WorldWideScience

Sample records for head drop attacks

  1. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    Science.gov (United States)

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  3. [A case of hypothyroidism displaying "dropped head" syndrome].

    Science.gov (United States)

    Furutani, Rikiya; Ishihara, Kenji; Miyazawa, Yumi; Suzuki, Yoshio; Shiota, Jun-Ichi; Kawamur, Mitsuru

    2007-01-01

    We describe a patient with hypothyroidism displaying "dropped head" syndrome. A 50-year-old man visited our clinic because he was unable to hold his head in the natural position. He had weakness and hypertrophy of the neck extensor muscles. Tendon reflexes were diminished or absent in all limbs. Mounding phenomena were observed in the bilateral upper extremities. Blood biochemical analysis revealed hypothyroidism, hyperlipidemia, and elevated levels of muscle-derived enzymes. Magnetic resonance imaging (MRI) of the neck demonstrated swelling and hyperintensity of the neck extensor muscles on T2-weighted images. The result of biopsy of the right biceps brachii muscle suggested mild atrophy of type 2 fibers. The diameters of the muscle fibers exhibited mild variation. No inflammatory changes were observed. We diagnosed hin as having "dropped head" syndrome due to hypothyroidism. Administration of thyroid hormone agent gradually improved his condition, and he became able to hold his head in the natural position. Levels of muscle-derived enzymes normalized and his hyperlipidemia remitted. Neck MRI also revealed improvement. Our findings suggest that hypothyroidism should be considered in the differential diagnosis of "dropped head" syndrome, although only a few cases like ours have been reported.

  4. Isolated Cataplexy in the Differential Diagnosis of Drop Attacks: A Case of Successful Clinical Diagnosis and Treatment

    Directory of Open Access Journals (Sweden)

    Robert T. Egel

    2012-01-01

    Full Text Available Drop attacks are sudden spontaneous falls that are not accompanied by alteration of consciousness and are followed by immediate recovery. Cataplexy, which is usually associated with narcolepsy, is one of the causes of drop attacks. We report a patient with the rare condition of cataplexy without associated narcolepsy (isolated cataplexy. Isolated cataplexy should be included in the differential diagnosis when a patient presents with recurrent drop attacks and normal diagnostic test results.

  5. Neck extensor muscle weakness (Dropped head syndrome) following radiotherapy

    International Nuclear Information System (INIS)

    Bhatia, S.; Miller, R.C.; Lachance, D.L.

    2006-01-01

    Background. Dropped head syndrome is an unusual condition in which the head cannot be held upright in its normal anatomic position secondary to pronounced, isolated, neck extensor muscle weakness. Case report. A case of dropped head syndrome in a female with a history of radiotherapy for Hodgkin's lymphoma and a clinical history consistent with multiple sclerosis is presented, and potential etiologies are discussed. Conclusions. Muscular atrophy and lower motor neuron injury secondary to isolated anterior horn cell injury from radiotherapy emerge as the most likely etiology. (author)

  6. [Dropped head syndrome as first manifestation of primary hyperparathyroid myopathy].

    Science.gov (United States)

    Ota, Kiyobumi; Koseki, Sayo; Ikegami, Kenji; Onishi, Iichiroh; Tomimitsu, Hiyoryuki; Shintani, Shuzo

    2018-03-28

    75 years old woman presented with 6-month history of progressive dropped head syndrome. Neurological examination revealed moderate weakness of flexor and extensor of neck and mild weakness of proximal appendicular muscles with normal deep tendon reflexes. The needle electromyography showed short duration and low amplitude motor unit potential. No fibrillation potentials or positive sharp waves were seen. Biopsy of deltoid muscle was normal. Laboratory studies showed elevated levels of serum calcium (11.8 mg/dl, upper limit of normal 10.1) and intact parathyroid hormone (104 pg/ml, upper limit of normal 65), and decreased level of serum phosphorus (2.3 mg/dl, lower limit of normal 2.7). Ultrasonography and enhanced computed tomography revealed a parathyroid tumor. The tumor was removed surgically. Pathological examination proved tumor to be parathyroid adenoma. Dropped head and weakness of muscles were dramatically improved within a week after the operation. Although hyperparathyroidism is a rare cause of dropped head syndrome, neurologists must recognize hyperparathyroidism as a treatable cause of dropped head syndrome.

  7. Early or late appearance of "dropped head syndrome" in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Gourie-Devi, M; Nalini, A; Sandhya, S

    2003-05-01

    "Dropped head syndrome" caused by neck extensor weakness has been reported in a variety of neuromuscular disorders. Previously published reports include isolated cases with amyotrophic lateral sclerosis (ALS). In this report, nine patients with ALS and dropped head syndrome seen during a 20 year period are described. PATIENTS AND INVESTIGATIONS: Between 1981 and 2000, 683 patients with ALS were diagnosed, based on El Escorial criteria. Nine of these had profound neck extensor weakness observed as an early feature, or developing during the later stages of the disease. The protocol for evaluation included detailed clinical history, neurological examination, electromyography, and nerve conduction studies. Investigations were undertaken to exclude malignancy, lymphoproliferative disorders, thyroid dysfunction, and collagen vascular disease. The incidence of dropped head syndrome was 1.3%. The mean (SD) age of the affected patients was 53.3 (10.3) years (range 33 to 65), with an equal distribution of cases in the fourth to seventh decades. In six patients, head drop was an early feature (mean interval from onset of illness 11.6 months (range 3 to 24)); in three it was late (between three and eight years after onset). In five patients, mild neck flexor weakness was present in addition to severe extensor weakness. In all nine patients there were diffuse upper and lower motor neurone signs. None of the patients had difficulty in breathing but all had difficulty in swallowing and social embarrassment, both of which could be corrected by simple measures. Dropped head syndrome is an important clinical sign and usually occurs as an early feature within the first one to two years after the onset of ALS. The cause of dropped head syndrome in these nine cases could be easily established as ALS by the presence of generalised signs.

