilot meet his or her aircraft. Although no attempt is made to cover in depth all of the information contained in the typical Pilot's Operating Handbook (POH), Owner's Manual (OM), or Aircraft Flight Manual (AFM), the ...

  17. DEVELOPMENT OF AIRCRAFT,

    Science.gov (United States)

    Criteria of effectiveness of aviation; Development of aviation in the period 1918-1939; Main factors of the progress of speed; Cause of changes of main...factors of combat efficiency of aircraft; Equation of state of production of aircraft; Development of aviation 1939-1959; and Development of one-shot winged and ballistic vehicles.

  18. Contextualising aircraft maintenance documentation

    NARCIS (Netherlands)

    Koornneef, H.; Verhagen, W.J.C.; Curran, Ricky

    2017-01-01

    The use of documentation for task support in aircraft line maintenance is still mostly paper-based, which is slow, burdensome and prone to error. This paper provides an overview of the issues associated with the use of paper-based documentation in aircraft line maintenance and describes the

  19. Trojan Horse Attacking Strategy on Quantum Cryptography

    Science.gov (United States)

    Zeng, Guihua

    2003-08-01

    Trojan horse attacking strategy on quantum cryptography is investigated, three aspects are involved. First, the mechanism for the Trojan horse attacking strategy on quantum cryptography as well as classic cryptography is studied. Then the fragility of the quantum cryptographic algorithm employing EPR pairs as key against the Trojan horse attacking strategy is analyzed. To prevent the Trojan horse attacking strategy, an improvement scheme which makes use of non-orthogonal entangled states is proposed, results show the improvement scheme is robust to the Trojan horse attacking strategy without reducing the security on other kinds of attacking strategies.

  20. Aircraft operations management manual

    Science.gov (United States)

    1992-01-01

    The NASA aircraft operations program is a multifaceted, highly diverse entity that directly supports the agency mission in aeronautical research and development, space science and applications, space flight, astronaut readiness training, and related activities through research and development, program support, and mission management aircraft operations flights. Users of the program are interagency, inter-government, international, and the business community. This manual provides guidelines to establish policy for the management of NASA aircraft resources, aircraft operations, and related matters. This policy is an integral part of and must be followed when establishing field installation policy and procedures covering the management of NASA aircraft operations. Each operating location will develop appropriate local procedures that conform with the requirements of this handbook. This manual should be used in conjunction with other governing instructions, handbooks, and manuals.

  1. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  2. Timing Is Everything with Heart Attacks

    Science.gov (United States)

    ... and certain time periods. The study was published online recently in the American Heart Journal . Previous research has suggested that highly stressful events, such as earthquakes and World Cup soccer games, may trigger heart attacks. Stress-related heart attacks ...

  3. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  4. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  5. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  6. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  7. Wind Tunnel Test of a C-18 Aircraft Modified with the Advanced Range Instrumentation Aircraft Radome

    Science.gov (United States)

    1982-12-01

    attack (degrees) cc. Angle between fuselage reference line and tunnel 9 axis (degrees) ARIA Advanced Ranae Instrumentation Aircraft b Wing Span BASIC...0.010 -o.0 0 0. ojo -2.76 1).I 1 t 5 1036 -0.76 0~.𔃻*1 3 C .135 3.125 r 0 2(1? C..er, f 3.’ 1 LFAST -S0UAFPF nA F TT ORDEP 2 B3ETA CN CD -6.76

  8. Intermittent hypoendorphinaemia in migraine attack.

    Science.gov (United States)

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission.

  9. Predicting Visibility of Aircraft

    Science.gov (United States)

    Watson, Andrew; Ramirez, Cesar V.; Salud, Ellen

    2009-01-01

    Visual detection of aircraft by human observers is an important element of aviation safety. To assess and ensure safety, it would be useful to be able to be able to predict the visibility, to a human observer, of an aircraft of specified size, shape, distance, and coloration. Examples include assuring safe separation among aircraft and between aircraft and unmanned vehicles, design of airport control towers, and efforts to enhance or suppress the visibility of military and rescue vehicles. We have recently developed a simple metric of pattern visibility, the Spatial Standard Observer (SSO). In this report we examine whether the SSO can predict visibility of simulated aircraft images. We constructed a set of aircraft images from three-dimensional computer graphic models, and measured the luminance contrast threshold for each image from three human observers. The data were well predicted by the SSO. Finally, we show how to use the SSO to predict visibility range for aircraft of arbitrary size, shape, distance, and coloration. PMID:19462007

  10. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  11. Joint Direct Attack Munition (JDAM)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...Mission and Description 6 Executive Summary 7 Threshold Breaches 8 Schedule 9 Performance 12 Track to Budget 14 Cost and Funding...15 Low Rate Initial Production 26 Foreign Military Sales 27 Nuclear Costs 29 Unit Cost 30 Cost Variance 33 Contracts 36

  12. Dual Stage SQL Injection Attacks

    OpenAIRE

    Eve, Martin Paul

    2009-01-01

    I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below.\\ud \\ud The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board. This shows how this can be bypassed using a dual-stage SQL injection attack.

  13. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin, S.; Faizal, M. A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  14. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ). ?Spear Phishing? refers to targeted social engineering-type email attacks (Jagatic, 2007). ?Physical? refers to manual methods to gain access, for example physically removing the hard drive or breaking the access door to enter a secure server room... the size and utility of the target. The "Target" class is the physical device or entity targeted by an attack. The "Vulnerability" class describes a target vulnerability used by the attacker. The "Phase" class represents an attack model that subdivides...

  15. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  16. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  17. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which ...

  18. Detecting aircraft with a low-resolution infrared sensor.

    Science.gov (United States)

    Jakubowicz, Jérémie; Lefebvre, Sidonie; Maire, Florian; Moulines, Eric

    2012-06-01

    Existing computer simulations of aircraft infrared signature (IRS) do not account for dispersion induced by uncertainty on input data, such as aircraft aspect angles and meteorological conditions. As a result, they are of little use to estimate the detection performance of IR optronic systems; in this case, the scenario encompasses a lot of possible situations that must be indeed addressed, but cannot be singly simulated. In this paper, we focus on low-resolution infrared sensors and we propose a methodological approach for predicting simulated IRS dispersion of poorly known aircraft and performing aircraft detection on the resulting set of low-resolution infrared images. It is based on a sensitivity analysis, which identifies inputs that have negligible influence on the computed IRS and can be set at a constant value, on a quasi-Monte Carlo survey of the code output dispersion, and on a new detection test taking advantage of level sets estimation. This method is illustrated in a typical scenario, i.e., a daylight air-to-ground full-frontal attack by a generic combat aircraft flying at low altitude, over a database of 90,000 simulated aircraft images. Assuming a white noise or a fractional Brownian background model, detection performances are very promising.

  19. Grid generation for a complex aircraft configuration

    Science.gov (United States)

    Bruns, Jim

    1992-01-01

    The procedure used to create a grid around the F/A-18 fighter aircraft is presented. This work was done for the NASA High Alpha Technology Program. As part of this program, LeRC is numerically and experimentally investigating the flow in the F/A-18 inlet duct at high angles of attack. A grid was needed which could be used to calculate both the external and internal flow around the F/A-18. The grid had to be compatible with the computational fluid dynamics (CFD) codes PARC3D and CFL3D. The programs used to create this grid were I3GVIRGO and GRIDGEN. A surface definition used to create the grid was obtained from McDonnell Aircraft Company (MCAIR) and was composed of numerous files each containing a point definition of a portion of the aircraft. These files were read into the geometry manipulation program I3GVIRGO, where they were modified and grouped into smaller GRIDGEN database files. Next, the block outlines and boundary conditions were specified in the GRIDBLOCK program. The GRIDGEN2D program was used to create the surface grid on the block faces, and GRIDGEN3D was used to create the full 3-D grid.

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  2. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  3. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  4. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like personal... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612...

  5. Aircraft Engine Emissions Estimator

    Science.gov (United States)

    1985-11-01

    Protection Agency, " Control of Air Pollution From Aircraft and Aircraft Engines," 43 FR 12615, March 24, Vq7. 51 ~~SL% 12. Souza, A.F. F-100 Afterburner...R.G. Technical Support Report-Aircraft Emissions Factors, USEPA Office of Mobile Source Air Pollution Control , Ann Arbor, MI, March 1977. 14. Souza, A.F...STAVILITY CATEGOUY 6 WIND SPELU (METERS/SECOND) 1600 WINU DIRECTION TAILWIN) TEMPERATURa " (F) 38.0O MIXING DEPT" (METLRS) l1.o00

  6. SOLAR AIRCRAFT DESIGN

    OpenAIRE

    Rahmati, Sadegh; GHASED, Amir

    2015-01-01

    Abstract. Generally domain Aircraft uses conventional fuel. These fuel having limited life, high cost and pollutant. Also nowadays price of petrol and other fuels are going to be higher, because of scarcity of those fuels. So there is great demand of use of non-exhaustible unlimited source of energy like solar energy. Solar aircraft is one of the ways to utilize solar energy. Solar aircraft uses solar panel to collect the solar radiation for immediate use but it also store the remaining part ...

  7. Tropospheric sampling with aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Daum, P.H.; Springston, S.R.

    1991-03-01

    Aircraft constitute a unique environment which places stringent requirements on the instruments used to measure the concentrations of atmospheric trace gases and aerosols. Some of these requirements such as minimization of size, weight, and power consumption are general; others are specific to individual techniques. This review presents the basic principles and considerations governing the deployment of trace gas and aerosol instrumentation on an aircraft. An overview of common instruments illustrates these points and provides guidelines for designing and using instruments on aircraft-based measurement programs.

  8. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  9. Aircraft electromagnetic compatibility

    Science.gov (United States)

    Clarke, Clifton A.; Larsen, William E.

    1987-06-01

    Illustrated are aircraft architecture, electromagnetic interference environments, electromagnetic compatibility protection techniques, program specifications, tasks, and verification and validation procedures. The environment of 400 Hz power, electrical transients, and radio frequency fields are portrayed and related to thresholds of avionics electronics. Five layers of protection for avionics are defined. Recognition is given to some present day electromagnetic compatibility weaknesses and issues which serve to reemphasize the importance of EMC verification of equipment and parts, and their ultimate EMC validation on the aircraft. Proven standards of grounding, bonding, shielding, wiring, and packaging are laid out to help provide a foundation for a comprehensive approach to successful future aircraft design and an understanding of cost effective EMC in an aircraft setting.

  10. Aircraft electromagnetic compatibility

    Science.gov (United States)

    Clarke, Clifton A.; Larsen, William E.

    1987-01-01

    Illustrated are aircraft architecture, electromagnetic interference environments, electromagnetic compatibility protection techniques, program specifications, tasks, and verification and validation procedures. The environment of 400 Hz power, electrical transients, and radio frequency fields are portrayed and related to thresholds of avionics electronics. Five layers of protection for avionics are defined. Recognition is given to some present day electromagnetic compatibility weaknesses and issues which serve to reemphasize the importance of EMC verification of equipment and parts, and their ultimate EMC validation on the aircraft. Proven standards of grounding, bonding, shielding, wiring, and packaging are laid out to help provide a foundation for a comprehensive approach to successful future aircraft design and an understanding of cost effective EMC in an aircraft setting.

  11. Unmanned Aircraft Systems - Orthoimagery

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The USGS National Unmanned Aircraft Systems (UAS) Project Office utilizes UAS technology for collecting remote sensing data on a local scale. Typical UAS projects...

  12. Depreciation of aircraft

    Science.gov (United States)

    Warner, Edward P

    1922-01-01

    There is a widespread, and quite erroneous, impression to the effect that aircraft are essentially fragile and deteriorate with great rapidity when in service, so that the depreciation charges to be allowed on commercial or private operation are necessarily high.

  13. Aircraft Depainting Technology

    National Research Council Canada - National Science Library

    Kozol, Joseph

    1999-01-01

    ... of aircraft and component stripping at various levels of maintenance. Under this program, the Navy pursued development of non-HAP chemical paint strippers as alternatives for methylene chloride based strippers...

  14. Essentials of aircraft armaments

    CERN Document Server

    Kaushik, Mrinal

    2017-01-01

    This book aims to provide a complete exposure about armaments from their design to launch from the combat aircraft. The book details modern ammunition and their tactical roles in warfare. The proposed book discusses aerodynamics, propulsion, structural as well as navigation, control, and guidance of aircraft armament. It also introduces the various types of ammunition developed by different countries and their changing trends. The book imparts knowledge in the field of design, and development of aircraft armaments to aerospace engineers and covers the role of the United Nations in peacekeeping and disarmament. The book will be very useful to researchers, students, and professionals working in design and manufacturing of aircraft armaments. The book will also serve air force and naval aspirants, and those interested in working on defence research and developments organizations. .

  15. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems.The facility allows for the simulation of a...

  16. Aircraft Survivability. Summer 2011

    Science.gov (United States)

    2011-01-01

    aircraft in Mombasa, Kenya, in 2002 and a DHL cargo aircraft in Baghdad, Iraq, in 2003, the threat is not limited to military operations, but is of...Government/ Customer Iterate Based on Changes Over the Life of the A/C Describe Performance Requirements Figure 3 Value of Impact Capability Figure 2 FSC... customer describing their performance requirements, identifying probable mission scenarios, prioritizing possible impact conditions, and setting

  17. Aircraft engine noise

    Science.gov (United States)

    Kennepohl, F.

    An overview of the main aircraft engine noise sources is given. Special emphasis is devoted to turbomachinery/rotor noise, which plays an important role in all engine concepts appropriate to regional aircraft, such as turbofans, propellers, or new propfan engine concepts. The noise generating mechanisms, including propagation within the engine, and calculation methods used are described. Noise reduction methods are considered, with emphasis on cutoff design of turbomachines. Some noise features of counter rotating propellers and swept rotor blades are mentioned.

  18. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  19. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  20. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  1. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  2. Shoulder injuries from attacking motion

    Science.gov (United States)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  3. Manned and Unmanned Aircraft Effectiveness in Fast Attack Craft / Fast Inshore Attack Craft ASUW Kill Chain Execution

    Science.gov (United States)

    2016-09-01

    modeling requirements of my thesis quickly overwhelmed me. The assistance of Professor Singham transformed programming errors and a maze of code into...School Research ICO CDR A.D. Anderson.” Received by Alexander Anderson, 05 May 2016. Scharre, Paul. “ Robotics on the Battlefield Part I: Range

  4. Identification of Aircraft Hazards

    Energy Technology Data Exchange (ETDEWEB)

    K. Ashley

    2006-12-08

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7).

  5. IDENTIFICATION OF AIRCRAFT HAZARDS

    Energy Technology Data Exchange (ETDEWEB)

    K.L. Ashley

    2005-03-23

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7).

  6. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  7. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  8. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  9. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using exist...

  10. Snow fall and heart attacks.

    Science.gov (United States)

    Persinger, M A; Ballance, S E; Moland, M

    1993-03-01

    Total numbers of daily hospital admissions for cardiac emergencies were obtained from 3 hospitals within the Sudbury Basin in Canada for November through March for each of 4 consecutive years (1983-1986). Major diagnostic categories were also differentiated. No statistically significant correlations were found between the amount of snowfall during the day of or the days before or after admissions for the major categories of cardiac emergency. Specific analyses, conducted to reveal possible recondite associations between extreme or cumulative snowfalls and the most extreme days of cardiac emergencies, indicated a chance association. We conclude that the occurrence of heart attacks is independent of snowfall but that, when they occur, they are attributed to shoveling if there has been a recent major snow storm.

  11. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  12. AIRCRAFT MAINTENANCE HANGAR

    Directory of Open Access Journals (Sweden)

    GEAMBASU Gabriel George

    2017-05-01

    Full Text Available The paper presents the maintenance process that is done on an airplane, at a certain period of time, or after a number of flight hours or cycles and describes the checks performed behind each inspection. The first part of research describes the aircraft maintenance process that has to be done after an updated maintenance manual according with aircraft type, followed by a short introduction about maintenance hangar. The second part of the paper presents a hangar design with a foldable roof and walls, which can be folded or extended, over an airplane when a maintenance process is done, or depending on weather condition.

  13. Composite materials for aircraft structures

    National Research Council Canada - National Science Library

    Baker, A. A; Dutton, Stuart; Kelly, Donald

    2004-01-01

    ... materials for aircraft structures / Alan Baker, Stuart Dutton, and Donald Kelly- 2nd ed. p. cm. - (Education series) Rev. ed. of: Composite materials for aircraft structures / edited by B. C. Hos...

  14. MODELLING OF SOME AIRCRAFT PARAMETERS

    African Journals Online (AJOL)

    . There has, therefore, been a wide range reaction against aircraft noise in particular by community residents living close to the airports. Research has, thus, been mainly on effect of aircraft noise particularly and environmental noise and ...

  15. Aircraft and related factors in crashes involving spatial disorientation: 15 years of U.S. Air Force data.

    Science.gov (United States)

    Lyons, Terence J; Ercoline, William; O'Toole, Kevin; Grayson, Kevin

    2006-07-01

    Previous studies have determined that spatial disorientation (SD) causes 0.5-23% of aircraft crashes, but SD-related crash and fatality rates in different aircraft types have not been systematically studied. SD crashes for the fiscal years 1990 to 2004 and aircraft sortie numbers for all U.S. Air Force (USAF) aircraft were obtained from the USAF Safety Center. Contingency table analysis and Chi-squared tests were used to evaluate differences in SD rates. SD accounted for 11% of USAF crashes with an overall rate of 2.9 per million sorties and a crash fatality rate of 69%. The SD rate was higher in fighter/attack aircraft and helicopters than in training and transport aircraft. The risk of SD was increased at night with 23% of night crashes being caused by SD. But the SD rate and crash fatality rate were not higher in single-crewmember aircraft. SD risk is significantly increased in helicopters and fighter/attack aircraft and at night. The data suggest that a second crewmember does not protect against SD. Further study of specific SD scenarios could lead to focused interventions for SD prevention.