  8. Football helmet drop tests on different fields using an instrumented Hybrid III head.

    Science.gov (United States)

    Viano, David C; Withnall, Chris; Wonnacott, Michael

    2012-01-01

    An instrumented Hybrid III head was placed in a Schutt ION 4D football helmet and dropped on different turfs to study field types and temperature on head responses. The head was dropped 0.91 and 1.83 m giving impacts of 4.2 and 6.0 m/s on nine different football fields (natural, Astroplay, Fieldturf, or Gameday turfs) at turf temperatures of -2.7 to 23.9 °C. Six repeat tests were conducted for each surface at 0.3 m (1') intervals. The Hybrid III was instrumented with triaxial accelerometers to determine head responses for the different playing surfaces. For the 0.91-m drops, peak head acceleration varied from 63.3 to 117.1 g and HIC(15) from 195 to 478 with the different playing surfaces. The lowest response was with Astroplay, followed by the engineered natural turf. Gameday and Fieldturf involved higher responses. The differences between surfaces decreased in the 1.83 m tests. The cold weather testing involved higher accelerations, HIC(15) and delta V for each surface. The helmet drop test used in this study provides a simple and convenient means of evaluating the compliance and energy absorption of football playing surfaces. The type and temperature of the playing surface influence head responses.

  9. Intrajejunal Infusion of Levodopa-Carbidopa Gel Can Continuously Reduce the Severity of Dropped Head in Parkinson’s Disease

    Directory of Open Access Journals (Sweden)

    Hiroshi Kataoka

    2017-10-01

    Full Text Available Dropped head can occur in patients with Parkinson’s disease and make their quality of life unpleasant because they cannot obtain a frontal view. The pathophysiologic involvement of dopamine agonist or central or peripheral mechanisms has been proposed. Levodopa therapy with the withdrawal of dopamine agonists was sometimes effective, but the effect in most patients did not persist for the entire day. We describe a patient with Parkinson’s disease whose dropped head responded throughout the day to the continuous intrajejunal infusion of levodopa-carbidopa intestinal gel (LCIG. During off-periods before treatment with LCIG, severe akinesia and freezing of gait were evident, and she could not continuously obtain a frontal view because of the dropped head. About 20 min after the intrajejunal infusion of LCIG, these features remarkably improved, and she could obtain a frontal view. The angle of dropped head was improved from 39.39 to 14.04°. This case suggests that infusion of LCIG can reduce the severity of dropped head for a longer period than oral levodopa.

  10. ''Dropped-head'' syndrome due to isolated myositis of neck extensor muscles: MRI findings

    International Nuclear Information System (INIS)

    Gaeta, Michele; Mazziotti, Silvio; Blandino, Alfredo; Toscano, Antonio; Rodolico, Carmelo; Mazzeo, Anna

    2006-01-01

    MRI findings of a patient with dropped-head syndrome due to focal myositis of the neck extensor muscles are presented. MRI showed oedematous changes and marked enhancement of the neck extensor muscles. After therapy MRI demonstrated disappearance of the abnormal findings. (orig.)

  11. Gait training using a hybrid assistive limb (HAL) attenuates head drop: A case report.

    Science.gov (United States)

    Miura, Kousei; Koda, Masao; Kadone, Hideki; Kubota, Shigeki; Shimizu, Yukiyo; Kumagai, Hiroshi; Nagashima, Katsuya; Mataki, Kentaro; Fujii, Kengo; Noguchi, Hiroshi; Funayama, Toru; Abe, Tetsuya; Sankai, Yoshiyuki; Yamazaki, Masashi

    2018-03-31

    Dropped head syndrome (DHS) is characterized by a chin-on-chest deformity, which can severely interfere with forward vision and impair activities of daily living. A standardized treatment strategy for DHS has not been established. To our knowledge, this is the first case report describing the efficacy of gait training using a hybrid assistive limb (HAL) for DHS. A 75-year-old man showed apparent head drop in a standing position, resulting in passively reducible chin-on-chest deformity. A radiograph image showed apparent cervical kyphosis. Center of gravity of the head (CGH)-C7 SVA was +115 mm, CL was -40°, and T1S 39°. The patient underwent a treatment program using HAL, in which gait training was mainly performed, 60 min a day, 5 days a week for 2 weeks (10 sessions). After 2-3 sessions, dropped head started to attenuate. At the end of 10 sessions, the patient was able to walk with normal posture and radiograph images showed cervical kyphosis dramatically decreased because of HAL training. CGH-C7 SVA was 42 mm, CL was -1.7°, and T1S was 30°. Three months' outpatient follow-up revealed a slight deterioration of cervical alignment. However, the patient was able to maintain a better cervical alignment than before HAL training and keep walking with forward vision. There were no complications in any HAL treatment session. In conclusion, gait training using HAL is an option for treatment of DHS in addition to previously reported neck extensor muscle training. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. A mouse model of weight-drop closed head injury: emphasis on cognitive and neurological deficiency

    Directory of Open Access Journals (Sweden)

    Igor Khalin

    2016-01-01

    Full Text Available Traumatic brain injury (TBI is a leading cause of death and disability in individuals worldwide. Producing a clinically relevant TBI model in small-sized animals remains fairly challenging. For good screening of potential therapeutics, which are effective in the treatment of TBI, animal models of TBI should be established and standardized. In this study, we established mouse models of closed head injury using the Shohami weight-drop method with some modifications concerning cognitive deficiency assessment and provided a detailed description of the severe TBI animal model. We found that 250 g falling weight from 2 cm height produced severe closed head injury in C57BL/6 male mice. Cognitive disorders in mice with severe closed head injury could be detected using passive avoidance test on day 7 after injury. Findings from this study indicate that weight-drop injury animal models are suitable for further screening of brain neuroprotectants and potentially are similar to those seen in human TBI.

  13. On the barn owl's visual pre-attack behavior: 1. Structure of head movements and motion patterns

    NARCIS (Netherlands)

    Ohayon, S.; Willigen, R.F. van der; Wagner, H.; Katsman, I.; Rivlin, E.

    2006-01-01

    Barn owls exhibit a rich repertoire of head movements before taking off for prey capture. These movements occur mainly at light levels that allow for the visual detection of prey. To investigate these movements and their functional relevance, we filmed the pre-attack behavior of barn owls. Off-line

  14. Reply to Discussion by Zekai Șen on "Modeling karst spring hydrograph recession based on head drop at sinkholes"

    Science.gov (United States)

    Field, Malcolm S.; Goldscheider, Nico; Li, Guangquan

    2018-02-01

    We are pleased to learn that the model presented in our paper dealing with the "modeling karst spring hydrograph recession based on head drop at sinkholes," published in the Journal of Hydrology in 2016 (Li et al., 2016), is of interest to readers of this journal. Our study presented a new non-exponential model for assessing spring hydrographs in terms of head drop at flooded sinkholes, as an extension of an earlier model proposed by Li and Field (2014). In both papers, we used two spring hydrographs measured in the St. Marks Karst Watershed in northwest Florida to test the applicability and to verify the validity of our models.

  15. Early-onset dropped head syndrome after radiotherapy for head and neck cancer: dose constraints for neck extensor muscles

    International Nuclear Information System (INIS)

    Inaba, Koji; Nakamura, Satoshi; Okamoto, Hiroyuki; Kashihara, Tairo; Kobayashi, Kazuma; Harada, Ken; Kitaguchi, Mayuka; Sekii, Shuhei; Takahashi, Kana; Murakami, Naoya; Ito, Yoshinori; Igaki, Hiroshi; Uno, Takashi; Itami, Jun

    2016-01-01

    Dropped head syndrome (DHS) is a famous but unusual late complication of multimodality treatment for head and neck carcinoma. We reported this early-onset complication and analyzed the dose to the neck extensor muscles. We examined the records of three patients with DHS after radiotherapy. The doses to the neck extensor muscles were compared between three patients with DHS and nine patients without DHS. The mean dose to the neck extensor muscles of the three patients with DHS were 58.5 Gy, 42.3 Gy and 60.9 Gy, while the dose was <50 Gy in all nine patients in the control group. The onset of this syndrome was 5 months, 6 months and 15 months. The early-onset DHS may have something to do with dose to the neck extensor muscles. The proposed dose to the neck extensor muscles might be <46 Gy (or at least <50 Gy)

  16. ''Dropped-head'' syndrome due to isolated myositis of neck extensor muscles: MRI findings

    Energy Technology Data Exchange (ETDEWEB)

    Gaeta, Michele; Mazziotti, Silvio; Blandino, Alfredo [University of Messina, Department of Radiological Sciences, Messina (Italy); Toscano, Antonio; Rodolico, Carmelo; Mazzeo, Anna [University of Messina, Department of Neurosciences, Psychiatry and Anaesthesiology, Messina (Italy)

    2006-02-15

    MRI findings of a patient with dropped-head syndrome due to focal myositis of the neck extensor muscles are presented. MRI showed oedematous changes and marked enhancement of the neck extensor muscles. After therapy MRI demonstrated disappearance of the abnormal findings. (orig.)

  17. Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections

    Energy Technology Data Exchange (ETDEWEB)

    Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Weekrakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-10-23

    Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. With the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.

  18. The distinguishing motor features of cataplexy: a study from video-recorded attacks.

    Science.gov (United States)

    Pizza, Fabio; Antelmi, Elena; Vandi, Stefano; Meletti, Stefano; Erro, Roberto; Baumann, Christian R; Bhatia, Kailash P; Dauvilliers, Yves; Edwards, Mark J; Iranzo, Alex; Overeem, Sebastiaan; Tinazzi, Michele; Liguori, Rocco; Plazzi, Giuseppe

    2018-05-01

    To describe the motor pattern of cataplexy and to determine its phenomenological differences from pseudocataplexy in the differential diagnosis of episodic falls. We selected 30 video-recorded cataplexy and 21 pseudocataplexy attacks in 17 and 10 patients evaluated for suspected narcolepsy and with final diagnosis of narcolepsy type 1 and conversion disorder, respectively, together with self-reported attacks features, and asked expert neurologists to blindly evaluate the motor features of the attacks. Video documented and self-reported attack features of cataplexy and pseudocataplexy were contrasted. Video-recorded cataplexy can be positively differentiated from pseudocataplexy by the occurrence of facial hypotonia (ptosis, mouth opening, tongue protrusion) intermingled by jerks and grimaces abruptly interrupting laughter behavior (i.e. smile, facial expression) and postural control (head drops, trunk fall) under clear emotional trigger. Facial involvement is present in both partial and generalized cataplexy. Conversely, generalized pseudocataplexy is associated with persistence of deep tendon reflexes during the attack. Self-reported features confirmed the important role of positive emotions (laughter, telling a joke) in triggering the attacks, as well as the more frequent occurrence of partial body involvement in cataplexy compared with pseudocataplexy. Cataplexy is characterized by abrupt facial involvement during laughter behavior. Video recording of suspected cataplexy attacks allows the identification of positive clinical signs useful for diagnosis and, possibly in the future, for severity assessment.