  16. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  17. The Aircraft Industry, 2006

    Science.gov (United States)

    2006-01-01

    France Eurocopter , Marseille, France Organization of Economic Cooperation and Development, Paris, France Rolls Royce Aircraft Engines, Civil and...A320/340/380 Production Lines, Blagnac, France BAE Systems plc Corporate Offices, London, United Kingdom Dassault Corporate Headquarters, St. Cloud...Defence Aerospace Divisions, Derby, United Kingdom Societe Nationale d’Etude et de Construction de Moteurs d’Aviation (SNECMA), Evry, France

  18. Robots for Aircraft Maintenance

    Science.gov (United States)

    1993-01-01

    Marshall Space Flight Center charged USBI (now Pratt & Whitney) with the task of developing an advanced stripping system based on hydroblasting to strip paint and thermal protection material from Space Shuttle solid rocket boosters. A robot, mounted on a transportable platform, controls the waterjet angle, water pressure and flow rate. This technology, now known as ARMS, has found commercial applications in the removal of coatings from jet engine components. The system is significantly faster than manual procedures and uses only minimal labor. Because the amount of "substrate" lost is minimal, the life of the component is extended. The need for toxic chemicals is reduced, as is waste disposal and human protection equipment. Users of the ARMS work cell include Delta Air Lines and the Air Force, which later contracted with USBI for development of a Large Aircraft Paint Stripping system (LARPS). LARPS' advantages are similar to ARMS, and it has enormous potential in military and civil aircraft maintenance. The technology may also be adapted to aircraft painting, aircraft inspection techniques and paint stripping of large objects like ships and railcars.

  19. Aircraft to Medicine

    Science.gov (United States)

    1991-01-01

    This video discusses how the technology of computer modeling can improve the design and durability of artificial joints for human joint replacement surgery. Also, ultrasound, originally used to detect structural flaws in aircraft, can also be used to quickly assess the severity of a burn patient's injuries, thus aiding the healing process.

  20. Aircraft adaptive learning control

    Science.gov (United States)

    Lee, P. S. T.; Vanlandingham, H. F.

    1979-01-01

    The optimal control theory of stochastic linear systems is discussed in terms of the advantages of distributed-control systems, and the control of randomly-sampled systems. An optimal solution to longitudinal control is derived and applied to the F-8 DFBW aircraft. A randomly-sampled linear process model with additive process and noise is developed.

  1. Generating attacks in SysML activity diagrams by detecting attack surfaces

    NARCIS (Netherlands)

    Ouchani, Samir; Lenzini, Gabriele

    In the development process of a secure system is essential to detect as early as possible the system’s vulnerable points, the so called attack surfaces, and to estimate how feasible it would be that known attacks breach through them. Even if attack surfaces can be sometimes detected automatically,

  2. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  3. A Simulation Investigation of Scout/Attack Helicopter Directional Control Requirements for Hover and Low-Speed Tasks

    Science.gov (United States)

    1987-03-01

    control requirements have been rapidly evolv- ing over the past few years. The i.nticipated role of the Advanced Scout/Attack (SCAT) helicopter has...of an aircraft that govern the ease and precision with which a pilot is able to perform the tasks required in support of an aircraft role " (ref. 1...trying to acquire the target. 1/24/84 4 No 1 12 5 I can’t get the pipper on the targe t and geL a propter t ngaement signal. 1/24/84 1 No 2 6 5 It took

  4. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  5. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  6. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  7. Micromechanics of high temperature hydrogen attack

    NARCIS (Netherlands)

    Schlögl, Sabine M.; Giessen, Erik van der

    1999-01-01

    Hydrogen attack is a material degradation process that occurs at elevated temperatures in hydrogen-rich environments, such as found in petro-chemical installations. Weldments in components such as reactor vessels are particularly susceptible to hydrogen attack. This paper discusses a multi-scale

  8. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  10. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  11. Numerical study of aerodynamic characteristics of FSW aircraft with different wing positions under supersonic condition

    Directory of Open Access Journals (Sweden)

    Lei Juanmian

    2016-08-01

    Full Text Available This paper investigates the influence of forward-swept wing (FSW positions on the aerodynamic characteristics of aircraft under supersonic condition (Ma = 1.5. The numerical method based on Reynolds-averaged Navier–Stokes (RANS equations, Spalart–Allmaras (S–A turbulence model and implicit algorithm is utilized to simulate the flow field of the aircraft. The aerodynamic parameters and flow field structures of the horizontal tail and the whole aircraft are presented. The results demonstrate that the spanwise flow of FSW flows from the wingtip to the wing root, generating an upper wing surface vortex and a trailing edge vortex nearby the wing root. The vortexes generated by FSW have a strong downwash effect on the tail. The lower the vertical position of FSW, the stronger the downwash effect on tail. Therefore, the effective angle of attack of tail becomes smaller. In addition, the lift coefficient, drag coefficient and lift–drag ratio of tail decrease, and the center of pressure of tail moves backward gradually. For the whole aircraft, the lower the vertical position of FSW, the smaller lift, drag and center of pressure coefficients of aircraft. The closer the FSW moves towards tail, the bigger pitching moment and center of pressure coefficients of the whole aircraft, but the lift and drag characteristics of the horizontal tail and the whole aircraft are basically unchanged. The results have potential application for the design of new concept aircraft.

  12. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  13. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  14. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  15. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  16. Dryden B-52 Launch Aircraft in Flight over Dryden

    Science.gov (United States)

    1996-01-01

    NASA's venerable B-52 mothership flies over the main building at the Dryden Flight Research Center, Edwards, California. The B-52, used for launching experimental aircraft and for other flight research projects, has been a familiar sight in the skies over Edwards for more than 40 years and has also been both the oldest B-52 still flying and the aircraft with the lowest flight time of any B-52. NASA B-52, Tail Number 008, is an air launch carrier aircraft, 'mothership,' as well as a research aircraft platform that has been used on a variety of research projects. The aircraft, a 'B' model built in 1952 and first flown on June 11, 1955, is the oldest B-52 in flying status and has been used on some of the most significant research projects in aerospace history. Some of the significant projects supported by B-52 008 include the X-15, the lifting bodies, HiMAT (highly maneuverable aircraft technology), Pegasus, validation of parachute systems developed for the space shuttle program (solid-rocket-booster recovery system and the orbiter drag chute system), and the X-38. The B-52 served as the launch vehicle on 106 X-15 flights and flew a total of 159 captive-carry and launch missions in support of that program from June 1959 to October 1968. Information gained from the highly successful X-15 program contributed to the Mercury, Gemini, and Apollo human spaceflight programs as well as space shuttle development. Between 1966 and 1975, the B-52 served as the launch aircraft for 127 of the 144 wingless lifting body flights. In the 1970s and 1980s, the B-52 was the launch aircraft for several aircraft at what is now the Dryden Flight Research Center, Edwards, California, to study spin-stall, high-angle-of attack, and maneuvering characteristics. These included the 3/8-scale F-15/spin research vehicle (SRV), the HiMAT (Highly Maneuverable Aircraft Technology) research vehicle, and the DAST (drones for aerodynamic and structural testing). The aircraft supported the development of

  17. Optimal PID Controller Tuning for Multivariable Aircraft Longitudinal Autopilot Based on Particle Swarm Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Mostafa Lotfi Forushani

    2012-04-01

    Full Text Available This paper presents an optimized controller around the longitudinal axis of multivariable system in one of the aircraft flight conditions. The controller is introduced in order to control the angle of attack from the pitch attitude angle independently (that is required for designing a set of direct force-modes for the longitudinal axis based on particle swarm optimization (PSO algorithm. The autopilot system for military or civil aircraft is an essential component and in this paper, the autopilot system via 6 degree of freedom model for the control and guidance of aircraft in which the autopilot design will perform based on defining the longitudinal and the lateral-directional axes are supposed. The effectiveness of the proposed controller is illustrated by considering HIMAT aircraft. The simulation results verify merits of the proposed controller.

  18. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  19. Curved flow wind tunnnel test of F-18 aircraft

    Science.gov (United States)

    Lutze, F. H.

    1980-01-01

    The curved flow capability of a stability wind tunnel was used to investigate the lateral directional characteristics of an F-18 aircraft. The model is described and the procedures used to obtain and correct the data and a graphical presentation of the results are presented. The results include graphs of lateral directional derivatives versus sideslip or static plots, the lateral directional static stability derivatives versus angle of attack, and finally the lateral directional derivatives versus nondimensional yaw rate for different angles of attack and sideslip. Results are presented for several configurations including complete, complete without vertical tails, complete without horizontal tails, fuselage wing and fuselage alone. Each of these were tested with and without wing leading edge extensions.

  20. Aircraft specific exhaust emissions

    Energy Technology Data Exchange (ETDEWEB)

    Lecht, M.; Deidewig, F.; Doepelheuer, A. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Koeln (Germany). Inst. fuer Antriebstechnik

    1997-12-01

    The objective of this work to calculate essential species of aircraft emissions has been approached by a combination of different tasks. First of all engine performance and emission correlation has been modelled taking sea level static measurements from the engine certification process as a reference. At second a flight simulation program has been modified to couple aircraft and engine performance along a flight mission profile. By this for a selected number of aircraft/engine combinations the emissions of NO{sub x}, CO and HC as well as fuel burn for short, medium and long haul flights have been calculated and finally adapted to a specified format of flight distance and altitude increments. Sensitivity studies of the change of emissions along the cruise section showed a 30% decrease of the NO{sub x} emission rate until the end of cruise. Differences of ambient air temperature from ISA conditions will have a substantial impact on NO{sub x}, CO and HC emissions rather than on mission fuel. (orig.) 144 figs., 42 tabs., 497 refs.

  1. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  2. Forced Oscillation Wind Tunnel Testing for FASER Flight Research Aircraft

    Science.gov (United States)

    Hoe, Garrison; Owens, Donald B.; Denham, Casey

    2012-01-01

    As unmanned air vehicles (UAVs) continue to expand their flight envelopes into areas of high angular rate and high angle of attack, modeling the complex unsteady aerodynamics for simulation in these regimes has become more difficult using traditional methods. The goal of this experiment was to improve the current six degree-of-freedom aerodynamic model of a small UAV by replacing the analytically derived damping derivatives with experimentally derived values. The UAV is named the Free-flying Aircraft for Sub-scale Experimental Research, FASER, and was tested in the NASA Langley Research Center 12- Foot Low-Speed Tunnel. The forced oscillation wind tunnel test technique was used to measure damping in the roll and yaw axes. By imparting a variety of sinusoidal motions, the effects of non-dimensional angular rate and reduced frequency were examined over a large range of angle of attack and side-slip combinations. Tests were performed at angles of attack from -5 to 40 degrees, sideslip angles of -30 to 30 degrees, oscillation amplitudes from 5 to 30 degrees, and reduced frequencies from 0.010 to 0.133. Additionally, the effect of aileron or elevator deflection on the damping coefficients was examined. Comparisons are made of two different data reduction methods used to obtain the damping derivatives. The results show that the damping derivatives are mainly a function of angle of attack and have dependence on the non-dimensional rate and reduced frequency only in the stall/post-stall regime

  3. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    Science.gov (United States)

    ... Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT Most heart ... to the hospital immediately. Learn more about stroke CARDIAC ARREST WARNING SIGNS SUDDEN LOSS OF RESPONSIVENESS No response ...

  4. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  5. Dryden B-52 Launch Aircraft on Edwards AFB Runway

    Science.gov (United States)

    1996-01-01

    NASA's venerable workhorse, the B-52 mothership, rolls out on the Edwards AFB runway after a test flight in 1996. Over the course of more than 40 years, the B-52 launched numerous experimental aircraft, ranging from the X-15 to the X-38, and was also used as a flying testbed for a variety of other research projects. NASA B-52, Tail Number 008, is an air launch carrier aircraft, 'mothership,' as well as a research aircraft platform that has been used on a variety of research projects. The aircraft, a 'B' model built in 1952 and first flown on June 11, 1955, is the oldest B-52 in flying status and has been used on some of the most significant research projects in aerospace history. Some of the significant projects supported by B-52 008 include the X-15, the lifting bodies, HiMAT (highly maneuverable aircraft technology), Pegasus, validation of parachute systems developed for the space shuttle program (solid-rocket-booster recovery system and the orbiter drag chute system), and the X-38. The B-52 served as the launch vehicle on 106 X-15 flights and flew a total of 159 captive-carry and launch missions in support of that program from June 1959 to October 1968. Information gained from the highly successful X-15 program contributed to the Mercury, Gemini, and Apollo human spaceflight programs as well as space shuttle development. Between 1966 and 1975, the B-52 served as the launch aircraft for 127 of the 144 wingless lifting body flights. In the 1970s and 1980s, the B-52 was the launch aircraft for several aircraft at what is now the Dryden Flight Research Center, Edwards, California, to study spin-stall, high-angle-of attack, and maneuvering characteristics. These included the 3/8-scale F-15/spin research vehicle (SRV), the HiMAT (Highly Maneuverable Aircraft Technology) research vehicle, and the DAST (drones for aerodynamic and structural testing). The aircraft supported the development of parachute recovery systems used to recover the space shuttle solid rocket

  6. Dryden B-52 Launch Aircraft on Dryden Ramp

    Science.gov (United States)

    1996-01-01

    NASA's venerable B-52 mothership sits on the ramp in front of the Dryden Flight Research Center, Edwards, California. Over the course of more than 40 years, the B-52 launched numerous experimental aircraft, ranging from the X-15 to the X-38, and was also used as a flying testbed for a variety of other research projects. NASA B-52, Tail Number 008, is an air launch carrier aircraft, 'mothership,' as well as a research aircraft platform that has been used on a variety of research projects. The aircraft, a 'B' model built in 1952 and first flown on June 11, 1955, is the oldest B-52 in flying status and has been used on some of the most significant research projects in aerospace history. Some of the significant projects supported by B-52 008 include the X-15, the lifting bodies, HiMAT (highly maneuverable aircraft technology), Pegasus, validation of parachute systems developed for the space shuttle program (solid-rocket-booster recovery system and the orbiter drag chute system), and the X-38. The B-52 served as the launch vehicle on 106 X-15 flights and flew a total of 159 captive-carry and launch missions in support of that program from June 1959 to October 1968. Information gained from the highly successful X-15 program contributed to the Mercury, Gemini, and Apollo human spaceflight programs as well as space shuttle development. Between 1966 and 1975, the B-52 served as the launch aircraft for 127 of the 144 wingless lifting body flights. In the 1970s and 1980s, the B-52 was the launch aircraft for several aircraft at what is now the Dryden Flight Research Center, Edwards, California, to study spin-stall, high-angle-of attack, and maneuvering characteristics. These included the 3/8-scale F-15/spin research vehicle (SRV), the HiMAT (Highly Maneuverable Aircraft Technology) research vehicle, and the DAST (drones for aerodynamic and structural testing). The aircraft supported the development of parachute recovery systems used to recover the space shuttle solid rocket

  7. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  8. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  9. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  10. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... heart attack at age 36, it stopped her "dead in her tracks." Jennifer reminds us how heart disease takes too many of our moms, sisters, and friends from us every day. The more we share our stories, the faster ...

  11. Transient ischemic attack: definition and natural history.

    Science.gov (United States)

    Caplan, Louis R

    2006-07-01

    The standard definition of a transient ischemic attack--"a cerebral dysfunction of an ischemic nature lasting no longer than 24 hours with a tendency to recur"--was arrived at arbitrarily and is no longer tenable. Experience shows that attacks are much briefer, usually less than an hour, and many are associated with brain infarction. A newer definition, more consonant with the data, is preferred--"transient ischemic attack is a brief episode of neurological dysfunction caused by focal brain or retinal ischemia, with clinical symptoms typically lasting less than an hour, and without evidence of acute infarction." Patients with transient ischemic attacks require urgent evaluation that includes brain and vascular imaging, blood tests, and often cardiac investigations. Treatment will depend on the nature of the causative cervico-cranial vascular, cardiac, and hematologic abnormalities found on investigation.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  14. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  15. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  16. Being active after your heart attack

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000093.htm Being active after your heart attack To use the sharing ... urac.org). URAC's accreditation program is an independent audit to verify that A.D.A.M. follows ...

  17. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  18. Panic attack history and smoking topography.

    Science.gov (United States)

    Farris, Samantha G; Brown, Lily A; Goodwin, Renee D; Zvolensky, Michael J

    2017-02-01

    Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Participants (n=124, Mage=43.9, SD=9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n=35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  20. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  1. 19 CFR 122.64 - Other aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Other aircraft. 122.64 Section 122.64 Customs... AIR COMMERCE REGULATIONS Clearance of Aircraft and Permission To Depart § 122.64 Other aircraft. Clearance or permission to depart shall be requested by the aircraft commander or agent for aircraft covered...

  2. Rotary Balance Wind Tunnel Testing for the FASER Flight Research Aircraft

    Science.gov (United States)

    Denham, Casey; Owens, D. Bruce

    2016-01-01

    Flight dynamics research was conducted to collect and analyze rotary balance wind tunnel test data in order to improve the aerodynamic simulation and modeling of a low-cost small unmanned aircraft called FASER (Free-flying Aircraft for Sub-scale Experimental Research). The impetus for using FASER was to provide risk and cost reduction for flight testing of more expensive aircraft and assist in the improvement of wind tunnel and flight test techniques, and control laws. The FASER research aircraft has the benefit of allowing wind tunnel and flight tests to be conducted on the same model, improving correlation between wind tunnel, flight, and simulation data. Prior wind tunnel tests include a static force and moment test, including power effects, and a roll and yaw damping forced oscillation test. Rotary balance testing allows for the calculation of aircraft rotary derivatives and the prediction of steady-state spins. The rotary balance wind tunnel test was conducted in the NASA Langley Research Center (LaRC) 20-Foot Vertical Spin Tunnel (VST). Rotary balance testing includes runs for a set of given angular rotation rates at a range of angles of attack and sideslip angles in order to fully characterize the aircraft rotary dynamics. Tests were performed at angles of attack from 0 to 50 degrees, sideslip angles of -5 to 10 degrees, and non-dimensional spin rates from -0.5 to 0.5. The effects of pro-spin elevator and rudder deflection and pro- and anti-spin elevator, rudder, and aileron deflection were examined. The data are presented to illustrate the functional dependence of the forces and moments on angle of attack, sideslip angle, and angular rate for the rotary contributions to the forces and moments. Further investigation is necessary to fully characterize the control effectors. The data were also used with a steady state spin prediction tool that did not predict an equilibrium spin mode.