  19. Study on frictional pressure drop of steam-water two phase flow in optimized four-head internal-ribbed tube

    International Nuclear Information System (INIS)

    Wang Weishu; Zhu Xiaojing; Bi Qincheng; Wu Gang; Yu Shuiqing

    2012-01-01

    The optimized internal-ribbed tube is different from the normal internal-ribbed tube on the frictional pressure drop characteristics. The frictional pressure drop characteristics of steam-water two phase flow in horizontal four-head optimized internal-ribbed were studied under adiabatic condition. According to the experimental and calculation results, the two-phase multiplier is greatly affected by the steam quality and pressure. The two-phase multiplier increases with increasing quality, and decreases with increasing pressure. In the near-critical pressure region, the two-phase multiplier is close to 1. The frictional pressure drop of two phase flow in optimized tube is less than that in the normal tube under the same work condition. The good hydrodynamic condition could be achieved when the optimized internal-ribbed tube is used in the heat transfer equipment because the self-compensating characteristics exist due to the reduction of frictional pressure drop. (authors)

  20. The exploding head syndrome.

    Science.gov (United States)

    Green, M W

    2001-06-01

    This article reviews the features of an uncommon malady termed "the exploding head syndrome." Sufferers describe terrorizing attacks of a painless explosion within their head. Attacks tend to occur at the onset of sleep. The etiology of attacks is unknown, although they are considered to be benign. Treatment with clomipramine has been suggested, although most sufferers require only reassurance that the spells are benign in nature.

  1. A Bernoulli Gaussian Watermark for Detecting Integrity Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-11-02

    We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In this paper, we consider the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input. On one hand, this enables analysis in a more general network setting. On the other hand, we observe that in certain cases, Bernoulli packet drops can improve detection performance relative to a purely Gaussian watermark. This motivates the joint design of a Bernoulli-Gaussian watermark which incorporates both an additive Gaussian input and a Bernoulli drop process. We characterize the effect of such a watermark on system performance as well as attack detectability in two separate design scenarios. Here, we consider a correlation detector for attack recognition. We then propose efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs. Finally, we provide numerical results which illustrate that a watermark with packet drops can indeed outperform a Gaussian watermark.

  2. Assessment of damage potential to the TMI-2 lower head due to thermal attack by core debris

    International Nuclear Information System (INIS)

    Cronenberg, A.W.; Behling, S.R.; Broughton, J.M.

    1986-06-01

    Camera inspection of the Three Mile Island Unit 2 (TMI-2) inlet plenum region has shown that approximately 10 to 20 percent of the core material loading may have relocated to the lower plenum. Although vessel integrity was maintained, a question of primary concern is ''how close to vessel failure'' did this accident come. This report summarizes the results of thermal analyses aimed at assessing damage potential to the TMI-2 lower head and attached instrument penetration tubes due to thermal attack by hot core debris. Results indicate that the instrument penetration nozzles could have experienced melt failure at localized hot spot regions, with attendant debris drainage and plugging of the instrument lead tubes. However, only minor direct thermal attack of the vessel liner is predicted

  3. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2012-05-01

    Full Text Available Of the range of wireless communication technologies, wireless sensor networks (WSN will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping rate below the minimum misbehaviour monitoring threshold. Furthermore, Watchdog does not consider real traffic situations, such as congestion and collision, and so it has no way of recognizing whether a packet drop is due to a real attack or network congestion. In this paper, we propose a malicious packet drop monitoring agent, which considers traffic conditions. We used the actual traffic volume on neighbouring nodes and the drop rate while monitoring a sending node for specific period. It is more effective in real network scenarios because unlike Watchdog it considers the actual traffic, which only uses the Pathrater. Moreover, our proposed method does not require authentication, packet encryption or detection packets. Thus, there is a lower likelihood of detection failure due to packet spoofing, Man-In-the Middle attacks or Wormhole attacks. To test the suitability of our proposed concept for a series of network scenarios, we divided the simulations into three types: one attack node, more than one attack nodes and no attack nodes. The results of the simulations meet our expectations.

  4. Otolithic membrane damage in patients with endolymphatic hydrops and drop attacks.

    Science.gov (United States)

    Calzada, Audrey P; Lopez, Ivan A; Ishiyama, Gail; Ishiyama, Akira

    2012-12-01

    1. Evaluate the otolithic membrane in patients with endolymphatic hydrops (EH) and vestibular drop attacks (VDA) undergoing ablative labyrinthectomy. 2. Correlate intraoperative findings to archival temporal bone specimens of patients with EH. Retrospective case review. Tertiary referral center. SPECIMEN SOURCE: 1. Patients undergoing labyrinthectomy for incapacitating Ménière's disease (MD), delayed EH, VDA, or acoustic neuroma (AN) between 2004 and 2011. 2. Archival temporal bone specimens of patients with MD. Ablative labyrinthectomy. Examination of the utricular otolithic membrane. The otolithic membrane of the utricle was evaluated intraoperatively in 28 patients undergoing labyrinthectomy. Seven (25%) had a history of VDA, 6 (21%) had delayed EH, 9 (32%) had MD, and 6 (21%) had AN. All patients with VDA showed evidence of a disrupted utricular otolithic membrane, whereas only 50% and 56% of patients with delayed EH and MD, respectively, demonstrated otolithic membrane disruption (p = 0.051). None of the patients with AN showed otolithic membrane disruption (p = 0.004). The mean thickness of the otolithic membrane in 5 archival temporal bone MD specimens was 11.45 micrometers versus 38 micrometers in normal specimens (p = 0.001). The otolithic membrane is consistently damaged in patients with VDA. In addition, there is a significantly higher incidence of otolithic membrane injury in patients with MD and delayed EH compared with patients without hydrops, suggesting that the underlying pathophysiology in VDA results from injury to the otolithic membrane of the saccule and utricle, resulting in free-floating otoliths and atrophy.

  5. Radiation-induced camptocormia and dropped head syndrome. Review and case report of radiation-induced movement disorders

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, Clemens; Kuhnt, Thomas; Kortmann, Rolf-Dieter; Hering, Kathrin [Leipzig University, Department of Radiotherapy and Radiation Oncology, Leipzig (Germany)

    2015-10-15

    In recent years, camptocormia and dropped head syndrome (DHS) have gained attention as particular forms of movement disorders. Camptocormia presents with involuntary forward flexion of the thoracolumbar spine that typically increases during walking or standing and may severely impede walking ability. DHS is characterized by weakness of the neck extensors and a consecutive inability to extend the neck; in severe cases the head is fixed in a ''chin to chest position.'' Many diseases may underlie these conditions, and there have been some reports about radiation-induced camptocormia and DHS. A PubMed search with the keywords ''camptocormia,'' ''dropped head syndrome,'' ''radiation-induced myopathy,'' ''radiation-induced neuropathy,'' and ''radiation-induced movement disorder'' was carried out to better characterize radiation-induced movement disorders and the radiation techniques involved. In addition, the case of a patient developing camptocormia 23 years after radiation therapy of a non-Hodgkin's lymphoma of the abdomen is described. In total, nine case series of radiation-induced DHS (n = 45 patients) and - including our case - three case reports (n = 3 patients) about radiogenic camptocormia were retrieved. Most cases (40/45 patients) occurred less than 15 years after radiotherapy involving extended fields for Hodgkin's disease. The use of wide radiation fields including many spinal segments with paraspinal muscles may lead to radiation-induced movement disorders. If paraspinal muscles and the thoracolumbar spine are involved, the clinical presentation can be that of camptocormia. DHS may result if there is involvement of the cervical spine. To prevent these disorders, sparing of the spine and paraspinal muscles is desirable. (orig.) [German] In den letzten Jahren haben Bewegungsstoerungen von Wirbelsaeule und paraspinaler Muskulatur in

  6. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  7. Radiation-induced camptocormia and dropped head syndrome. Review and case report of radiation-induced movement disorders

    International Nuclear Information System (INIS)

    Seidel, Clemens; Kuhnt, Thomas; Kortmann, Rolf-Dieter; Hering, Kathrin

    2015-01-01

    In recent years, camptocormia and dropped head syndrome (DHS) have gained attention as particular forms of movement disorders. Camptocormia presents with involuntary forward flexion of the thoracolumbar spine that typically increases during walking or standing and may severely impede walking ability. DHS is characterized by weakness of the neck extensors and a consecutive inability to extend the neck; in severe cases the head is fixed in a ''chin to chest position.'' Many diseases may underlie these conditions, and there have been some reports about radiation-induced camptocormia and DHS. A PubMed search with the keywords ''camptocormia,'' ''dropped head syndrome,'' ''radiation-induced myopathy,'' ''radiation-induced neuropathy,'' and ''radiation-induced movement disorder'' was carried out to better characterize radiation-induced movement disorders and the radiation techniques involved. In addition, the case of a patient developing camptocormia 23 years after radiation therapy of a non-Hodgkin's lymphoma of the abdomen is described. In total, nine case series of radiation-induced DHS (n = 45 patients) and - including our case - three case reports (n = 3 patients) about radiogenic camptocormia were retrieved. Most cases (40/45 patients) occurred less than 15 years after radiotherapy involving extended fields for Hodgkin's disease. The use of wide radiation fields including many spinal segments with paraspinal muscles may lead to radiation-induced movement disorders. If paraspinal muscles and the thoracolumbar spine are involved, the clinical presentation can be that of camptocormia. DHS may result if there is involvement of the cervical spine. To prevent these disorders, sparing of the spine and paraspinal muscles is desirable. (orig.) [de

  8. Fluid mechanics calculations in physics of droplets – IV: Head-on and off-center numerical collisions of unequal-size drops

    Directory of Open Access Journals (Sweden)

    Alejandro Acevedo-Malavé

    2016-09-01

    Full Text Available In this study, the finite volume method is employed to simulate the coalescence collision between water drops immersed in a continuous phase (n-heptane. For that purpose, it is chosen a range of values for the velocity of collisions for the finite volume calculations may yield different possible outcomes of the collision process. It can be seen for head-on collisions that when the velocity of collision is 0.2 m/s and 3.5 m/s, the little drop induces the formation of a hole in the bigger drop, until the surface tension forces to restore the circular form of the resulting drop. For a velocity of collision of 16.0 m/s, the little drop deforms the bigger one, and the system is converted into a thin ligament with the evolution of the dynamics. In this case, a little mass of n-heptane is trapped between the two drops, but at the end of the dynamics it drains to the continuous phase. For off-center collisions, two different values for the velocity of collisions were chosen, and the drops exhibit a lot of waves on the droplets’ surface. The streamlines are calculated for the process of coalescence of drops. These streamlines allow the understanding of the dynamics of the droplets immersed on the n-heptane phase. The effect of the interfacial tension it is showed due to the oscillations that the droplet exhibits. When the coalescence has begun, the streamlines form circular patterns at the zone of contact between the drops which explain the increment of the thickness of the bridge structure of the fluid between the two drops. At the end of the dynamics, when the velocity is of 0.2 m/s, the bigger drop reaches a circular form approximately, but when the velocity is of 3.5 m/s the drop reaches an elongated form.

  9. Low heat pain thresholds in migraineurs between attacks.

    Science.gov (United States)

    Schwedt, Todd J; Zuniga, Leslie; Chong, Catherine D

    2015-06-01

    Between attacks, migraine is associated with hypersensitivities to sensory stimuli. The objective of this study was to investigate hypersensitivity to pain in migraineurs between attacks. Cutaneous heat pain thresholds were measured in 112 migraineurs, migraine free for ≥ 48 hours, and 75 healthy controls. Pain thresholds at the head and at the arm were compared between migraineurs and controls using two-tailed t-tests. Among migraineurs, correlations between heat pain thresholds and headache frequency, allodynia symptom severity, and time interval until next headache were calculated. Migraineurs had lower pain thresholds than controls at the head (43.9 ℃ ± 3.2 ℃ vs. 45.1 ℃ ± 3.0 ℃, p = 0.015) and arm (43.2 ℃ ± 3.4 ℃ vs. 44.8 ℃ ± 3.3 ℃, p pain thresholds and headache frequency or allodynia symptom severity. For the 41 migraineurs for whom time to next headache was known, there were positive correlations between time to next headache and pain thresholds at the head (r = 0.352, p = 0.024) and arm (r = 0.312, p = 0.047). This study provides evidence that migraineurs have low heat pain thresholds between migraine attacks. Mechanisms underlying these lower pain thresholds could also predispose migraineurs to their next migraine attack, a hypothesis supported by finding positive correlations between pain thresholds and time to next migraine attack. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  10. Pressure drop in T's in concentric ducts

    International Nuclear Information System (INIS)

    Shock, R.A.W.