  3. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  4. An oracle-based attack on CAPTCHAs protected against oracle attacks

    OpenAIRE

    Hernández-Castro, Carlos Javier; R-Moreno, María D.; David F. Barrero; Li, Shujun

    2017-01-01

    CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks in which attackers can use them as oracles. Kwon and Cha presented recently a novel algorithm that intends to avoid such learning attacks and "detect all bots". They add uncertainties to the grading of challenges, and also use trap images designed to detect bots. The authors suggest that a major IT corporation is studying their proposal for mainstream implementation....

  5. 14 CFR 21.6 - Manufacture of new aircraft, aircraft engines, and propellers.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Manufacture of new aircraft, aircraft... Manufacture of new aircraft, aircraft engines, and propellers. (a) Except as specified in paragraphs (b) and (c) of this section, no person may manufacture a new aircraft, aircraft engine, or propeller based on...

  6. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  7. Chemistry in aircraft plumes

    Energy Technology Data Exchange (ETDEWEB)

    Kraabol, A.G.; Stordal, F.; Knudsen, S. [Norwegian Inst. for Air Research, Kjeller (Norway); Konopka, P. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Wessling (Germany). Inst. fuer Physik der Atmosphaere

    1997-12-31

    An expanding plume model with chemistry has been used to study the chemical conversion of NO{sub x} to reservoir species in aircraft plumes. The heterogeneous conversion of N{sub 2}O{sub 5} to HNO{sub 3}(s) has been investigated when the emissions take place during night-time. The plume from an B747 has been simulated. During a ten-hour calculation the most important reservoir species was HNO{sub 3} for emissions at noon. The heterogeneous reactions had little impact on the chemical loss of NO{sub x} to reservoir species for emissions at night. (author) 4 refs.

  8. Commercial Aircraft Protection

    Energy Technology Data Exchange (ETDEWEB)

    Ehst, David A. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-10-26

    This report summarizes the results of theoretical research performed during 3 years of P371 Project implementation. In results of such research a new scientific conceptual technology of quasi-passive individual infrared protection of heat-generating objects – Spatial Displacement of Thermal Image (SDTI technology) was developed. Theoretical substantiation and description of working processes of civil aircraft individual IR-protection system were conducted. The mathematical models and methodology were presented, there were obtained the analytical dependencies which allow performing theoretical research of the affect of intentionally arranged dynamic field of the artificial thermal interferences with variable contrast onto main parameters of optic-electronic tracking and homing systems.

  9. Aircraft vulnerability analysis by modelling and simulation

    CSIR Research Space (South Africa)

    Willers, CJ

    2014-09-01

    Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

  10. ERGONOMIC DESIGN OF AIRCRAFT COCKPIT

    Directory of Open Access Journals (Sweden)

    CÎMPIAN Ionuţ

    2011-06-01

    Full Text Available This paper presents a model for an ergonomic design of an aircraft cockpit with the specification and verification with respect to the new European Aviation Safety Agency (EASA and Federal Aviation Administration (FAA requirements. The goal is to expressing the concepts on which the aircraft cockpit design is based.

  11. ERGONOMIC DESIGN OF AIRCRAFT COCKPIT

    Directory of Open Access Journals (Sweden)

    CÎMPIAN Ionuţ

    2012-09-01

    Full Text Available This paper presents a model for an ergonomic design of an aircraft cockpit with the specification and verification with respect to the new European Aviation Safety Agency (EASA and Federal Aviation Administration (FAA requirements. The goal is to expressing the concepts on which the aircraft cockpit design are based.

  12. MATHEMATICAL ASPECTS OF AIRCRAFT ENGINES RUNNING OPTIMIZATION FOR MINIMUM FUEL CONSUMPTION WHILE LANDING

    Directory of Open Access Journals (Sweden)

    Yuriy Michaylovich Chinyuchin

    2017-01-01

    Full Text Available The consistency of the potential increase of fuel efficiency, based on aircraft maintenance optimization, is mathe- matically proved. The mathematical apparatus and a set mathematical model of aircraft spatial motion allow to analyze aircraft behavior on the stage before landing and to draw optimal flight path for minimum fuel consumption with fixed time.For effective problem solving the choice and realization of optimal flight paths are made. The algorithm for the problem of optimal civil aircraft flight control aimed at the most accurate realization of chosen soft path under limited time conditions is proposed. The optimization of the given process is made by solving a point-to-point boundary canonical sys- tem based on the Pontryagin maximum principle.The necessary initial data and conditions for the statement of problem are given. The mathematical model for the simplification of calculations is created and its equivalent representation is given by uniting problems of controls by thrust channels and the angle of attack as the thrust control function. The boundary-value problem is mathematically composed and the analytical apparatus of its solution is presented. Optimal aircraft landing paths reflecting the behavior of the angle of attack and thrust are constructed. The potential of this method is proved by the economic justifiability and its effectiveness, in particular the compar- ison of total aircraft fuel consumption on obtained optimal path to the classic path on which there are rectilinear sections what allowed to confirm the conclusion about the economical expedience and effectiveness of the method of aircraft con- stant landing while making flights.

  13. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  14. Power analysis attacks revealing the secrets of smart cards

    CERN Document Server

    Mangard, Stefan; Popp, Thomas

    2008-01-01

    A comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. It discusses simple and differential power analysis as well as advanced techniques like template attacks.

  15. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  16. Fault Analysis Attacks and Its Countermeasure using Elliptic Curve Cryptography

    OpenAIRE

    M. Prabu; R. Shanmugalakshmi

    2010-01-01

    In the last decade, many researchers had published the overall analysis attacks of cryptographic devices against implementation on elliptic curve attacks. Usually such type of information is not sufficient to learn about the individual attacks. Now in this article, we indisputably concentrated on fault analysis attack and its countermeasure.

  17. Modelling Social-Technical Attacks with Timed Automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, K.G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In

  18. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked...

  19. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  20. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  1. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  2. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  3. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  4. Liberty and Lethality: Integrating MC-12W Liberty and Light Attack/Armed Reconnaissance Aircraft operations

    Science.gov (United States)

    2010-05-20

    targeting process continues. ISE imagery analysts provide imagery products using intelligence gained from national satellite, U-2, GLOBAL HAWK , PREDATOR...environmental factors, predict enemy actions, identify targets, and develop combat assessments. Due to the risk of fratricide, joint force commanders...77 In sorties six through eight, aircrews begin utilizing Crew Resource Management ( CRM ) principles during their flight operations in order to

  5. Army Fixed-Wing Ground Attack Aircraft: A Historical Precedent and Contemporary Rationale

    Science.gov (United States)

    2015-06-12

    Korea. It was probably the most responsive and finest that I could imagine .” American forces became accustomed to overwhelming airborne fire support......he provides a vivid contrast in how far apart the Army and Air Force were on the subject of tactical air support in Korea. Lastly, the difference

  6. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  7. Limb-shaking transient ischemic attack

    Directory of Open Access Journals (Sweden)

    Abhijit Das

    2013-01-01

    Full Text Available Limb shaking Transient Ischemic Attack is a rare manifestation of carotid-occlusive disease. The symptoms usually present with seizure like activity and often misdiagnosed as focal seizures. Only on careful history the important clinical clues-which may help in differentiating from seizure-are revealed: Lack of Jacksonian march or aura; precipitation by maneuvers that lead to carotid compression. We present the case of an elderly gentleman with recurrent limb shaking transient ischemic attacks that was initially diagnosed as a case of epilepsy. His symptoms responded to optimization of blood pressure. The case report highlights the importance of accurate diagnosis as the treatment of the associated carotid artery occlusion may not only abolish the attacks but also reduce the risk of future stroke.

  8. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... twisted polynomials from Ore rings as forgery polynomials. We show how to construct sparse forgery polynomials with full control over the sets of roots. We also achieve complete and explicit disjoint coverage of the key space by these polynomials. We furthermore leverage this new construction...

  9. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  10. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  11. Viden: Attacker Identification on In-Vehicle Networks

    OpenAIRE

    Cho, Kyong-Tak; Shin, Kang

    2017-01-01

    Various defense schemes --- which determine the presence of an attack on the in-vehicle network --- have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this need, we propose a novel scheme, called Viden (Voltage-based attacker identification), which can identify the attacker ECU by measuring and utilizi...

  12. Nonlinear analysis and control of an aircraft in the neighbourhood of deep stall

    Science.gov (United States)

    Kolb, Sébastien; Hétru, Laurent; Faure, Thierry M.; Montagnier, Olivier

    2017-01-01

    When an aircraft is locked in a stable equilibrium at high angle-of-attack, we have to do with the so-called deep stall which is a very dangerous situation. Airplanes with T-tail are mainly concerned with this phenomenon since the wake of the main wing flows over the horizontal tail and renders it ineffective but other aircrafts such as fighters can also be affected. First the phase portrait and bifurcation diagram are determined and characterized (with three equilibria in a deep stall prone configuration). It allows to diagnose the configurations of aircrafts susceptible to deep stall and also to point out the different types of time evolutions. Several techniques are used in order to determine the basin of attraction of the stable equilibrium at high angle-of-attack. They are based on the calculation of the stable manifold of the saddle-point equilibrium at medium angle-of-attack. Then several ways are explored in order to try to recover from deep stall. They exploits static features (such as curves of pitching moment versus angle-of-attack for full pitch down and full pitch up elevators) or dynamic aspects (excitation of the eigenmodes and improvement of the aerodynamic efficiency of the tail). Finally, some properties of a deep stall prone aircraft are pointed out and some control tools are also implemented. We try also to apply this mathematical results in a concrete situation by taking into account the captors specificities or by estimating the relevant variables thanks to other available information.

  13. MQ-1C Gray Eagle Unmanned Aircraft System (MQ-1C Gray Eagle)

    Science.gov (United States)

    2015-12-01

    Intelligence and Security Command (INSCOM). Version 8.7, Revision 3 of the CPD for MQ-1C Gray Eagle defines an operational requirement for Improved Gray...extended range, multi-purpose unmanned aircraft system capable of executing reconnaissance, security , attack, and intelligence collection missions in...Apr 2005 Apr 2005 Apr 2005 Apr 2005 Critical Design Review Feb 2006 Feb 2006 Feb 2006 Feb 2006 Milestone C Mar 2011 Mar 2011 Mar 2011 Mar 2011 IOT &E

  14. The balance and harmony of control power for a combat aircraft in tactical maneuvering

    Science.gov (United States)

    Bocvarov, Spiro; Cliff, Eugene M.; Lutze, Frederick H.

    1992-01-01

    An analysis is presented for a family of regular extremal attitude-maneuvers for the High Angle-of-Attack Research Vehicle that has thrust-vectoring capability. Different levels of dynamic coupling are identified in the combat aircraft attitude model, and the characteristic extremal-family motion is explained. It is shown why the extremal-family trajectories develop small sideslip-angles, a highly desirable feature from a practical viewpoint.

  15. Survival of child after lion attack

    OpenAIRE

    Carlos F Dabdoub; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named ?Bang-Bang?, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of ...

  16. Aircraft agility maneuvers

    Science.gov (United States)

    Cliff, Eugene M.; Thompson, Brian G.

    1992-01-01

    A new dynamic model for aircraft motions is presented. This model can be viewed as intermediate between a point-mass model, in which the body attitude angles are control-like, and a rigid-body model, in which the body-attitude angles evolve according to Newton's Laws. Specifically, consideration is given to the case of symmetric flight, and a model is constructed in which the body roll-rate and the body pitch-rate are the controls. In terms of this body-rate model a minimum-time heading change maneuver is formulated. When the bounds on the body-rates are large the results are similar to the point-mass model in that the model can very quickly change the applied forces and produce an acceleration to turn the vehicle. With finite bounds on these rates, the forces change in a smooth way. This leads to a measurable effect of agility.

  17. Commercial aircraft composite technology

    CERN Document Server

    Breuer, Ulf Paul

    2016-01-01

    This book is based on lectures held at the faculty of mechanical engineering at the Technical University of Kaiserslautern. The focus is on the central theme of societies overall aircraft requirements to specific material requirements and highlights the most important advantages and challenges of carbon fiber reinforced plastics (CFRP) compared to conventional materials. As it is fundamental to decide on the right material at the right place early on the main activities and milestones of the development and certification process and the systematic of defining clear requirements are discussed. The process of material qualification - verifying material requirements is explained in detail. All state-of-the-art composite manufacturing technologies are described, including changes and complemented by examples, and their improvement potential for future applications is discussed. Tangible case studies of high lift and wing structures emphasize the specific advantages and challenges of composite technology. Finally,...

  18. Preliminary design of a supersonic Short Takeoff and Vertical Landing (STOVL) fighter aircraft

    Science.gov (United States)

    Cox, Brian; Borchers, Paul; Gomer, Charlie; Henderson, Dean; Jacobs, Tavis; Lawson, Todd; Peterson, Eric; Ross, Tweed, III; Bellmard, Larry

    1990-01-01

    The preliminary design study of a supersonic Short Takeoff and Vertical Landing (STOVL) fighter is presented. A brief historical survey of powered lift vehicles was presented, followed by a technology assessment of the latest supersonic STOVL engine cycles under consideration by industry and government in the U.S. and UK. A survey of operational fighter/attack aircraft and the modern battlefield scenario were completed to develop, respectively, the performance requirements and mission profiles for the study. Three configurations were initially investigated with the following engine cycles: a hybrid fan vectored thrust cycle, a lift+lift/cruise cycle, and a mixed flow vectored thrust cycle. The lift+lift/cruise aircraft configuration was selected for detailed design work which consisted of: (1) a material selection and structural layout, including engine removal considerations, (2) an aircraft systems layout, (3) a weapons integration model showing the internal weapons bay mechanism, (4) inlet and nozzle integration, (5) an aircraft suckdown prediction, (6) an aircraft stability and control analysis, including a takeoff, hover, and transition control analysis, (7) a performance and mission capability study, and (8) a life cycle cost analysis. A supersonic fighter aircraft with STOVL capability with the lift+lift/cruise engine cycle seems a viable option for the next generation fighter.

  19. Flight Dynamics of Flexible Aircraft with Aeroelastic and Inertial Force Interactions

    Science.gov (United States)

    Nguyen, Nhan T.; Tuzcu, Ilhan

    2009-01-01

    This paper presents an integrated flight dynamic modeling method for flexible aircraft that captures coupled physics effects due to inertial forces, aeroelasticity, and propulsive forces that are normally present in flight. The present approach formulates the coupled flight dynamics using a structural dynamic modeling method that describes the elasticity of a flexible, twisted, swept wing using an equivalent beam-rod model. The structural dynamic model allows for three types of wing elastic motion: flapwise bending, chordwise bending, and torsion. Inertial force coupling with the wing elasticity is formulated to account for aircraft acceleration. The structural deflections create an effective aeroelastic angle of attack that affects the rigid-body motion of flexible aircraft. The aeroelastic effect contributes to aerodynamic damping forces that can influence aerodynamic stability. For wing-mounted engines, wing flexibility can cause the propulsive forces and moments to couple with the wing elastic motion. The integrated flight dynamics for a flexible aircraft are formulated by including generalized coordinate variables associated with the aeroelastic-propulsive forces and moments in the standard state-space form for six degree-of-freedom flight dynamics. A computational structural model for a generic transport aircraft has been created. The eigenvalue analysis is performed to compute aeroelastic frequencies and aerodynamic damping. The results will be used to construct an integrated flight dynamic model of a flexible generic transport aircraft.

  20. Numerical Study of Transition of an Annular Lift Fan Aircraft

    Directory of Open Access Journals (Sweden)

    Yun Jiang

    2016-09-01

    Full Text Available The present study aimed at studying the transition of annular lift fan aircraft through computational fluid dynamics (CFD simulations. The oscillations of lift and drag, the optimization for the figure of merit, and the characteristics of drag, yawing, rolling and pitching moments in transition are studied. The results show that a two-stage upper and lower fan lift system can generate oscillations of lift and drag in transition, while a single-stage inner and outer fan lift system can eliminate the oscillations. The characteristics of momentum drag of the single-stage fans in transition are similar to that of the two-stage fans, but with the peak of drag lowered from 0.63 to 0.4 of the aircraft weight. The strategy to start transition from a negative angle of attack −21° further reduces the peak of drag to 0.29 of the weight. The strategy also reduces the peak of pitching torque, which needs upward extra thrusts of 0.39 of the weight to eliminate. The peak of rolling moment in transition needs differential upward thrusts of 0.04 of the weight to eliminate. The requirements for extra thrusts in transition lead to a total thrust–weight ratio of 0.7, which makes the aircraft more efficient for high speed cruise flight (higher than 0.7 Ma.

  1. Aircraft Rotor Surface Coating Qualification Testing Aircraft Rotor Surface Coating

    National Research Council Canada - National Science Library

    2006-01-01

    .... The Aviation and Missile Research, Development and Engineering Center "AMRDEC" located at Redstone Arsenal, AL selected the NCDMM to coordinate the initial effort to qualify a new aircraft rotor...

  2. 48 CFR 246.408-71 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Aircraft. 246.408-71... Aircraft. (a) The Federal Aviation Administration (FAA) has certain responsibilities and prerogatives in connection with some commercial aircraft and of aircraft equipment and accessories (Pub. L. 85-726 (72 Stat...

  3. 14 CFR 63.33 - Aircraft ratings.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft ratings. 63.33 Section 63.33... CERTIFICATION: FLIGHT CREWMEMBERS OTHER THAN PILOTS Flight Engineers § 63.33 Aircraft ratings. (a) The aircraft...) Turbopropeller powered; and (3) Turbojet powered. (b) To be eligible for an additional aircraft class rating...