    1983-02-01

    A set of experiments has been carried out to measure the pressure drop characteristics of single-phase flow in dividing and joining right-angled T's in a concentric ducting system. These have been compared with measured pressure drops in a simple round tube system. In most tests with the concentric system the number of velocity heads lost is either similar to, or more than, the value for the round tubes. (author)

  11. Facio-brachio-crural dystonic episodes and drop attacks due to leucine rich glioma inactivated 1 encephalitis in two elderly Indian women.

    Science.gov (United States)

    Maramattom, Boby Varkey; Jeevanagi, Sachin Rajashekar; George, Celinamma

    2013-10-01

    Two women in their 60's are presented to us with sudden falls of acute onset. Prolonged observation revealed a gradually evolving syndrome of paroxysmal right sided faciobrachial dystonic (FBD) posturing lasting seconds. Both patients went on to develop hyponatremia, following which the episodes worsened and appeared on both sides. In both cases, prolonged electroencephalography monitoring and magnetic resonance imaging brain were normal and the response to conventional anticonvulsants was poor. One patient improved spontaneously over 6 months. The 2(nd) patient developed an amnestic syndrome and was started on intravenous methylprednisolone with which her movement disorder abated. Her amnestic syndrome improved and she was discharged on oral steroids. Both patients tested positive for leucine-rich glioma inactivated 1 (LGi1) antibodies. We present the first case reports of FBD episodes and drop attacks owing to LGi1 encephalitis from India and review the relevant literature pertinent to the subject.

  12. Facio-brachio-crural dystonic episodes and drop attacks due to leucine rich glioma inactivated 1 encephalitis in two elderly Indian women

    Directory of Open Access Journals (Sweden)

    Boby Varkey Maramattom

    2013-01-01

    Full Text Available Two women in their 60′s are presented to us with sudden falls of acute onset. Prolonged observation revealed a gradually evolving syndrome of paroxysmal right sided faciobrachial dystonic (FBD posturing lasting seconds. Both patients went on to develop hyponatremia, following which the episodes worsened and appeared on both sides. In both cases, prolonged electroencephalography monitoring and magnetic resonance imaging brain were normal and the response to conventional anticonvulsants was poor. One patient improved spontaneously over 6 months. The 2 nd patient developed an amnestic syndrome and was started on intravenous methylprednisolone with which her movement disorder abated. Her amnestic syndrome improved and she was discharged on oral steroids. Both patients tested positive for leucine-rich glioma inactivated 1 (LGi1 antibodies. We present the first case reports of FBD episodes and drop attacks owing to LGi1 encephalitis from India and review the relevant literature pertinent to the subject.

  13. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    Science.gov (United States)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  14. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  15. [Case of exploding head syndrome].

    Science.gov (United States)

    Okura, Mutsumi; Taniguchi, Mitsutaka; Muraki, Hisae; Sugita, Hideko; Ohi, Motoharu

    2010-01-01

    Exploding head syndrome (EHS) attacks are characterized by the sensation of sudden loud banging noises, and are occasionally accompanied by the sensation of a flash light. Although these attacks in themselves are usually not painful, it is reported that EHS attacks may precede migraines and may be perceived as auras. A 53-year-old woman, with a 40-year history of fulgurating migraines, experienced 2 different types of EHS attacks. During most of the attacks, which were not painful, she heard sounds like someone yelling or cars passing by. Only 1 episode was accompanied with the sensation of a flash light and of sounds similar to those of an electrical short circuit. On the video-polysomnography, video-polysomnography showed 11 EHS attacks occurred during stage N1 and stage N2; these attacks were preceded by soft snoring. She also had moderate obstructive sleep apnea syndrome (Apnea Hypopnea Index: 16.7) for which an oral appliance was prescribed; the EHS attacks did not recur after this treatment. The pathophysiology of EHS is still unclear. A detailed analysis of PSG data may help in understanding the pathophysiology of this syndrome and also in the selection of therapeutic strategies.

  16. A Huge Capital Drop with Compression of Femoral Vessels Associated with Hip Osteoarthritis

    Directory of Open Access Journals (Sweden)

    Tomoya Takasago

    2015-01-01

    Full Text Available A capital drop is a type of osteophyte at the inferomedial portion of the femoral head commonly observed in hip osteoarthritis (OA, secondary to developmental dysplasia. Capital drop itself is typically asymptomatic; however, symptoms can appear secondary to impinge against the acetabulum or to irritation of the surrounding tissues, such as nerves, vessels, and tendons. We present here a case of unilateral leg edema in a patient with hip OA, caused by a huge bone mass occurring at the inferomedial portion of the femoral head that compressed the femoral vessels. We diagnosed this bone mass as a capital drop secondary to hip OA after confirming that the mass occurred at least after the age of 63 years based on a previous X-ray. We performed early resection and total hip arthroplasty since the patient’s hip pain was due to both advanced hip OA and compression of the femoral vessels; moreover, we aimed to prevent venous thrombosis secondary to vascular compression considering the advanced age and the potent risk of thrombosis in the patient. A large capital drop should be considered as a cause of vascular compression in cases of unilateral leg edema in OA patients.