  4. 14 CFR 141.39 - Aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft. 141.39 Section 141.39 Aeronautics... CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.39 Aircraft. (a... certificate or provisional pilot school certificate must show that each aircraft used by the school for flight...

  5. 36 CFR 331.14 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 331.14 Section 331..., KENTUCKY AND INDIANA § 331.14 Aircraft. (a) The operation of aircraft on WCA lands and waters is prohibited... prohibited. (c) The provisions of this section shall not be applicable to aircraft engaged on official...

  6. 40 CFR 87.6 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Aircraft safety. 87.6 Section 87.6 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM AIRCRAFT AND AIRCRAFT ENGINES General Provisions § 87.6 Aircraft safety. The provisions of...

  7. 14 CFR 252.13 - Small aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Small aircraft. 252.13 Section 252.13 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS SMOKING ABOARD AIRCRAFT § 252.13 Small aircraft. Air carriers shall prohibit smoking on aircraft...

  8. 36 CFR 327.4 - Aircraft.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Aircraft. 327.4 Section 327.4... Aircraft. (a) This section pertains to all aircraft including, but not limited to, airplanes, seaplanes, helicopters, ultra-light aircraft, motorized hang gliders, hot air balloons, any non-powered flight devices or...

  9. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz. Exit from Hell? Re- ducing the Impact of Amplification DDoS Attacks. In Proceedings of...Revisiting Network Protocols for DDoS Abuse. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA

  10. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available -1 International Journal of Cyber Warfare and Terrorism, vol. 6(3), 65-78 Using an Ontology for Network Attack Planning Renier van Heerden1,2, Peter Chan2 , Louise Leenen2,3 Jacques Theron4 1 Nelson Mandela Metropolitan University, South Africa 2...

  11. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  12. Cyber Attack! Crime or Act of War?

    Science.gov (United States)

    2011-04-13

    informational, or economic.54 Other legal scholars concur in this interpretation, one using the term ― agressive force‖ in lieu of ―armed force‖ but...distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16, no. 5, (October 20): 475-490. http

  13. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  14. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  15. Management of an acute asthma attack.

    Science.gov (United States)

    Barnard, Amanda

    2005-07-01

    Despite a more proactive approach to asthma management, which includes an increased range of drugs, wide dissemination of guidelines, and the use of asthma action plans, an acute severe asthma attack is one of the most common emergencies a general practitioner will encounter. This article discusses the management of an acute asthma attack in the general practice setting. Assessment of severity is vital and can be ascertained quite quickly with a brief history and rapid physical examination. It is important to remember that wheeze is an unreliable indicator of the severity of attack and may be absent in severe asthma. The cornerstones of treatment are oxygen and inhaled beta 2 agonists. Beta 2 agonists can be given continuously in severe life threatening asthma. Early administration of systemic steroids is important. Patients discharged to home after treatment of an asthma attack require close follow up including beta 2 agonists for symptom control, review of medications including a consideration of a short course of oral steroids, a written asthma action plan and detailed advice about what to do in case of deterioration in the next 24 hours. They should be reviewed in 24-48 hours.

  16. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... other risk factors. Overweight and obese adults with risk factors for cardiovascular disease such as high blood pressure, high cholesterol, ... over 40, or if you have multiple risk factors, work especially closely with ... cardiovascular disease. Heart attack prevention should begin early in ...

  17. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    spike-insider-attacks- stress- ramadan - fasting , 24 August 2012 37 Yousafzai, Sami and Moreau, Ron, http://www.thedailybeast.com/newsweek/2012/08/26...Ramazan.” “And so the daily pressures that are on some of these [Afghan] troops, compounded by the sacrifice associated with fasting , the nature of

  18. Survival of child after lion attack

    Science.gov (United States)

    Dabdoub, Carlos F.; Dabdoub, Carlos B.; Chavez, Mario; Molina, Felipe

    2013-01-01

    Background: Injuries to humans caused by attacks from large predators are very rare, especially in the United States, Europe, or Latin America. A few cases were reported on accidents in zoos or animal farms, being very uncommon in children. The purposes of this report include describing the case of a child who sustained an attack by a lion named “Bang-Bang”, which resulted in injuries to the head, chest, and abdomen, as well as the subsequent neurosurgical treatment and providing a review of the literature. Case Description: We report the case of an 8-year-old boy who was attacked by a lion during a circus show. The patient underwent an emergent neurosurgical procedure, including parietal craniectomy, cleaning, and extensive surgical debridement of the wounds. Despite open severe head trauma with brain damage as well as thorax and abdomen trauma, the child survived, with minimal neurological sequelae. Conclusions: Human injury resulting from encounters with nondomesticated animals is increasingly rising throughout the world. This case highlights the potentially violent and aggressive nature of wild mammals held in captivity. Unusual wild animal attacks and the complex injuries that result may pose a challenge to surgeons practicing in resource-limited settings. In this sense, the best treatment in the mentioned case is the prevention of human injuries by these animals. In addition, to attend to these infrequent cases, the authors emphasize the importance of a multidisciplinary approach to achieve the best cosmetic and functional results. PMID:23869277

  19. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  20. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  1. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  2. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  3. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  4. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  5. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  6. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  7. 76 FR 76686 - Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

    Science.gov (United States)

    2011-12-08

    ... and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and Preservation of Aircraft... reporting requirements with regard to aircraft accidents or incidents, found at paragraph (a)(10) of section... final rule entitled, ``Notification and Reporting of Aircraft Accidents or Incidents and Overdue...

  8. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  9. Application of the concept of dynamic trim control to automatic landing of carrier aircraft. [utilizing digital feedforeward control

    Science.gov (United States)

    Smith, G. A.; Meyer, G.

    1980-01-01

    The results of a simulation study of an alternative design concept for an automatic landing control system are presented. The alternative design concept for an automatic landing control system is described. The design concept is the total aircraft flight control system (TAFCOS). TAFCOS is an open loop, feed forward system that commands the proper instantaneous thrust, angle of attack, and roll angle to achieve the forces required to follow the desired trajector. These dynamic trim conditions are determined by an inversion of the aircraft nonlinear force characteristics. The concept was applied to an A-7E aircraft approaching an aircraft carrier. The implementation details with an airborne digital computer are discussed. The automatic carrier landing situation is described. The simulation results are presented for a carrier approach with atmospheric disturbances, an approach with no disturbances, and for tailwind and headwind gusts.

  10. VTOL to Transonic Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The cyclogyro, an aircraft propulsion concept with the potential for VTOL to the lower bounds of transonic flight, is conceptually simple but structurally and...

  11. Unmanned Aircraft Systems - Raw Photography

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The USGS National Unmanned Aircraft Systems (UAS) Project Office utilizes UAS technology for collecting remote sensing data on a local scale. Typical UAS projects...

  12. Fire resistant aircraft seat program

    Science.gov (United States)

    Fewell, L. A.

    1979-01-01

    Foams, textiles, and thermoformable plastics were tested to determine which materials were fire retardant, and safe for aircraft passenger seats. Seat components investigated were the decorative fabric cover, slip covers, fire blocking layer, cushion reinforcement, and the cushioning layer.

  13. Quality standard of aircraft maintenance

    Directory of Open Access Journals (Sweden)

    Боузаієнне Меккі бен Салем

    2005-01-01

    Full Text Available  The question of the account of operation conditions of an aeronautical engineering in airlines is considered at formation and a correcting of plans on aircrafts park maintenance.

  14. Aerothermodynamics of aircraft engine components

    National Research Council Canada - National Science Library

    Oates, Gordon C

    1985-01-01

    ....A45A37 1985 ISBN 0-915928-97-3 2. Aircraft gas turbines. 629.134'353 85-13355 Copyright © 1985 by the American Institute of Aeronautics and Astronautics, Inc. All rights reserved. Printed in the ...

  15. Western Pacific Typhoon Aircraft Fixes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Western Pacific typhoon aircraft reconnaissance data from the years 1946 - 1965 and 1978, excluding 1952, were transcribed from original documents, or copy of...

  16. Aircraft ditching loads simulation tool

    OpenAIRE

    Bonanni, A.; Vandewaeter, L.; Havill, C.; Kanyoo, P.; Taunton, D.J.; Blake, J.I.R.; Cropper, E.; Hancock, S.

    2015-01-01

    The present work presents a novel methodology developed for calculating the steady loads acting on aircraft structures in the event of ditching in water. It represents the preliminary result of Stirling Dynamics as part of a NATEP research project. The overall objective of the project is to expand the capabilities of the Stirling Dynamics proprietary software SD-GLOAD (originally designed for ground and crash loads dynamic simulations) to aircraft ditching simulations. The methodology present...

  17. Variation of aircraft noise annoyance

    Science.gov (United States)

    Dempsey, T. K.

    1980-01-01

    Laboratory and field studies were conducted to determine the basis for increased sensitivity of people to noise during aircraft noise studies. This change in sensitivity could be attributed to either a physiological time-of-day effect (i.e., a circadian rhythm) or simply to the total number of aircraft noise events experienced during a laboratory test period. In order to investigate the time-of-day factor, noise sensitivity measures were obtained from subjects at home with cassette tape recorders/headsets over a 24 hour period. The effect of number of aircraft noise events on noise sensitivity was investigated within a laboratory. In these tests, measures of sensitivity to noise were obtained from subjects before and after their exposure to varying numbers of aircraft noise events. The 24 hour data showed no evidence that noise sensitivity is physiologically cyclical. Consequently, these data can not explain annoyance response variation to aircraft noise tests conducted during the daytime. However, the number of aircraft noise events did influence the subject's noise sensitivity. This effect completely accounts for the systematic increase in noise sensitivity during a laboratory test period.

  18. Optimization in fractional aircraft ownership

    Science.gov (United States)

    Septiani, R. D.; Pasaribu, H. M.; Soewono, E.; Fayalita, R. A.

    2012-05-01

    Fractional Aircraft Ownership is a new concept in flight ownership management system where each individual or corporation may own a fraction of an aircraft. In this system, the owners have privilege to schedule their flight according to their needs. Fractional management companies (FMC) manages all aspects of aircraft operations, including utilization of FMC's aircraft in combination of outsourced aircrafts. This gives the owners the right to enjoy the benefits of private aviations. However, FMC may have complicated business requirements that neither commercial airlines nor charter airlines faces. Here, optimization models are constructed to minimize the number of aircrafts in order to maximize the profit and to minimize the daily operating cost. In this paper, three kinds of demand scenarios are made to represent different flight operations from different types of fractional owners. The problems are formulated as an optimization of profit and a daily operational cost to find the optimum flight assignments satisfying the weekly and daily demand respectively from the owners. Numerical results are obtained by Genetic Algorithm method.

  19. Words Mean Things: The Case for Information System Attack and Control System Attack

    Science.gov (United States)

    2008-10-31

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Words Mean Things: The Case for Information System Attack and Control System...Standard Form 298 (Rev. 8-98) NAVAL WAR COLLEGE Newport, R.I. WORDS MEAN THINGS: THE CASE FOR INFORMATION SYSTEM ATTACK AND... words , the DepSecDef definition acknowledges the existence of a new domain, but strongly implies the accepted definition of CNO is sufficient to

  20. Chosen-name attacks: An overlooked class of type-flaw attacks

    OpenAIRE

    Ceelen, Pieter; Mauw, Sjouke; Radomirovic, Sasa

    2008-01-01

    In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automa...

  1. Aircraft exhaust sulfur emissions

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R.C.; Anderson, M.R.; Miake-Lye, R.C.; Kolb, C.E. [Aerodyne Research, Inc., Billerica, MA (United States). Center for Chemical and Environmental Physics; Sorokin, A.A.; Buriko, Y.I. [Scientific Research Center `Ecolen`, Moscow (Russian Federation)

    1997-12-31

    The extent to which fuel sulfur is converted to SO{sub 3} during combustion and the subsequent turbine flow in supersonic and subsonic aircraft engines is estimated numerically. The analysis is based on: a flamelet model with non-equilibrium sulfur chemistry for the combustor, and a one-dimensional, two-stream model with finite rate chemical kinetics for the turbine. The results indicate that between 2% and 10% of the fuel sulfur is emitted as SO{sub 3}. It is also shown that, for a high fuel sulfur mass loading, conversion in the turbine is limited by the level of atomic oxygen at the combustor exit, leading to higher SO{sub 2} oxidation efficiency at lower fuel sulfur loadings. While SO{sub 2} and SO{sub 3} are the primary oxidation products, the model results further indicate H{sub 2}SO{sub 4} levels on the order of 0.1 ppm for supersonic expansions through a divergent nozzle. This source of fully oxidized S(6) (SO{sub 3} + H{sub 2}SO{sub 4}) exceeds previously calculated S(6) levels due to oxidation of SO{sub 2} by OH in the exhaust plume outside the engine nozzle. (author) 26 refs.

  2. Innovations in Aircraft Design

    Science.gov (United States)

    1997-01-01

    The Boeing 777 carries with it basic and applied research, technology, and aerodynamic knowledge honed at several NASA field centers. Several Langley Research Center innovations instrumental to the development of the aircraft include knowledge of how to reduce engine and other noise for passengers and terminal residents, increased use of lightweight aerospace composite structures for increased fuel efficiency and range, and wind tunnel tests confirming the structural integrity of 777 wing-airframe integration. Test results from Marshall Space Flight Center aimed at improving the performance of the Space Shuttle engines led to improvements in the airplane's new, more efficient jet engines. Finally, fostered by Ames Research Center, the Boeing 777 blankets that protect areas of the plane from high temperatures and fire have a lineage to Advanced Flexible Reusable Surface Insulation used on certain areas of the Space Shuttle. According to Boeing Company estimates, the 777 has captured three-quarters of new orders for airplanes in its class since the program was launched.

  3. Ball lightning risk to aircraft

    Science.gov (United States)

    Doe, R.; Keul, A.

    2009-04-01

    Lightning is a rare but regular phenomenon for air traffic. Aircraft are designed to withstand lightning strikes. Research on lightning and aircraft can be called detailed and effective. In the last 57 years, 18 reported lightning aviation disasters with a fatality figure of at least 714 persons occurred. For comparison, the last JACDEC ten-year average fatality figure was 857. The majority encountered lightning in the climb, descent, approach and/or landing phase. Ball lightning, a metastable, rare lightning type, is also seen from and even within aircraft, but former research only reported individual incidents and did not generate a more detailed picture to ascertain whether it constitutes a significant threat to passenger and aircraft safety. Lacking established incident report channels, observations were often only passed on as "air-travel lore". In an effort to change this unsatisfactory condition, the authors have collected a first international dataset of 38 documented ball lightning aircraft incidents from 1938 to 2001 involving 13 reports over Europe, 13 over USA/Canada, and 7 over Russia. 18 (47%) reported ball lightning outside the aircraft, 18 (47%) inside, 2 cases lacked data. 8 objects caused minor damage, 8 major damage (total: 42%), only one a crash. No damage was reported in 18 cases. 3 objects caused minor crew injury. In most cases, ball lightning lasted several seconds. 11 (29%) incidents ended with an explosion of the object. A cloud-aircraft lightning flash was seen in only 9 cases (24%) of the data set. From the detailed accounts of air personnel in the last 70 years, it is evident that ball lightning is rarely, but consistently observed in connection with aircraft and can also occur inside the airframe. Reports often came from multiple professional witnesses and in several cases, damages were investigated by civil or military authorities. Although ball lightning is no main air traffic risk, the authors suggest that incident and accident

  4. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  5. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  6. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... NHLBI on Twitter. Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. ... if I’m taking aspirin to prevent another heart attack or stroke? The information discussed in Who may ...

  9. Heart Attack Risk Spikes After Respiratory Infection, Study Finds

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165626.html Heart Attack Risk Spikes After Respiratory Infection, Study Finds Even ... May 16, 2017 (HealthDay News) -- The risk of heart attack increases sharply after a respiratory infection, a new ...

  10. Fatal First-Time Heart Attacks More Common in Blacks

    Science.gov (United States)

    ... gov/news/fullstory_167101.html Fatal First-Time Heart Attacks More Common in Blacks: Study Black men are ... likely than whites to die of a first heart attack, a new analysis suggests. Two out of three ...

  11. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  12. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  14. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  15. Upset Simulation and Training Initiatives for U.S. Navy Commercial Derived Aircraft

    Science.gov (United States)

    Donaldson, Steven; Priest, James; Cunningham, Kevin; Foster, John V.

    2012-01-01

    Militarized versions of commercial platforms are growing in popularity due to many logistical benefits in the form of commercial off-the-shelf (COTS) parts, established production methods, and commonality for different certifications. Commercial data and best practices are often leveraged to reduce procurement and engineering development costs. While the developmental and cost reduction benefits are clear, these militarized aircraft are routinely operated in flight at significantly different conditions and in significantly different manners than for routine commercial flight. Therefore they are at a higher risk of flight envelope exceedance. This risk may lead to departure from controlled flight and/or aircraft loss1. Historically, the risk of departure from controlled flight for military aircraft has been mitigated by piloted simulation training and engineering analysis of typical aircraft response. High-agility military aircraft simulation databases are typically developed to include high angles of attack (AoA) and sideslip due to the dynamic nature of their missions and have been developed for many tactical configurations over the previous decades. These aircraft simulations allow for a more thorough understanding of the vehicle flight dynamics characteristics at high AoA and sideslip. In recent years, government sponsored research on transport airplane aerodynamic characteristics at high angles of attack has produced a growing understanding of stall/post-stall behavior. This research along with recent commercial airline training initiatives has resulted in improved understanding of simulator-based training requirements and simulator model fidelity.2-5 In addition, inflight training research over the past decade has produced a database of pilot performance and recurrency metrics6. Innovative solutions to aerodynamically model large commercial aircraft for upset conditions such as high AoA, high sideslip, and ballistic damage, as well as capability to accurately

  16. Aircraft Cabin Environmental Quality Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Gundel, Lara; Kirchstetter, Thomas; Spears, Michael; Sullivan, Douglas

    2010-05-06

    The Indoor Environment Department at Lawrence Berkeley National Laboratory (LBNL) teamed with seven universities to participate in a Federal Aviation Administration (FAA) Center of Excellence (COE) for research on environmental quality in aircraft. This report describes research performed at LBNL on selecting and evaluating sensors for monitoring environmental quality in aircraft cabins, as part of Project 7 of the FAA's COE for Airliner Cabin Environmental Research (ACER)1 effort. This part of Project 7 links to the ozone, pesticide, and incident projects for data collection and monitoring and is a component of a broader research effort on sensors by ACER. Results from UCB and LBNL's concurrent research on ozone (ACER Project 1) are found in Weschler et al., 2007; Bhangar et al. 2008; Coleman et al., 2008 and Strom-Tejsen et al., 2008. LBNL's research on pesticides (ACER Project 2) in airliner cabins is described in Maddalena and McKone (2008). This report focused on the sensors needed for normal contaminants and conditions in aircraft. The results are intended to complement and coordinate with results from other ACER members who concentrated primarily on (a) sensors for chemical and biological pollutants that might be released intentionally in aircraft; (b) integration of sensor systems; and (c) optimal location of sensors within aircraft. The parameters and sensors were selected primarily to satisfy routine monitoring needs for contaminants and conditions that commonly occur in aircraft. However, such sensor systems can also be incorporated into research programs on environmental quality in aircraft cabins.

  17. Eclipse program QF-106 aircraft

    Science.gov (United States)

    1996-01-01

    This photo shows two QF-106 aircraft that were used for the Eclipse project, both parked at the Mojave Airport in Mojave, California. In 1997 and 1998, the Dryden Flight Research Center at Edwards, California, supported and hosted a Kelly Space & Technology, Inc. project called Eclipse, which sought to demonstrate the feasibility of a reusable tow-launch vehicle concept. The project goal was to successfully tow, inflight, a modified QF-106 delta-wing aircraft with an Air Force C-141A transport aircraft. This would demonstrate the possibility of towing and launching an actual launch vehicle from behind a tow plane. Dryden was the responsible test organization and had flight safety responsibility for the Eclipse project. Dryden provided engineering, instrumentation, simulation, modification, maintenance, range support, and research pilots for the test program. The Air Force Flight Test Center (AFFTC), Edwards, California, supplied the C-141A transport aircraft and crew and configured the aircraft as needed for the tests. The AFFTC also provided the concept and detail design and analysis as well as hardware for the tow system and QF-106 modifications. Dryden performed the modifications to convert the QF-106 drone into the piloted EXD-01 (Eclipse eXperimental Demonstrator -01) experimental aircraft. Kelly Space & Technology hoped to use the results gleaned from the tow test in developing a series of low-cost, reusable launch vehicles. These tests demonstrated the validity of towing a delta-wing aircraft having high wing loading, validated the tow simulation model, and demonstrated various operational procedures, such as ground processing of in-flight maneuvers and emergency abort scenarios.

  18. From Fault-tolerance to Attack Tolerance

    Science.gov (United States)

    2011-04-02

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Means to build fault - tolerant ...bottlenecks. We also implemented a distributed storage service that uses Byzantine Quo- rum Systems (rather than state machine replication) and employs...From Fault - tolerance to Attack Tolerance AFOSR Grant F9550-06-1-0019 Final Report 1 December 2005 – 30 November 2010 Fred B. Schneider Computer

  19. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  20. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    devices through a Trojan horse program. This method is highly technical; it requires sophisticated hardware, software and a highly skilled hacker...Symantec, a leading manufacturer of anti- virus software and cybersecurity suites published a report on the economic impact of cyber-attacks (Symantec...Prior to the Egyptian’s introduction of the chariot, wars were waged primarily on foot. This horse driven cart added incredible speed on the open

  1. [Acute ischemic proctitis following an epileptic attack

    DEFF Research Database (Denmark)

    Klintmann, C.K.; Hillingso, J.G.; Glenthøj, Andreas

    2008-01-01

    Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal...... circulation caused by systemic atherosclerosis, usually following aortic or aortoiliac operations. We report one case of acute ischemic proctitis following an epileptic attack Udgivelsesdato: 2008/9/29...

  2. SQL Injection - Database Attack Revolution and Prevention

    OpenAIRE

    Dorai, Ramakanth; Kannan, Vinod

    2011-01-01

    SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network security. This paper is incorporated with our research and firsthand experience in hacking the database by SQL injection. Database is the Storage Brain of a website. A hacked database is the source for Passwords and juicy information like credit ca...

  3. Finding Effective Responses Against Cyber Attacks for Divided Nations

    Science.gov (United States)

    2015-12-01

    Training and Exercise Center CSTIA Central Science and Technology Information Agency DDoS Distributed Denial of Service DNS Domain Name Server DOD...computers in 2004 and Distributed Denial of Service ( DDoS ) attacks in 2009, were attributed to North Korea. North Korea has attacked not only government...President Roh to Lee, North Korea intensified both their criticisms and attacks. In 2009, they conducted extensive DDoS attacks on South Korea and

  4. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...... was defined as ≥ 3 successes, and lack of consistent efficacy was defined as ≥ 2 failures, in treatment response. A total of 1677 patients treated ≥ 1 attack and 1263 treated all four attacks....

  5. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  6. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  7. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  8. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  9. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  10. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Aircraft aerodynamic parameter detection using micro hot-film flow sensor array and BP neural network identification.

    Science.gov (United States)

    Que, Ruiyi; Zhu, Rong

    2012-01-01

    Air speed, angle of sideslip and angle of attack are fundamental aerodynamic parameters for controlling most aircraft. For small aircraft for which conventional detecting devices are too bulky and heavy to be utilized, a novel and practical methodology by which the aerodynamic parameters are inferred using a micro hot-film flow sensor array mounted on the surface of the wing is proposed. A back-propagation neural network is used to model the coupling relationship between readings of the sensor array and aerodynamic parameters. Two different sensor arrangements are tested in wind tunnel experiments and dependence of the system performance on the sensor arrangement is analyzed.

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  14. Attack or retreat: contrasted defensive tactics used by Cyprian honeybee colonies under attack from hornets.

    Science.gov (United States)

    Papachristoforou, Alexandros; Rortais, Agnès; Sueur, Jérôme; Arnold, Gérard

    2011-02-01

    This study describes the tactics used by Cyprian honeybees (Apis mellifera cypria) to defend their colonies against hornet (Vespa orientalis orientalis) attacks. We use simulated hornet attacks and a combination of video recordings and image analysis to reveal, for the first time, contrasted intra-subspecies defensive tactics that operate at the colony level during predation. In some colonies, when attacked, the numbers of guards at the hive entrance increases rapidly to attack, engulf, and kill invading hornets. In other colonies, guards avoid conflicts with hornets by retreating gradually and by forming a defensive line of honeybees at the hive entrance. Retreater colonies have propolis walls at the hive entrances with small apertures that are too narrow to allow the hornet to access the hive and that therefore reinforces entrance protection. On the contrary, attacker colonies have propolis walls with large openings through which the hornet can pass; these bees block the hornet's access by intensively guarding the hive entrance. We experimentally destroy propolis walls to test whether colonies consistently rebuild walls with the same intrinsic characteristics and we also monitor the survival rate of each anti-predator tactic after massive natural predation by hornets. Copyright © 2010 Elsevier B.V. All rights reserved.

  15. Correction of static pressure on a research aircraft in accelerated flight using differential pressure measurements

    Directory of Open Access Journals (Sweden)

    A. R. Rodi

    2012-11-01

    Full Text Available A method is described that estimates the error in the static pressure measurement on an aircraft from differential pressure measurements on the hemispherical surface of a Rosemount model 858AJ air velocity probe mounted on a boom ahead of the aircraft. The theoretical predictions for how the pressure should vary over the surface of the hemisphere, involving an unknown sensitivity parameter, leads to a set of equations that can be solved for the unknowns – angle of attack, angle of sideslip, dynamic pressure and the error in static pressure – if the sensitivity factor can be determined. The sensitivity factor was determined on the University of Wyoming King Air research aircraft by comparisons with the error measured with a carefully designed sonde towed on connecting tubing behind the aircraft – a trailing cone – and the result was shown to have a precision of about ±10 Pa over a wide range of conditions, including various altitudes, power settings, and gear and flap extensions. Under accelerated flight conditions, geometric altitude data from a combined Global Navigation Satellite System (GNSS and inertial measurement unit (IMU system are used to estimate acceleration effects on the error, and the algorithm is shown to predict corrections to a precision of better than ±20 Pa under those conditions. Some limiting factors affecting the precision of static pressure measurement on a research aircraft are discussed.

  16. Algorithm project weight calculation aircraft

    Directory of Open Access Journals (Sweden)

    Г. В. Абрамова

    2013-07-01

    Full Text Available The paper describes the process of a complex technical object design on the example of the aircraft, using information technology such as CAD/CAM/CAE-systems, presents the basic models of aircraft which are developed in the process of designing and reflect the different aspects of its structure and function. The idea of control parametric model at complex technical object design is entered, which is a set of initial data for the development of design stations and enables the optimal complex technical object control at all stages of design using modern computer technology. The paper discloses a process of weight design, which is associated with all stages of development aircraft and its production. Usage of a scheduling algorithm that allows to organize weight calculations are carried out at various stages of planning and weighing options to optimize the use of available database of formulas and methods of calculation

  17. Aircraft Skin Restoration and Evaluation

    Science.gov (United States)

    Yandouzi, M.; Gaydos, S.; Guo, D.; Ghelichi, R.; Jodoin, B.

    2014-12-01

    The recent development of the cold spray technology has made possible the deposition of low porosity and oxide-free coatings with good adhesion and with almost no change in the microstructure of the coated parts. This focuses on the use of low-pressure cold spray process to repair damaged Al-based aircraft skin, aiming at obtaining dense coatings with strong adhesion to the Al2024-T3 alloy. In order to prove the feasibility of using of the cold spray process as a repair process for aircraft skin, series of characterisation/tests including microstructures, microhardness, adhesion strength, three-point bending, surface finish, fatigue test, and corrosion resistance were performed. The obtained results revealed that the low-pressure cold spray process is a suitable for the repair of aircraft skin.

  18. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...... on an organisations and the contribution of parts of an organisation to the attack and its impact....

  19. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  20. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  1. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2017-11-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  2. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  3. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  4. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  5. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  6. Future aircraft networks and schedules

    Science.gov (United States)

    Shu, Yan

    2011-07-01

    Because of the importance of air transportation scheduling, the emergence of small aircraft and the vision of future fuel-efficient aircraft, this thesis has focused on the study of aircraft scheduling and network design involving multiple types of aircraft and flight services. It develops models and solution algorithms for the schedule design problem and analyzes the computational results. First, based on the current development of small aircraft and on-demand flight services, this thesis expands a business model for integrating on-demand flight services with the traditional scheduled flight services. This thesis proposes a three-step approach to the design of aircraft schedules and networks from scratch under the model. In the first step, both a frequency assignment model for scheduled flights that incorporates a passenger path choice model and a frequency assignment model for on-demand flights that incorporates a passenger mode choice model are created. In the second step, a rough fleet assignment model that determines a set of flight legs, each of which is assigned an aircraft type and a rough departure time is constructed. In the third step, a timetable model that determines an exact departure time for each flight leg is developed. Based on the models proposed in the three steps, this thesis creates schedule design instances that involve almost all the major airports and markets in the United States. The instances of the frequency assignment model created in this thesis are large-scale non-convex mixed-integer programming problems, and this dissertation develops an overall network structure and proposes iterative algorithms for solving these instances. The instances of both the rough fleet assignment model and the timetable model created in this thesis are large-scale mixed-integer programming problems, and this dissertation develops subproblem schemes for solving these instances. Based on these solution algorithms, this dissertation also presents

  7. Model of aircraft noise adaptation

    Science.gov (United States)

    Dempsey, T. K.; Coates, G. D.; Cawthorn, J. M.

    1977-01-01

    Development of an aircraft noise adaptation model, which would account for much of the variability in the responses of subjects participating in human response to noise experiments, was studied. A description of the model development is presented. The principal concept of the model, was the determination of an aircraft adaptation level which represents an annoyance calibration for each individual. Results showed a direct correlation between noise level of the stimuli and annoyance reactions. Attitude-personality variables were found to account for varying annoyance judgements.

  8. Aircraft Dynamic Modeling in Turbulence

    Science.gov (United States)

    Morelli, Eugene A.; Cunninham, Kevin

    2012-01-01

    A method for accurately identifying aircraft dynamic models in turbulence was developed and demonstrated. The method uses orthogonal optimized multisine excitation inputs and an analytic method for enhancing signal-to-noise ratio for dynamic modeling in turbulence. A turbulence metric was developed to accurately characterize the turbulence level using flight measurements. The modeling technique was demonstrated in simulation, then applied to a subscale twin-engine jet transport aircraft in flight. Comparisons of modeling results obtained in turbulent air to results obtained in smooth air were used to demonstrate the effectiveness of the approach.

  9. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  10. Preliminary results from a subsonic high angle-of-attack flush airdata sensing (HI-FADS) system: Design, calibration, and flight test evaluation

    Science.gov (United States)

    Whitmore, Stephen A.; Moes, Timothy R.; Larson, Terry J.

    1990-01-01

    A nonintrusive high angle-of-attack flush airdata sensing (HI-FADS) system was installed and flight-tested on the F-18 high alpha research flight vehicle. The system is a matrix of 25 pressure orifices in concentric circles on the nose of the vehicle. The orifices determine angles of attack and sideslip, Mach number, and pressure altitude. Pressure was transmitted from the orifices to an electronically scanned pressure module by lines of pneumatic tubing. The HI-FADS system was calibrated and demonstrated using dutch roll flight maneuvers covering large Mach, angle-of-attack, and sideslip ranges. Reference airdata for system calibration were generated by a minimum variance estimation technique blending measurements from two wingtip airdata booms with inertial velocities, aircraft angular rates and attitudes, precision radar tracking, and meteorological analyses. The pressure orifice calibration was based on identifying empirical adjustments to modified Newtonian flow on a hemisphere. Calibration results are presented. Flight test results used all 25 orifices or used a subset of 9 orifices. Under moderate maneuvering conditions, the HI-FADS system gave excellent results over the entire subsonic Mach number range up to 55 deg angle of attack. The internal pneumatic frequency response of the system is accurate to beyond 10 Hz. Aerodynamic lags in the aircraft flow field caused some performance degradation during heavy maneuvering.

  11. Versatile Electric Propulsion Aircraft Testbed Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all-electric aircraft testbed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  12. Modular Electric Propulsion Test Bed Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all electric aircraft test bed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  13. Military Airlift: The Joint Cargo Aircraft Program

    National Research Council Canada - National Science Library

    Knight, William

    2007-01-01

    Joint Cargo Aircraft (JCA) is a joint acquisition program between the Army and the Air Force designed to procure a commercial off-the-shelf aircraft, capable of meeting Army requirements for "direct support" to maneuver units...

  14. Military Airlift: The Joint Cargo Aircraft Program

    National Research Council Canada - National Science Library

    Hess, Allan

    2008-01-01

    Joint Cargo Aircraft (JCA) is a joint acquisition program between the Army and Air Force intended to procure a commercial off-the-shelf aircraft capable of meeting Army and Air Force requirements for intra-theater airlift...

  15. Statistical estimation of aircraft service conditions

    Directory of Open Access Journals (Sweden)

    Боузаієнне Меккі бен Салем

    2005-03-01

    Full Text Available  The question of an estimation of aircraft service conditions in airlines with use of statistical methods is considered at the analysis of maintenance programs of a aircrafts park to normative requirements.

  16. Explosive attack: Lessons learned in Seyed Al Shohada mosque attack, April 2008, Shiraz, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Paydar

    2012-01-01

    Full Text Available Introduction: The threat of explosive attacks has become a worldwide problem. Bombing is the preferred method of attacks. These attacks result in specific physical and psychiatric trauma. In this paper, we present an epidemiologic description of the physical injuries of patients who survived the explosive attack in Seyed Al Shohada mosque April 2008 Shiraz, Iran. Materials and Methods: All medical records of the patients admitted at Shiraz Hospitals on April 2008 due to Seyed Al Shohada mosque bombing attacks, Shiraz, Iran, were reviewed. Results: A total of 202 patients were referred to the hospitals over 24 h following the terrorist attack. One hundred sixty-four patients were admitted for short periods of observation (<24 h. Thirty-eight patients needed more than 1 day of hospitalization. The mean age of the patients was 26.2 (range 2 to 51 years. One hundred thirty-five (66.8% patients were males. Twenty-six (12.8% were children. Burn was the most prevalent cause of admission. Five (13.5% patients needed chest tube insertion and eight (21% needed skin grafts due to burn. Overall, 12 patients expired (5%. Three (25% of them were children (2 and 6, and 11 years old. Mortality rate was significantly higher among the children than adults (P value <0.05. The most important cause of death was head trauma which was seen in five (41.6% of the expired patients followed by burn (including air way burn in four (33%, and internal bleeding in three (25%. Patients with head trauma had significantly a higher rate of mortality than other patients (P value <0.05. Discussion: Following a bombing attack, numerous victims were brought to the emergency unit suffering from a combination of multi-organ injuries caused by the blast, penetrating injuries caused by shrapnel and other debris, and burns. It is important for a physician to be familiar with the clinical features and treatments of explosive attacks victims. Early management of patients at the scene and

  17. THE AIRPORT DE-ICING OF AIRCRAFTS

    Directory of Open Access Journals (Sweden)

    Robert KONIECZKA

    2015-03-01

    Full Text Available This article provides a summary of the issues involved in de-icing several kinds of aircrafts before flight. The basic risks of an iced aircraft and the factors that can influence its intensity are stated. It discusses the methods for de-icing and protecting against ice formation on small aircrafts, helicopters, and large aircrafts. It also classifies the fluids and other methods used for these de-icing operations, and explains the characteristics and limitations of their use.

  18. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  19. History of transient ischemic attack definition.