  17. Hydrothermal Formation of the Head-to-Head Coalesced Szaibelyite MgBO2(OH Nanowires

    Directory of Open Access Journals (Sweden)

    Zhu Wancheng

    2009-01-01

    Full Text Available Abstract The significant effect of the feeding mode on the morphology and size distribution of the hydrothermal synthesized MgBO2(OH is investigated, which indicates that, slow dropping rate (0.5 drop s−1 and small droplet size (0.02 mL d−1 of the dropwise added NaOH solution are favorable for promoting the one-dimensional (1D preferential growth and thus enlarging the aspect ratio of the 1D MgBO2(OH nanostructures. The joint effect of the low concentration of the reactants and feeding mode on the hydrothermal product results in the head-to-head coalesced MgBO2(OH nanowires with a length of 0.5–9.0 μm, a diameter of 20–70 nm, and an aspect ratio of 20–300 in absence of any capping reagents/surfactants or seeds.

  18. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  19. Shifting problems and shifting policies to reduce student drop-out

    DEFF Research Database (Denmark)

    Jørgensen, Christian Helms

    2016-01-01

    , as well as the policies that have been implemented in pursuit of improving student retention. The review identifies two pervasive ways in which the drop-out problem has been framed in both policy and research. The first locates the drop-out problem with individual students, while the second locates...... finds that the rate of student drop-out has been a cause for ongoing concern among policy makers for more than a century, and that the framing of the problem has shifted considerably over time. The problem has variously been placed with the individual apprentice, the basic structure of vocational......Education policy generally places a premium on raising the level of education attained by the young generation ultimately heading towards the labour market. While the rate of enrolment in post-compulsory education has risen in most countries, so too has the rate of drop-out, in particular from...

  20. Determination of normal values for navicular drop during walking: a new model correcting for foot length and gender

    DEFF Research Database (Denmark)

    Nielsen, Rasmus G; Rathleff, Michael S; Simonsen, Ole H

    2009-01-01

    participants. Normal values have not yet been established as foot length, age, gender, and Body Mass Index (BMI) may influence the navicular drop. The purpose of the study was to investigate the influence of foot length, age, gender, and BMI on the navicular drop during walking. METHODS: Navicular drop...... was measured with a novel technique (Video Sequence Analysis, VSA) using 2D video. Flat reflective markers were placed on the medial side of the calcaneus, the navicular tuberosity, and the head of the first metatarsal bone. The navicular drop was calculated as the perpendicular distance between the marker...... on the navicular tuberosity and the line between the markers on calcaneus and first metatarsal head. The distance between the floor and the line in standing position between the markers on calcaneus and first metatarsal were added afterwards. RESULTS: 280 randomly selected participants without any foot problems...

  1. Analysis of the reflection of a micro drop fiber sensor

    Science.gov (United States)

    Sun, Weimin; Liu, Qiang; Zhao, Lei; Li, Yingjuan; Yuan, Libo

    2005-01-01

    Micro drop fiber sensors are effective tools for measuring characters of liquids. These types of sensors are wildly used in biotechnology, beverage and food markets. For a fiber micro drop sensor, the signal of the output light is wavy with two peaks, normally. Carefully analyzing the wavy process can identify the liquid components. Understanding the reason of forming this wavy signal is important to design a suitable sensing head and to choose a suitable signal-processing method. The dripping process of a type of liquids is relative to the characters of the liquid and the shape of the sensing head. The quasi-Gauss model of the light field from the input-fiber end is used to analyse the distribution of the light field in the liquid drop. In addition, considering the characters of the liquid to be measured, the dripping process of the optical signal from the output-fiber end can be expected. The reflection surface of the micro drop varies as serials of spheres with different radiuses and global centers. The intensity of the reflection light changes with the shape of the surface. The varying process of the intensity relates to the tense, refractive index, transmission et al. To support the analyse above, an experimental system is established. In the system, LED is chosen as the light source and the PIN transform the light signal to the electrical signal, which is collected by a data acquisition card. An on-line testing system is made to check the theory discussed above.

  2. A determination of discharge head of the Cherepnov water lifter with siphon

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Kwan Soo; Rhee, Kyoung Hoon [Chonnam National Univ., Kwangju (Korea, Republic of); Park, Sung Chun [Dongshin University, Naju (Korea, Republic of); Jeong, Byoung Kyen [Sunchon Technical Junior College, Sunchon (Korea, Republic of)

    1996-02-29

    This paper presents an experimental study on the discharge head of Cherepnov water lifter that was continuously operated with the aid of the siphon. The energy used by the Cherepnov water lifter is derived from the potential energy of the water itself. The lifter consists of three interconnected tanks and five pipes, one of which is open and two others are hermetically sealed. The effects of varying operating parameters such as the tank and pipe size, the ratio between head of discharge and drop height were analyzed. As a result, factors that can maximize the efficiency and increase the average delivery rate were identified. When the ratio between head of discharge and drop height is about 0.5, the efficiency of Cherepnov water lifter is maximized. In order to design the efficient Cherepnov water lifter, the discharge head of the Cherepnov water lifter should be assigned to be twice as much as the drop height. The effect of tank size on the efficiency is less than 5%, while the effect of the pipe size is not negligible. The larger the pipe size is, the more the efficiency increases. (author). 13 refs., 4 tabs., 8 figs.

  3. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  4. Exploding head syndrome: six new cases and review of the literature.

    Science.gov (United States)

    Frese, Achim; Summ, Oliver; Evers, Stefan

    2014-09-01

    Exploding head syndrome (EHS) is characterized by attacks of a sudden noise or explosive feeling experienced in the head occurring during the transition from wake to sleep or from sleep to wake. We present six new cases extending the clinical experience with the syndrome. We also reviewed all available cases from the scientific literature and evaluated the typical features of EHS. The female to male ratio is 1.5 to 1. The median age at onset is 54. In average, one attack per day to one attack per week occurs. Some patients suffer from several attacks per night. In about half of all patients, a chronic time course can be observed but episodic or sporadic occurrence is also common. The most frequent accompanying symptoms beside the noise are fear and flashes of light. Polysomnographic studies do not reveal any specific sleep pattern associated with EHS. Tricyclic antidepressants are helpful in some patients. However, most patients do not need treatment because of the benign nature of the syndrome. EHS is a well-defined disease entity with a benign nature. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  5. Experimental study of pressure drops through LOCA-generated debris deposited on a fuel assembly