    Science.gov (United States)

    Mohr, Jay P

    2014-01-01

    Transient ischemic attacks have been recognized as a clinical entity for well over a century. Efforts before the availability of modern imaging to establish a diagnosis of inferred ischemic stroke led to acceptance of too long a time period (>24 h) compared with the actual typical events lasting <24 min (usually 5-15 min). Revision of the time period has improved diagnostic yield and discovered many whose image-documented acute infarct is associated with a short clinical course. Copyright © 2014 S. Karger AG, Basel.

  20. Application of dynamical systems theory to the high angle of attack dynamics of the F-14

    Science.gov (United States)

    Jahnke, Craig C.; Culick, Fred E. C.

    1990-01-01

    Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14s has been analyzed. The aerodynamic model, supplied by NASA, includes nonlinearities as functions of the angles of attack and sideslip, the rotation rate, and the elevator deflection. A continuation method has been used to calculate the steady states of the F-14 as continuous functions of the control surface deflections. Bifurcations of these steady states have been used to predict the onset of wing rock, spiral divergence, and jump phenomena which cause the aircraft to enter a spin. A simple feedback control system was designed to eliminate the wing rock and spiral divergence instabilities. The predictions were verified with numerical simulations.

  1. 14 CFR 47.33 - Aircraft not previously registered anywhere.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Aircraft not previously registered anywhere... TRANSPORTATION AIRCRAFT AIRCRAFT REGISTRATION Certificates of Aircraft Registration § 47.33 Aircraft not previously registered anywhere. (a) A person who is the owner of an aircraft that has not been registered...

  2. 14 CFR 91.117 - Aircraft speed.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft speed. 91.117 Section 91.117... AND GENERAL OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Flight Rules General § 91.117 Aircraft speed. (a) Unless otherwise authorized by the Administrator, no person may operate an aircraft below 10...

  3. 78 FR 67309 - Earth Stations Aboard Aircraft

    Science.gov (United States)

    2013-11-12

    ... COMMISSION 47 CFR Part 25 Earth Stations Aboard Aircraft AGENCY: Federal Communications Commission. ACTION... collection associated with the Commission's Earth Station Aboard Aircraft, Report and Order (Order), which adopted licensing and service rules for Earth Stations Aboard Aircraft (ESAA) communicating with Fixed...

  4. 48 CFR 908.7102 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Aircraft. 908.7102 Section... REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7102 Aircraft. Acquisition of aircraft shall be in accordance with DOE-PMR 41 CFR 109-38.5205. ...

  5. 14 CFR 21.127 - Tests: aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Tests: aircraft. 21.127 Section 21.127 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT CERTIFICATION PROCEDURES FOR PRODUCTS AND PARTS Production Under Type Certificate Only § 21.127 Tests: aircraft. (a) Each...

  6. 14 CFR 34.6 - Aircraft safety.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Aircraft safety. 34.6 Section 34.6 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT FUEL VENTING AND EXHAUST EMISSION REQUIREMENTS FOR TURBINE ENGINE POWERED AIRPLANES General Provisions § 34.6 Aircraft...

  7. 14 CFR 135.125 - Aircraft security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 135.125 Section 135.125... AND ON DEMAND OPERATIONS AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight Operations § 135.125 Aircraft security. Certificate holders conducting operators conducting operations under this part...

  8. 14 CFR 91.209 - Aircraft lights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft lights. 91.209 Section 91.209... Requirements § 91.209 Aircraft lights. No person may: (a) During the period from sunset to sunrise (or, in... or the sun is more than 6 degrees below the horizon)— (1) Operate an aircraft unless it has lighted...

  9. 19 CFR 122.37 - Precleared aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Precleared aircraft. 122.37 Section 122.37 Customs... AIR COMMERCE REGULATIONS Landing Requirements § 122.37 Precleared aircraft. (a) Application. This section applies when aircraft carrying crew, passengers and baggage, or merchandise which has been...

  10. 36 CFR 13.1004 - Aircraft use.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Aircraft use. 13.1004 Section... § 13.1004 Aircraft use. In extraordinary cases where no reasonable alternative exists, local rural residents who permanently reside in the following exempted community(ies) may use aircraft for access to...

  11. 19 CFR 122.42 - Aircraft entry.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Aircraft entry. 122.42 Section 122.42 Customs... AIR COMMERCE REGULATIONS Aircraft Entry and Entry Documents; Electronic Manifest Requirements for Passengers, Crew Members, and Non-Crew Members Onboard Commercial Aircraft Arriving In, Continuing Within...

  12. 31 CFR 560.528 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Aircraft safety. 560.528 Section 560..., Authorizations and Statements of Licensing Policy § 560.528 Aircraft safety. Specific licenses may be issued on a... the safety of civil aviation and safe operation of U.S.-origin commercial passenger aircraft. ...

  13. 50 CFR 27.34 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Aircraft. 27.34 Section 27.34 Wildlife and... WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Vehicles § 27.34 Aircraft. The unauthorized operation of aircraft, including sail planes, and hang gliders, at altitudes resulting in...

  14. 47 CFR 32.6113 - Aircraft expense.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Aircraft expense. 32.6113 Section 32.6113... FOR TELECOMMUNICATIONS COMPANIES Instructions for Expense Accounts § 32.6113 Aircraft expense. (a) This account shall include such costs as aircraft fuel, flight crews, mechanics and ground crews...

  15. 43 CFR 423.41 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Aircraft. 423.41 Section 423.41 Public... Aircraft. (a) You must comply with any applicable Federal, State, and local laws, and with any additional... this part 423, with respect to aircraft landings, takeoffs, and operation on or in the proximity of...

  16. 47 CFR 32.2113 - Aircraft.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Aircraft. 32.2113 Section 32.2113... FOR TELECOMMUNICATIONS COMPANIES Instructions for Balance Sheet Accounts § 32.2113 Aircraft. This account shall include the original cost of aircraft and any associated equipment and furnishings installed...

  17. Impact analysis of composite aircraft structures

    Science.gov (United States)

    Pifko, Allan B.; Kushner, Alan S.

    1993-01-01

    The impact analysis of composite aircraft structures is discussed. Topics discussed include: background remarks on aircraft crashworthiness; comments on modeling strategies for crashworthiness simulation; initial study of simulation of progressive failure of an aircraft component constructed of composite material; and research direction in composite characterization for impact analysis.

  18. Unmanned Cargo Aircraft : From Anywhere to Everywhere

    NARCIS (Netherlands)

    Heerkens, Hans

    2017-01-01

    While unmanned aircraft have been in use for decades, their suitability for transporting cargo is only now slowly being recognised. The first prototypes of unmanned cargo aircraft (UCA) are currently being tested. There are two categories of UCA: short-distance aircraft for delivering packages and

  19. Analyses of Aircraft Responses to Atmospheric Turbulence

    NARCIS (Netherlands)

    Van Staveren, W.H.J.J.

    2003-01-01

    The response of aircraft to stochastic atmospheric turbulence plays an important role in aircraft-design (load calculations), Flight Control System (FCS) design and flight-simulation (handling qualities research and pilot training). In order to simulate these aircraft responses, an accurate

  20. Aircraft height estimation using 2-D radar

    CSIR Research Space (South Africa)

    Hakl, H

    2010-01-01

    Full Text Available A method to infer height information from an aircraft tracked with a single 2-D search radar is presented. The method assumes level flight in the target aircraft and a good estimate of the speed of the aircraft. The method yields good results...

  1. Department of the Navy Justification of Estimates for Fiscal Year 1984 Submitted to Congress January 1983. Procurement. Aircraft Procurement, Navy

    Science.gov (United States)

    1983-01-01

    principal avionics test equipment for F-18,, TF-!8, A-18 and LAMPS weapons systems; (2) to maximize commonality witn the VAST system; (3) to preclude...AF-IJ DesL ~iDtton/Ju~tification: Current attack helicopters do not have crashworfhv fuel avitems. M’lition of the Army dpvelooed crashworthv fuel...White House. To maximize safety of flight, these aircraft must be equipped with a "state-of-the-art" automatic flight control system. Development Status

  2. Aircraft Lightning Electromagnetic Environment Measurement

    Science.gov (United States)

    Ely, Jay J.; Nguyen, Truong X.; Szatkowski, George N.

    2011-01-01

    This paper outlines a NASA project plan for demonstrating a prototype lightning strike measurement system that is suitable for installation onto research aircraft that already operate in thunderstorms. This work builds upon past data from the NASA F106, FAA CV-580, and Transall C-180 flight projects, SAE ARP5412, and the European ILDAS Program. The primary focus is to capture airframe current waveforms during attachment, but may also consider pre and post-attachment current, electric field, and radiated field phenomena. New sensor technologies are being developed for this system, including a fiber-optic Faraday polarization sensor that measures lightning current waveforms from DC to over several Megahertz, and has dynamic range covering hundreds-of-volts to tens-of-thousands-of-volts. A study of the electromagnetic emission spectrum of lightning (including radio wave, microwave, optical, X-Rays and Gamma-Rays), and a compilation of aircraft transfer-function data (including composite aircraft) are included, to aid in the development of other new lightning environment sensors, their placement on-board research aircraft, and triggering of the onboard instrumentation system. The instrumentation system will leverage recent advances in high-speed, high dynamic range, deep memory data acquisition equipment, and fiber-optic interconnect.

  3. Promising Electric Aircraft Drive Systems

    Science.gov (United States)

    Dudley, Michael R.

    2010-01-01

    An overview of electric aircraft propulsion technology performance thresholds for key power system components is presented. A weight comparison of electric drive systems with equivalent total delivered energy is made to help identify component performance requirements, and promising research and development opportunities.

  4. Flight Control of Flexible Aircraft

    Science.gov (United States)

    Nguyen, Nhan T.

    2017-01-01

    This presentation presents an overview of flight control research for flexible high aspect wing aircraft in support of the NASA ARMD Advanced Air Transport Technology (AATT) project. It summarizes multi-objective flight control technology being developed for drag optimization, flutter suppression, and maneuver and gust load alleviation.

  5. Bonded repairs for aircraft fuselages

    OpenAIRE

    Vlot, A.; Verhoeven, S.; Nijssen, P.J.M.

    1998-01-01

    This report will give an overview of the bonded repair work that has been done over the last few years by the Faculty of Aerospace Engineering of Delft University of Technology, in cooperation with the Center for Aircraft Structural Life Extension at the United States Air Force Academy in Colorado Springs.

  6. Bonded repairs for aircraft fuselages

    NARCIS (Netherlands)

    Vlot, A.; Verhoeven, S.; Nijssen, P.J.M.

    1998-01-01

    This report will give an overview of the bonded repair work that has been done over the last few years by the Faculty of Aerospace Engineering of Delft University of Technology, in cooperation with the Center for Aircraft Structural Life Extension at the United States Air Force Academy in Colorado

  7. Aircraft en route noise annoyance

    Science.gov (United States)

    Mccurdy, David A.

    1990-01-01

    Results are reported from a laboratory experiment conducted in order to quantify the annoyance experienced by people on the ground in response to en route noise (ERN) generated by aircraft at cruise conditions. Objectives included the comparison of annoyance responses to ERN with the annoyance responses to takeoff and landing noise; the comparison of the annoyance responses to advanced turboprop aircraft ERN with those of the turbofan ERN; and also the ability of aircraft noise measurement procedures and corrections to predict annoyance to ERN. Tests were conducted at the Langley Acoustics Research Laboratory on 32 human subjects selected at random. Subjects judged the annoyance level of 24 Propfan Test Assessment advanced turboprop ERN stimuli, 18 conventional turbofan ERN stimuli, and 60 conventional turboprop and turbofan takeoff and landing noise stimuli. Analysis of resulting data compared annoyance responses to different aircraft types and operations, examined the ability of current noise measurement and correction procedures to predict annoyance ERN, and calculated optimum duration correction magnitudes for ERN.

  8. MATE. Multi Aircraft Training Environment

    DEFF Research Database (Denmark)

    Hauland, G.; Bove, T.; Andersen, Henning Boje

    2002-01-01

    A medium fidelity and low cost training device for pilots, called the Multi Aircraft Training Environment (MATE), is developed to replace other low fidelity stand-alone training devices and integrate them into a flexible environment, primarily aimed attraining pilots in checklist procedures...

  9. Aircraft Fuel Cell Power Systems

    Science.gov (United States)

    Needham, Robert

    2004-01-01

    In recent years, fuel cells have been explored for use in aircraft. While the weight and size of fuel cells allows only the smallest of aircraft to use fuel cells for their primary engines, fuel cells have showed promise for use as auxiliary power units (APUs), which power aircraft accessories and serve as an electrical backup in case of an engine failure. Fuel cell MUS are both more efficient and emit fewer pollutants. However, sea-level fuel cells need modifications to be properly used in aircraft applications. At high altitudes, the ambient air has a much lower pressure than at sea level, which makes it much more difficult to get air into the fuel cell to react and produce electricity. Compressors can be used to pressurize the air, but this leads to added weight, volume, and power usage, all of which are undesirable things. Another problem is that fuel cells require hydrogen to create electricity, and ever since the Hindenburg burst into flames, aircraft carrying large quantities of hydrogen have not been in high demand. However, jet fuel is a hydrocarbon, so it is possible to reform it into hydrogen. Since jet fuel is already used to power conventional APUs, it is very convenient to use this to generate the hydrogen for fuel-cell-based APUs. Fuel cells also tend to get large and heavy when used for applications that require a large amount of power. Reducing the size and weight becomes especially beneficial when it comes to fuel cells for aircraft. My goal this summer is to work on several aspects of Aircraft Fuel Cell Power System project. My first goal is to perform checks on a newly built injector rig designed to test different catalysts to determine the best setup for reforming Jet-A fuel into hydrogen. These checks include testing various thermocouples, transmitters, and transducers, as well making sure that the rig was actually built to the design specifications. These checks will help to ensure that the rig will operate properly and give correct results

  10. Dynamic stall effects and applications to high performance aircraft

    Science.gov (United States)

    Brandon, Jay M.

    1991-01-01

    Recent research conducted at the NASA Langley Research Center on the effects of large amplitude pitching motions on the aerodynamic characteristics of modern fighter aircraft configurations is highlighted. Wind tunnel tests were conducted on simple flat-plate wings to gain understanding of the complex flow phenomena during unsteady motions at high angles of attack. Studies then progressed to a representative modern fighter configuration. Using a computer controlled dynamic apparatus, tests were conducted to investigate effects of pitch rate and motion time history and to determine the persistence of unsteady effects. Data were also obtained in sideslip and with control surface deflections to investigate dynamic effects on lateral stability and available control power. Force and moment data were obtained using a 6-component internal strain-gage balance. To aid in the interpretation of the results, flow visualization using a laser light-sheet system was also obtained. Results of these tests are discussed, along with their implications on the maneuverability of future advanced airplanes designed to operate in the highly dynamic, high angle-of-attack environment.

  11. Situational panic attacks in social anxiety disorder.

    Science.gov (United States)

    Potter, Carrie M; Wong, Judy; Heimberg, Richard G; Blanco, Carlos; Liu, Shang-Min; Wang, Shuai; Schneier, Franklin R

    2014-01-01

    Panic attacks (PAs) are common in many psychiatric disorders other than panic disorder, especially social anxiety disorder (SAD). PAs have been associated with increased severity, comorbidity, and impairment in many disorders; therefore, PAs can now be used as a descriptive specifier across all DSM-5 disorders. However, the clinical implications of PAs in SAD remain unclear. The aim of the present investigation was to examine demographic and clinical characteristics associated with SAD-related situational panic attacks in a large, representative epidemiological sample of individuals with SAD (N=1138). We compared individuals with SAD who did and did not endorse situational PAs in terms of demographic factors, fear/avoidance of social situations, distress, impairment, and diagnostic comorbidity. Being male, black, Asian, or over 65 years old was associated with a decreased likelihood of experiencing situational PAs, whereas being unemployed was associated with an increased likelihood. Individuals with situational PAs also exhibited greater fear and avoidance of social situations, impairment, coping-oriented substance use, treatment utilization, and concurrent and longitudinal psychiatric comorbidity. Consistent with most epidemiologic studies, the information collected relied on self-report, and not all participants were available for both waves of assessment. The present findings suggest that SAD-related situational PAs are associated with more severe and complex presentations of SAD. Implications for the assessment and treatment of SAD, as well as for the use of PAs as a descriptive specifier for SAD, are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  13. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  14. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  15. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  18. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  19. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  20. Perspectives on Highly Adaptive or Morphing Aircraft

    Science.gov (United States)

    McGowan, Anna-Maria R.; Vicroy, Dan D.; Busan, Ronald C.; Hahn, Andrew S.

    2009-01-01

    The ability to adapt to different flight conditions has been fundamental to aircraft design since the Wright Brothers first flight. Over a hundred years later, unconventional aircraft adaptability, often called aircraft morphing has become a topic of considerable renewed interest. In the past two decades, this interest has been largely fuelled by advancements in multi-functional or smart materials and structures. However, highly adaptive or morphing aircraft is certainly a cross-discipline challenge that stimulates a wide range of design possibilities. This paper will review some of the history of morphing aircraft including recent research programs and discuss some perspectives on this work.

  1. Hydrogen Storage for Aircraft Applications Overview

    Science.gov (United States)

    Colozza, Anthony J.; Kohout, Lisa (Technical Monitor)

    2002-01-01

    Advances in fuel cell technology have brought about their consideration as sources of power for aircraft. This power can be utilized to run aircraft systems or even provide propulsion power. One of the key obstacles to utilizing fuel cells on aircraft is the storage of hydrogen. An overview of the potential methods of hydrogen storage was compiled. This overview identifies various methods of hydrogen storage and points out their advantages and disadvantages relative to aircraft applications. Minimizing weight and volume are the key aspects to storing hydrogen within an aircraft. An analysis was performed to show how changes in certain parameters of a given storage system affect its mass and volume.

  2. Unsteady aerodynamic modeling at high angles of attack using support vector machines

    Directory of Open Access Journals (Sweden)

    Wang Qing

    2015-06-01

    Full Text Available Accurate aerodynamic models are the basis of flight simulation and control law design. Mathematically modeling unsteady aerodynamics at high angles of attack bears great difficulties in model structure determination and parameter estimation due to little understanding of the flow mechanism. Support vector machines (SVMs based on statistical learning theory provide a novel tool for nonlinear system modeling. The work presented here examines the feasibility of applying SVMs to high angle-of-attack unsteady aerodynamic modeling field. Mainly, after a review of SVMs, several issues associated with unsteady aerodynamic modeling by use of SVMs are discussed in detail, such as selection of input variables, selection of output variables and determination of SVM parameters. The least squares SVM (LS-SVM models are set up from certain dynamic wind tunnel test data of a delta wing and an aircraft configuration, and then used to predict the aerodynamic responses in other tests. The predictions are in good agreement with the test data, which indicates the satisfying learning and generalization performance of LS-SVMs.

  3. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  4. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Honglong Chen

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  5. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

    Directory of Open Access Journals (Sweden)

    Changwei Liu

    2014-09-01

    Full Text Available Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct network attack scenarios. Our experiment shows this implemented reasoner can provide pre-estimate of admissibility on a digital crime towards an attacked network.

  6. Maintaining defender's reputation in anomaly detection against insider attacks.

    Science.gov (United States)

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  7. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  8. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  9. Aircraft Survivability: An Overview of Aircraft Fire Protection, Spring 2008

    Science.gov (United States)

    2008-01-01

    combination of the two. The detectors are designed to look at a narrow frequency band; however, initial designs were not sophis- ticated enough to...for complete ignition prevention. Experimental Setup This test program was conducted at the Simulated Aircraft Fuel Tank Environ- ment ( SAFTE ) Facility...experi- enced a roll oscillation at a frequency of 0.35 hertz (Hz). Figure 3 shows a liquid phenomenon known as a hydraulic jump (circled region

  10. Efficacy of intravenous magnesium sulfate in severe migraine attacks

    OpenAIRE

    Zidverc-Trajkovi?, Jasna; Pavlovi?, Aleksandra M.; Jovanovi?, Zagorka; ?terni?, Nade?da; Kosti?, Vladimir S.

    2001-01-01

    The aim of this open study was to make a preliminary estimate of the efficacy and tolerability of intravenously administered magnesium sulfate (1 g) in comparison to subcutaneously administered sumatriptan in the treatment of severe migraine attacks. The study comprised 22 consecutive patients whose attacks were treated with magnesium sulfate (5 ml of a 20% solution), and the results were compared with those of another group of 14 consecutive patients whose attacks were treated with sumatript...

  11. Execute-Only Attacks against Execute-Only Defenses

    Science.gov (United States)

    2016-02-18

    webservers, the attack vectors that can be used to cause memory corruption in databases are not obvious. These systems usually serve as back-ends to public...attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept

  12. Non-harmful insertion of data mimicking computer network attacks

    Energy Technology Data Exchange (ETDEWEB)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  13. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  14. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  15. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  16. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  17. Capturing the uncertainty in adversary attack simulations.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  18. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  19. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  20. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  1. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  2. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  3. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  4. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  5. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  6. Visual framing of terrorist attacks over the years

    OpenAIRE

    Chomátová, Nikola

    2017-01-01

    Diploma thesis Visual framing of terrorist attacks over the years focuses on how the selected terrorist attacks are presented in four Czech daily newspapers. The theoretical part of the thesis is focused on visual framing - which is based on the theoretical grounds of the concept of framing - and the visual presentation of terrorist attacks in the media. The aim of the research is to compare the visual framing of the attack in London in July 2005 and in Paris in 2015 using a quantitative cont...

  7. RFA: R-Squared Fitting Analysis Model for Power Attack

    Directory of Open Access Journals (Sweden)

    An Wang

    2017-01-01

    Full Text Available Correlation Power Analysis (CPA introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.

  8. CID Aircraft slap-down

    Science.gov (United States)

    1984-01-01

    In this photograph the B-720 is seen during the moments of initial impact. The left wing is digging into the lakebed while the aircraft continues sliding towards wing openers. In 1984 NASA Dryden Flight Research Facility and the Federal Aviation Administration (FAA) teamed-up in a unique flight experiment called the Controlled Impact Demonstration (CID). The test involved crashing a Boeing 720 aircraft with four JT3C-7 engines burning a mixture of standard fuel with an additive, Anti-misting Kerosene (AMK), designed to supress fire. In a typical aircraft crash, fuel spilled from ruptured fuel tanks forms a fine mist that can be ignited by a number of sources at the crash site. In 1984 the NASA Dryden Flight Research Facility (after 1994 a full-fledged Center again) and the Federal Aviation Administration (FAA) teamed-up in a unique flight experiment called the Controlled Impact Demonstration (CID), to test crash a Boeing 720 aircraft using standard fuel with an additive designed to supress fire. The additive, FM-9, a high-molecular-weight long-chain polymer, when blended with Jet-A fuel had demonstrated the capability to inhibit ignition and flame propagation of the released fuel in simulated crash tests. This anti-misting kerosene (AMK) cannot be introduced directly into a gas turbine engine due to several possible problems such as clogging of filters. The AMK must be restored to almost Jet-A before being introduced into the engine for burning. This restoration is called 'degradation' and was accomplished on the B-720 using a device called a 'degrader.' Each of the four Pratt & Whitney JT3C-7 engines had a 'degrader' built and installed by General Electric (GE) to break down and return the AMK to near Jet-A quality. In addition to the AMK research the NASA Langley Research Center was involved in a structural loads measurement experiment, which included having instrumented dummies filling the seats in the passenger compartment. Before the final flight on December 1

  9. Aircraft systems design methodology and dispatch reliability prediction

    OpenAIRE

    Bineid, Mansour

    2005-01-01

    Aircraft despatch reliability was the main subject of this research in the wider content of aircraft reliability. The factors effecting dispatch reliability, aircraft delay, causes of aircraft delays, and aircraft delay costs and magnitudes were examined. Delay cost elements and aircraft delay scenarios were also studied. It concluded that aircraft dispatch reliability is affected by technical and non-technical factors, and that the former are under the designer's control. It showed that ...

  10. New Systematic CFD Methods to Calculate Static and Single Dynamic Stability Derivatives of Aircraft

    Directory of Open Access Journals (Sweden)

    Bai-gang Mi

    2017-01-01

    Full Text Available Several new systematic methods for high fidelity and reliability calculation of static and single dynamic derivatives are proposed in this paper. Angle of attack step response is used to obtain static derivative directly; then translation acceleration dynamic derivative and rotary dynamic derivative can be calculated by employing the step response motion of rate of the angle of attack and unsteady motion of pitching angular velocity step response, respectively. Longitudinal stability derivative calculations of SACCON UCAV are taken as test cases for validation. Numerical results of all cases achieve good agreement with reference values or experiments data from wind tunnel, which indicate that the proposed methods can be considered as new tools in the process of design and production of advanced aircrafts for their high efficiency and precision.

  11. Toward Improved Predictions of Slender Airframe Aerodynamics Using the F-16XL Aircraft

    Science.gov (United States)

    Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce

    2016-01-01

    A coordinated project has been underway to improve computational fluid dynamics predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angle-of-attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the computational fluid dynamics failed to provide acceptable results. In this paper, the background, objectives, and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multicode, multi-organizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.

  12. A computer code (SKINTEMP) for predicting transient missile and aircraft heat transfer characteristics

    Science.gov (United States)

    Cummings, Mary L.

    1994-09-01

    A FORTRAN computer code (SKINTEMP) has been developed to calculate transient missile/aircraft aerodynamic heating parameters utilizing basic flight parameters such as altitude, Mach number, and angle of attack. The insulated skin temperature of a vehicle surface on either the fuselage (axisymmetric body) or wing (two-dimensional body) is computed from a basic heat balance relationship throughout the entire spectrum (subsonic, transonic, supersonic, hypersonic) of flight. This calculation method employs a simple finite difference procedure which considers radiation, forced convection, and non-reactive chemistry. Surface pressure estimates are based on a modified Newtonian flow model. Eckert's reference temperature method is used as the forced convection heat transfer model. SKINTEMP predictions are compared with a limited number of test cases. SKINTEMP was developed as a tool to enhance the conceptual design process of high speed missiles and aircraft. Recommendations are made for possible future development of SKINTEMP to further support the design process.

  13. Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern

    Directory of Open Access Journals (Sweden)

    Mauro Leonardi

    2017-10-01

    Full Text Available Automatic Dependent Surveillance-Broadcast (ADS-B is a surveillance system used in Air Traffic Control. With this system, the aircraft transmits their own information (identity, position, velocity, etc. to any equipped listener for surveillance scope. The ADS-B is based on a very simple protocol and does not provide any kind of authentication and encryption, making it vulnerable to many types of cyber-attacks. In the paper, the use of the airplane/transmitter carrier phase is proposed as a feature to perform a classification of the aircraft and, therefore, distinguish legitimate messages from fake ones. The feature extraction process is described and a classification method is selected. Finally, a complete intruder detection algorithm is proposed and evaluated with real data.

  14. A Synthesis of Hybrid RANS/LES CFD Results for F-16XL Aircraft Aerodynamics

    Science.gov (United States)

    Luckring, James M.; Park, Michael A.; Hitzel, Stephan M.; Jirasek, Adam; Lofthouse, Andrew J.; Morton, Scott A.; McDaniel, David R.; Rizzi, Arthur M.

    2015-01-01

    A synthesis is presented of recent numerical predictions for the F-16XL aircraft flow fields and aerodynamics. The computational results were all performed with hybrid RANS/LES formulations, with an emphasis on unsteady flows and subsequent aerodynamics, and results from five computational methods are included. The work was focused on one particular low-speed, high angle-of-attack flight test condition, and comparisons against flight-test data are included. This work represents the third coordinated effort using the F-16XL aircraft, and a unique flight-test data set, to advance our knowledge of slender airframe aerodynamics as well as our capability for predicting these aerodynamics with advanced CFD formulations. The prior efforts were identified as Cranked Arrow Wing Aerodynamics Project International, with the acronyms CAWAPI and CAWAPI-2. All information in this paper is in the public domain.

  15. Aircraft Derived Data Validation Algorithms

    Science.gov (United States)

    2012-08-06

    required to solve for wind. However, local variations in wind results in unrepresentative estimates when only two samples are used; Therefore, a more...CONCLUSION 37 10. FUTURE WORK 39 REFERENCES 40 A. DATA DEPENDENCY CHART A-1 B. WIND FIELD SAMPLE B-1 C. AIRCRAFT SPECIFIC VALIDATION REPORT (ASVR) SAMPLE ...C-1 D. CROSS TRACK REPORT (XTR) SAMPLE D-1 E. ACRONYM LIST E-1 viii LIST OF ILLUSTRATIONS Figure No. Page 1.1 Register Layouts 2 2.1 ATCRBS

  16. Piloted Aircraft Environment Simulation Techniques

    Science.gov (United States)

    1978-04-01

    model of the KC- 135 tanker aircraft. 1.2 AS INE EIEET DEFINEDI1T AS TNEAllRFORCE APRVED IT AS TESYSTEMS CNINA AS ThECONTRACTRMADE I AS N LOGISTCS ...approach trajectory, he will control speed with pitch attitude, and sink rate with power. More rapid changes can be achieved by reversing the control...thrust reversers (or parachutes) may be of most concern, coupled with runway conditions (water or ice) and crosswinds. Failures and assymetrics will

  17. Aircraft Evaluation Using Stochastic Duels

    Science.gov (United States)

    2017-09-01

    control , structural load factors, and weapon effectiveness are influential in determining the winner in the dogfight. Our model is designed to...models focus on higher resolution applications such as missile control designs. Our aim in this chapter is to provide a review of some of the...occurs. 1. The weapons onboard the aircraft are only missiles, thus excluding the use of guns . This assumption serves to focus on the more

  18. IAR-93 military aircraft monument

    Directory of Open Access Journals (Sweden)

    Radu BISCA

    2011-09-01

    Full Text Available In this presentation, we will concentrate on the vertical support, which is free from all sides. A Finite Element Model (FEM of the IAR-93 aircraft monument has been developed in PATRAN/NASTRAN®, partly from a previous ANSYS® model FEM can be used to investigate potential structural modifications or changes in column monument with realistic component corrections. Model validation should be part of every modern engineering analysis and quality assurance procedure

  19. Experiments in aircraft roll-yaw control using forebody tangential blowing

    Science.gov (United States)

    Pedreiro, Nelson

    Flight at high angles of attack can provide improved maneuverability for fighter aircraft and increased lift capabilities for future supersonic and hypersonic transport aircraft during take-off and landing. At high angles of attack the aerodynamics of the vehicle are dominated by separation, vortex shedding and breakdown, which compromise the effectiveness of conventional control surfaces. As a result, controlled flight at high angles of attack is not feasible for current aircraft configurations. Alternate means to augment the control of the vehicle at these flight regimes are therefore necessary. In this work, the feasibility of using Forebody Tangential Blowing to control the roll-yaw motion of a wind tunnel model at high angles of attack is demonstrated. The method consists of injecting a thin sheet of air tangentially to the forebody of the vehicle to change the separation lines over the forebody and alter the aerodynamic loads. A unique model was developed that describes the unsteady aerodynamic moments generated by both vehicle motion and the applied blowing. This aerodynamic model is sufficiently detailed to predict transient motion of the wind-tunnel model, and is simple enough to be suitable for control logic design and implementation. Successful closed-loop control was demonstrated experimentally for a delta wing body model with a cone-cylinder fuselage. Experiments were performed at 45 degrees nominal angle of attack. At this condition, the natural motion of the system is divergent. A discrete vortex method was developed to help understand the main physics of the flow. The method correctly captures the interactions between forebody and wing vortices. Moreover, the trends in static loads and flow structure are correctly represented. Flow visualization results revealed the vortical structure of the flow to be asymmetric even for symmetric flight conditions. The effects of blowing, roll and yaw angles on the flow structure were determined. It was shown that

  20. Effectiveness of the call in beach volleyball attacking play.

    Science.gov (United States)

    Künzell, Stefan; Schweikart, Florian; Köhn, Daniel; Schläppi-Lienhard, Olivia

    2014-12-09

    In beach volleyball the setter has the opportunity to give her or his hitter a "call". The call intends that the setter suggests to her or his partner where to place the attack in the opponent's court. The effectiveness of a call is still unknown. We investigated the women's and men's Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ(2)(2) = 4.55, p = 0.103). In women's beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ(2)(2) = 23.42, p call was effective in women's beach volleyball, while its effect in men's game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  1. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  2. Terpenoid biosynthesis in Arabidopsis attacked by caterpillars and aphids

    NARCIS (Netherlands)

    Kroes, Anneke; Weldegergis, Berhane T.; Cappai, Francesco; Dicke, Marcel; Loon, van Joop J.A.

    2017-01-01

    One of the responses of plants to insect attack is the production of volatile organic compounds that mediate indirect defence of plants by attracting natural enemies of the attacking herbivores. Herbivore-induced plant volatiles (HIPVs) include terpenoids that play key roles in the attraction of

  3. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  4. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  5. An active attack on a multiparty key exchange protocol

    Directory of Open Access Journals (Sweden)

    Reto Schnyder

    2016-01-01

    Full Text Available The multiparty key exchange introduced in Steiner et al. and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

  6. Sequential defense against random and intentional attacks in complex networks

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  7. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we...

  8. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  9. Securing ARP and DHCP for mitigating link layer attacks

    Indian Academy of Sciences (India)

    Vulnerabilities in ARP and DHCP threaten the operation of any network. The existing solutions to secure ARPand DHCP could not mitigate DHCP starvation and host impersonation attacks. This work introduces a new solution to secure ARP and DHCP for preventing and mitigating these LAN attacks. The proposed solution ...

  10. Information on and Comments Concerning Suicide Plane Attacks

    Science.gov (United States)

    1945-06-25

    Attacks -’Defense Against. Reference: (a) CTF 51 Despatch 060900 of LUay 1945. 1.. This vessel has ’been subjected to suicide attacks from medium and lom...reports on the folloving ships: BOIERS (DE 637), RITHEUPINE ( YPD -25), I’ILSON (DD-408), TiALUGO (AO), RiLPH T;,LBOT (DD-39O), H. Ai. WTILEY (DI,-29

  11. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian

    2014-01-01

    state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2119 attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity...

  12. A Secured Protocol For Preventing Online Dictionary Attack ...

    African Journals Online (AJOL)

    The use of passwords is a major point of vulnerablility in computer security as passwords are often easy to guess by automated programs running dictionary attacks. Several attempts have been made by researchers in order to counter online dictionary attack but with one drawback or the other, for example storing ...

  13. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  14. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  15. Attacks and Countermeasures in Communications and Power Networks

    Science.gov (United States)

    2014-01-01

    xi 1 Introduction 1 1.1 Motivation and Overview ...Simulations with the 118-Bus Network . . . . . . . . . . . . . . 122 xi 15 CHAPTER 1 INTRODUCTION 1.1 Motivation and Overview Since the advent of computer...optimal data framing attack as a quadratically constrained quadratic program (QCQP). To analyze the efficacy of the data fram - ing attack, we present a

  16. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  17. Examining Willingness to Attack Critical Infrastructure Online and Offline

    Science.gov (United States)

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  18. 14 CFR 91.111 - Operating near other aircraft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Operating near other aircraft. 91.111... § 91.111 Operating near other aircraft. (a) No person may operate an aircraft so close to another aircraft as to create a collision hazard. (b) No person may operate an aircraft in formation flight except...

  19. 32 CFR 855.15 - Detaining an aircraft.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Detaining an aircraft. 855.15 Section 855.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.15 Detaining an aircraft...

  20. 47 CFR 87.191 - Foreign aircraft stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Foreign aircraft stations. 87.191 Section 87... AVIATION SERVICES Aircraft Stations § 87.191 Foreign aircraft stations. (a) Aircraft of member States of... States airspace only if a license has been issued by the State in which the aircraft is registered and...