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Jeong Kwan, E-mail: jksuh@khnp.co.kr [KHNP Central Research Institute, 1312-70 Yuseong-daero, Yuseong-gu, Daejeon 305-343 (Korea, Republic of); Kim, Jae Won; Kwon, Sun Guk; Lee, Jae Yong [KHNP Central Research Institute, 1312-70 Yuseong-daero, Yuseong-gu, Daejeon 305-343 (Korea, Republic of); Cho, Hyoung Kyu; Park, Goon Cherl [Department of Nuclear Engineering, Seoul National University, Seoul 151-742 (Korea, Republic of)

    2015-08-15

    Highlights: • In-vessel downstream effect tests were performed in the presence of LOCA-generated debris. • Available driving heads under each LOCA scenario were verified using experimental data. • Fibrous debris was prepared to satisfy the length distribution obtained from the bypass test. • Limiting test conditions were identified through sensitivity studies. - Abstract: Under post loss-of-coolant accident (LOCA) conditions, it is postulated that debris can be generated and transported to the containment sump strainer. Some of the debris may pass through the strainer and could challenge the long-term core cooling capability of the plant. To address this safety issue, in-vessel downstream effect tests for the advanced power reactor (APR) 1400 were performed. Fibrous debris is the most crucial material in terms of causing pressure drops, and was prepared in this study to satisfy the fiber length distribution obtained through a strainer bypass test. Sensitivity studies on pressure drops through LOCA-generated debris deposited on a fuel assembly were performed to evaluate the effects of water chemistry and fiber length distribution. The pressure drops with debris laden pure water were substantially less than those with debris laden ordinary tap water. The experiment with fiber length distribution suggested by WCAP-16793 showed lower pressure drops than those with the APR1400 specific fiber length distribution. All the experimental results showed that the pressure drops in the mock-up fuel assembly were less than the available driving head at each LOCA scenario.

  6. Modeling pressure drop of inclined flow through a heat exchanger for aero-engine applications

    International Nuclear Information System (INIS)

    Missirlis, D.; Yakinthos, K.; Storm, P.; Goulas, A.

    2007-01-01

    In the present work further numerical predictions for the flow field through a specific type of a heat exchanger, which is planned to be used in the exhaust nozzle of aircraft engines. In order to model the flow field through the heat exchanger, a porous medium model is used based on a simple quadratic relation, which connects the pressure drop with the inlet air velocity in the external part of the heat exchanger. The aim of this work is to check the applicability of the quadratic law in a variety of velocity inlet conditions configured by different angles of attack. The check is performed with CFD and the results are compared with new available experimental data for these inlet conditions. A detailed qualitative analysis shows that although the quadratic law has been derived for a zero angle of attack, it performs very well for alternative non-zero angles. These observations are very helpful since this simple pressure drop law can be used for advanced computations where the whole system of the exhaust nozzle together with the heat exchangers can be modeled within a holistic approach

  7. Sound Wave Energy Resulting from the Impact of Water Drops on the Soil Surface.

    Science.gov (United States)

    Ryżak, Magdalena; Bieganowski, Andrzej; Korbiel, Tomasz

    2016-01-01

    The splashing of water drops on a soil surface is the first step of water erosion. There have been many investigations into splashing-most are based on recording and analysing images taken with high-speed cameras, or measuring the mass of the soil moved by splashing. Here, we present a new aspect of the splash phenomenon's characterization the measurement of the sound pressure level and the sound energy of the wave that propagates in the air. The measurements were carried out for 10 consecutive water drop impacts on the soil surface. Three soils were tested (Endogleyic Umbrisol, Fluvic Endogleyic Cambisol and Haplic Chernozem) with four initial moisture levels (pressure heads: 0.1 kPa, 1 kPa, 3.16 kPa and 16 kPa). We found that the values of the sound pressure and sound wave energy were dependent on the particle size distribution of the soil, less dependent on the initial pressure head, and practically the same for subsequent water drops (from the first to the tenth drop). The highest sound pressure level (and the greatest variability) was for Endogleyic Umbrisol, which had the highest sand fraction content. The sound pressure for this soil increased from 29 dB to 42 dB with the next incidence of drops falling on the sample The smallest (and the lowest variability) was for Fluvic Endogleyic Cambisol which had the highest clay fraction. For all experiments the sound pressure level ranged from ~27 to ~42 dB and the energy emitted in the form of sound waves was within the range of 0.14 μJ to 5.26 μJ. This was from 0.03 to 1.07% of the energy of the incident drops.

  8. Sound Wave Energy Resulting from the Impact of Water Drops on the Soil Surface.

    Directory of Open Access Journals (Sweden)

    Magdalena Ryżak

    Full Text Available The splashing of water drops on a soil surface is the first step of water erosion. There have been many investigations into splashing-most are based on recording and analysing images taken with high-speed cameras, or measuring the mass of the soil moved by splashing. Here, we present a new aspect of the splash phenomenon's characterization the measurement of the sound pressure level and the sound energy of the wave that propagates in the air. The measurements were carried out for 10 consecutive water drop impacts on the soil surface. Three soils were tested (Endogleyic Umbrisol, Fluvic Endogleyic Cambisol and Haplic Chernozem with four initial moisture levels (pressure heads: 0.1 kPa, 1 kPa, 3.16 kPa and 16 kPa. We found that the values of the sound pressure and sound wave energy were dependent on the particle size distribution of the soil, less dependent on the initial pressure head, and practically the same for subsequent water drops (from the first to the tenth drop. The highest sound pressure level (and the greatest variability was for Endogleyic Umbrisol, which had the highest sand fraction content. The sound pressure for this soil increased from 29 dB to 42 dB with the next incidence of drops falling on the sample The smallest (and the lowest variability was for Fluvic Endogleyic Cambisol which had the highest clay fraction. For all experiments the sound pressure level ranged from ~27 to