  1. DDoS Attack Detection Algorithms Based on Entropy Computing

    Science.gov (United States)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  2. Pre-attack signs and symptoms in cluster headache

    DEFF Research Database (Denmark)

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus

    2018-01-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache...... or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously...... reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10...

  3. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  4. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  5. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  6. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  7. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  8. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen (Cornell University, Ithaca, NY); Carlson, Rolf Erik; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  9. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  10. Toward Security Verification against Inference Attacks on Data Trees

    Directory of Open Access Journals (Sweden)

    Ryo Iwase

    2013-11-01

    Full Text Available This paper describes our ongoing work on security verification against inference attacks on data trees. We focus on infinite secrecy against inference attacks, which means that attackers cannot narrow down the candidates for the value of the sensitive information to finite by available information to the attackers. Our purpose is to propose a model under which infinite secrecy is decidable. To be specific, we first propose tree transducers which are expressive enough to represent practical queries. Then, in order to represent attackers' knowledge, we propose data tree types such that type inference and inverse type inference on those tree transducers are possible with respect to data tree types, and infiniteness of data tree types is decidable.

  11. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  12. Alternate Fuels for Use in Commercial Aircraft

    Science.gov (United States)

    Daggett, David L.; Hendricks, Robert C.; Walther, Rainer; Corporan, Edwin

    2008-01-01

    The engine and aircraft Research and Development (R&D) communities have been investigating alternative fueling in near-term, midterm, and far-term aircraft. A drop in jet fuel replacement, consisting of a kerosene (Jet-A) and synthetic fuel blend, will be possible for use in existing and near-term aircraft. Future midterm aircraft may use a biojet and synthetic fuel blend in ultra-efficient airplane designs. Future far-term engines and aircraft in 50-plus years may be specifically designed to use a low- or zero-carbon fuel. Synthetic jet fuels from coal, natural gas, or other hydrocarbon feedstocks are very similar in performance to conventional jet fuel, yet the additional CO2 produced during the manufacturing needs to be permanently sequestered. Biojet fuels need to be developed specifically for jet aircraft without displacing food production. Envisioned as midterm aircraft fuel, if the performance and cost liabilities can be overcome, biofuel blends with synthetic jet or Jet-A fuels have near-term potential in terms of global climatic concerns. Long-term solutions address dramatic emissions reductions through use of alternate aircraft fuels such as liquid hydrogen or liquid methane. Either of these new aircraft fuels will require an enormous change in infrastructure and thus engine and airplane design. Life-cycle environmental questions need to be addressed.

  13. Aircraft Wiring Support Equipment Integration Laboratory (AWSEIL)

    Data.gov (United States)

    Federal Laboratory Consortium — Purpose:The Aircraft Wiring Support Equipment Integration Laboratory (AWSEIL) provides a variety of research, design engineering and prototype fabrication services...

  14. Aseptic meningoencephalitis mimicking transient ischaemic attacks.

    Science.gov (United States)

    Papavasileiou, V; Milionis, H; Cordier, M; Eskandari, A; Ntaios, G; Michel, P

    2013-04-01

    To highlight meningoencephalitis as a transient ischaemic attack (TIA) mimic and suggest clinical clues for differential diagnosis. This was an observational study of consecutively admitted patients over a 9.75-year period presenting as TIAs at a stroke unit. A total of 790 patients with TIAs and seven with TIA-like symptoms but a final diagnosis of viral meningoencephalitis were recognised. The most frequent presentations of meningoencephalitis patients were acute sensory hemisyndrome (6) and cognitive deficits (5). Signs of meningeal irritation were minor or absent on presentation. Predominantly lymphocytic pleocytosis, hyperproteinorachia and a normal cerebrospinal fluid (CSF)/serum glucose index (in 5 out of 6 documented patients) were present. Meningeal thickening on a brain magnetic resonance imaging (MRI) scan was the only abnormal imaging finding. Six patients received initial vascular treatment; one thrombolysed. Finally, six patients were treated with antivirals and/or antibiotics. Although neither bacterial nor viral agents were identified on extensive testing, viral meningoencephalitis was the best explanation for all clinical and laboratory findings. Aseptic meningoencephalitis should be part of the differential diagnosis in patients presenting as TIA. The threshold for a lumbar puncture in such patients should be set individually and take into account the presence of mild meningeal symptoms, age and other risk factors for vascular disease, the results of brain imaging and the basic diagnostic work-up for a stroke source.

  15. Preventing Heart Attacks and Strokes: Increasing Awareness ...

    Science.gov (United States)

    Summary: Chronic cardiovascular disease imposes a significant health and economic burden on individuals and communities. Despite decades of improvement in cardiovascular mortality, cardiovascular disease and stroke remain the leading cause of death in the U.S. and disparities in health outcomes persist. Moreover, the continuous improvement in cardiovascular mortality typical of the last four decades has ended motivating new and innovative approaches to improve population health and wellbeing. Apart from continued focus on traditional risk factor modification such as identification and treatment of high blood pressure and cholesterol, cessation of smoking, and appropriate use of evidence-based pharmacological prevention measures and disease management, other factors should be considered such as increasing physical activity, dietary sodium reduction and modification of social and environmental determinants known to cause heart attacks and stroke and exacerbate vascular disease. Such an approach will require greater cooperation among public health, environmental health, the broader public and private healthcare delivery and payment systems, and federal agencies. To introduce this concept the U.S. EPA held a workshop in September 2016 bringing together representatives of local and state public health officials, the healthcare system, educators, data analytics, and federal partners (CMS, CDC, Dept. of State and EPA) for the purpose of exploring the idea of prom

  16. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  17. 75 FR 51953 - Notification and Reporting of Aircraft Accidents or Incidents and Overdue Aircraft, and...

    Science.gov (United States)

    2010-08-24

    ... notification and reporting of aircraft accidents or incidents by adding a definition of ``unmanned aircraft... Register (FR), is available for inspection and copying in the NTSB's public reading room, located at 490 L... the addition of a new definition of ``unmanned aircraft accident'' to the section of the NTSB's...

  18. 77 FR 1626 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2012-01-11

    ... Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration (FAA), DOT...'' under the DOT Regulatory Policies and Procedures (44 FR 11034, February 26, 1979), (3) Will not affect... Aircraft model Engine model Aeromot-Ind stria AMT-200 912 A2 Mec nico- Metal rgica Ltda. Diamond Aircraft...

  19. COMPARATIVE ANALYSIS OF TRANSPORT AIRCRAFT, BACKROUND FOR SHORT/ MEDIUM COURIER TRANSPORT AIRCRAFT PROCUREMENT

    Directory of Open Access Journals (Sweden)

    Matei POPA

    2010-03-01

    Full Text Available In accordance with Air Force requirements, the comparative analysis of short/medium transport aircraft comes to sustain procurement decision of short/medium transport aircraft. This paper presents, in short, the principles and the results of the comparative analysis for short/medium military transport aircraft.

  20. Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems

    OpenAIRE

    Gerard, Benjamin; Voos, Holger; Li, Yumei; Darouach, Mohamed

    2015-01-01

    In this paper, the problem of permanent bounded cyber-attacks on networked control systems is treated. After a characterisation of malicious cyber attacks, the danger of permanent bounded cyber-attacks of two types is proved, the step attacks on system with invariant zero with zero real part and the free attacks. Simulation examples demonstrate the obtained results.

  1. Assessment of Alternative Aircraft Fuels

    Science.gov (United States)

    1984-01-01

    The purpose of this symposium is to provide representatives from industry, government, and academia concerned with the availability and quality of future aviation turbine fuels with recent technical results and a status review of DOD and NASA sponsored fuels research projects. The symposium has included presentations on the potential crude sources, refining methods, and characteristics of future fuels; the effects of changing fuel characteristics on the performance and durability of jet aircraft components and systems; and the prospects for evolving suitable technology to produce and use future fuels.

  2. Technology for aircraft energy efficiency

    Science.gov (United States)

    Klineberg, J. M.

    1977-01-01

    Six technology programs for reducing fuel use in U.S. commercial aviation are discussed. The six NASA programs are divided into three groups: Propulsion - engine component improvement, energy efficient engine, advanced turboprops; Aerodynamics - energy efficient transport, laminar flow control; and Structures - composite primary structures. Schedules, phases, and applications of these programs are considered, and it is suggested that program results will be applied to current transport derivatives in the early 1980s and to all-new aircraft of the late 1980s and early 1990s.

  3. Altus I aircraft on lakebed

    Science.gov (United States)

    1997-01-01

    The remotely-piloted Altus I aircraft climbs away after takeoff from Rogers Dry Lake adjacent to NASA's Dryden Flight Research Center, Edwards, Calif. The short series of test flights sponsored by the Naval Postgraduate School in early August, 1997, were designed to demonstrate the ability of the experimental craft to cruise at altitudes above 40,000 feet for sustained durations. On its final flight Aug. 15, the Altus I reached an altitude of 43,500 feet. The Altus I and its sister ship, the Altus II, are variants of the Predator surveillance drone built by General Atomics/Aeronautical Systems, Inc. They are designed for high-altitude, long-duration scientific sampling missions, and are powered by turbocharged piston engines. The Altus I incorporates a single-stage turbocharger, while the Altus II, built for NASA's Environmental Research Aircraft and Sensor Technology program, sports a two-stage turbocharger to enable the craft to fly at altitudes above 55,000 feet. The Altus II, the first of the two craft to be completed, made its first flight on May 1, 1996. With its engine augmented by a single-stage turbocharger, the Altus II reached an altitude of 37,000 ft during its first series of development flights at Dryden in Aug., 1996. In Oct. of that year, the Altus II was flown in an Atmospheric Radiation Measurement study for the Department of Energy's Sandia National Laboratory in Oklahoma. During the course of those flights, the Altus II set a single-flight endurance record for remotely-operated aircraft of more than 26 hours. The Altus I, completed in 1997, flew a series of development flights at Dryden that summer. Those test flights culminated with the craft reaching an altitude of 43,500 ft while carrying a simulated 300-lb payload, a record for an unmanned aircraft powered by a piston engine augmented with a single-stage turbocharger. The Altus II sustained an altitudeof 55,000 feet for four hours in 1999. A pilot in a control station on the ground flies the

  4. GRAPHICAL MODELS OF THE AIRCRAFT MAINTENANCE PROCESS

    Directory of Open Access Journals (Sweden)

    Stanislav Vladimirovich Daletskiy

    2017-01-01

    Full Text Available The aircraft maintenance is realized by a rapid sequence of maintenance organizational and technical states, its re- search and analysis are carried out by statistical methods. The maintenance process concludes aircraft technical states con- nected with the objective patterns of technical qualities changes of the aircraft as a maintenance object and organizational states which determine the subjective organization and planning process of aircraft using. The objective maintenance pro- cess is realized in Maintenance and Repair System which does not include maintenance organization and planning and is a set of related elements: aircraft, Maintenance and Repair measures, executors and documentation that sets rules of their interaction for maintaining of the aircraft reliability and readiness for flight. The aircraft organizational and technical states are considered, their characteristics and heuristic estimates of connection in knots and arcs of graphs and of aircraft organi- zational states during regular maintenance and at technical state failure are given. It is shown that in real conditions of air- craft maintenance, planned aircraft technical state control and maintenance control through it, is only defined by Mainte- nance and Repair conditions at a given Maintenance and Repair type and form structures, and correspondingly by setting principles of Maintenance and Repair work types to the execution, due to maintenance, by aircraft and all its units mainte- nance and reconstruction strategies. The realization of planned Maintenance and Repair process determines the one of the constant maintenance component. The proposed graphical models allow to reveal quantitative correlations between graph knots to improve maintenance processes by statistical research methods, what reduces manning, timetable and expenses for providing safe civil aviation aircraft maintenance.

  5. New entrants and overcapacity: lessons from regional aircraft manufacturing

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.; Heerkens, Johannes M.G.

    2010-01-01

    The commercial aircraft manufacturing industry has been largely dominated by the advanced economies in North America and Western Europe. During recent decades, several emerging economies have invested heavily in the commercial aircraft industry, notably in regional aircraft manufacturing. This paper

  6. Development of a Flammability Test Method for Aircraft Blankets

    Science.gov (United States)

    1996-03-01

    Flammability testing of aircraft blankets was conducted in order to develop a fire performance test method and performance criteria for blankets supplied to commercial aircraft operators. Aircraft blankets were subjected to vertical Bunsen burner tes...

  7. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    OpenAIRE

    Pratik Gite; Sanjay Thakur

    2015-01-01

    Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV) routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different k...

  8. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  9. Survey on attacks in image and video watermarking

    Science.gov (United States)

    Vassaux, Boris; Nguyen, Philippe; Baudry, Severine; Bas, Patrick; Chassery, Jean-Marc

    2002-11-01

    Watermarking techniques have been considerably improved for the last past years, aiming at being always more resistant to attacks. In fact, if the main goal of watermarking at the beginning was to secure digital data (audio, image and video), numerous attacks are still now able to cast doubts on the owner's authenticity ; we can distinguish three different groups of attacks : these one which consist to remove the watermark, these one which aim at impairing the data sufficiently to falsify the detection, and finally these one which try to alter the detection process so that another person becomes the apparent owner of the data. By considering the growing development of always more efficient attacks, this paper firstly presents a recent and exhaustive review of attacks in image and video watermarking. In a second part, the consequences of still image watermarking attacks on video sequences will be outlined and a particular attention will be given to the recently created benchmarks : Stirmark, the benchmark proposed by the University of Geneva Vision Group, this one proposed by the Department of Informatics of the University of Thessaloniki and finally we will speak of the current work of the European Project Certimark ; we will present a comparison of these various benchmarks and show how difficult it is to develop a self-sufficient benchmark, especially because of the complexity of intentional attacks.

  10. Robust continuous-variable quantum key distribution against practical attacks

    Science.gov (United States)

    Huang, Peng; Huang, Jingzheng; Wang, Tao; Li, Huasheng; Huang, Duan; Zeng, Guihua

    2017-05-01

    Recently, several practical attacks on continuous-variable quantum key distribution (CVQKD) were proposed based on faking the estimated value of channel excess noise to hide the intercept-and-resend eavesdropping strategy, including the local oscillator (LO) fluctuation, calibration, wavelength, and saturation attacks. However, the known countermeasures against all these practical attacks will inevitably increase the complexity of the implementation of CVQKD and affect its performance. We develop here an asynchronous countermeasure strategy without structural modifications of the conventional CVQKD scheme. In particular, two robust countermeasures are proposed by adding peak-valley seeking and Gaussian postselection steps in conventional data postprocessing procedure. The analysis shows that the peak-valley seeking method naturally make the schemes immune to all known types of calibration attacks even when Eve simultaneously performs wavelength or LO fluctuation attacks and exhibit simpler implementation and better performance than the known countermeasures. Meanwhile, since the Gaussian postselection is able to resist the saturation attacks, the proposed schemes are secure against all known types of practical attacks.

  11. Risk factors for hypertensive attack during pheochromocytoma resection

    Directory of Open Access Journals (Sweden)

    Se Yun Kwon

    2016-05-01

    Full Text Available Purpose: We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods: Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results: In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample, tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169 was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020 was obtained at a cutoff value of 166.3 μg/d. Conclusions: In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma.

  12. Clinical and psychopathological features of depressions with panic attacks

    Directory of Open Access Journals (Sweden)

    N. N. Ivanets

    2017-01-01

    Full Text Available Objective: to study the clinical and psychopathological features of depressions with panic attacks.Patients and methods. A total of 100 in- and outpatients aged 18 to 60 years, who had been treated in the S.S. Korsakov Clinic of Psychiatry for mild and moderate depression with panic attacks, were clinically examined using the psychometric scales: the Montgomery–Asberg Depression Rating Scale, the Atypical Depression Diagnostic Scale, and the Sheehan Clinical Anxiety Rating Scale.Results. The clinical and psychopathological picture of depression with panic attacks differed significantly in three identified groups of patients with neurotic depression (ND, recurrent depressive disorder (RDD, and bipolar affective disorder (BAD. NDs with panic attacks were characterized by insignificant short-term symptoms of dreariness, indistinct anhedonia with the maximum manifestation of personality sensitivity, and a tendency to alcohol abuse. DDRs with panic attacks were inherent in melancholic and dreary symptoms, anhedonia, classical circadian mood fluctuations, and the most marked reactivity of mood. Depressions with panic attacks within BAD were typical of apathetic manifestations, hypersomnia, hyperphagia, and alcohol craving.Conclusion. Depressions with panic attacks have psychopathological features depending on whether they develop within ND, RDR, or BAD.

  13. Korean immigrants' knowledge of heart attack symptoms and risk factors.

    Science.gov (United States)

    Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson

    2008-02-01

    This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.

  14. Presentation attack detection for face recognition using light field camera.

    Science.gov (United States)

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes.

  15. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  16. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    treated with self-administered and HCP-administered icatibant in a real-world setting. METHODS: The Icatibant Outcome Survey (Shire, Zug, Switzerland; NCT01034969) is an international observational study monitoring the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses.......0001), regardless of administration method. Patients self-administered icatibant for attacks of all severities; overall, 34.7% of severe and 30.2% of very severe attacks were HCP treated. Logistic regression analysis did not find use of long-term prophylaxis, attack location or gender to be predictive for self...

  17. A image watermark resisting geometrical attacks based on quaternion moments

    Science.gov (United States)

    Wu, Ge

    2017-08-01

    This paper, proposes a method that by generating a quaternion moments, which will work as the watermark by multiply the quaternion orthogonal moments. Firstly, quaternion orthogonal moments matrix is gotten from source image and watermarking image separately. Secondly extract N dimension matrix of two matrixes, multiply two matrixes to get a new matrix as the copyright information. Finally the matrix is sent to the copyright center. The watermark can be detected effectively, and it is robust against RST attacking such as rotating attack, cropping and scaling attack.

  18. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    Despite the great interest in rebound attacks on AES-like hash functions since 2009, we report on a rather generic, albeit keyschedule-dependent, algorithmic improvement: A new message modification technique to extend the inbound phase, which even for large internal states makes it possible...... to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  19. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    -defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  20. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic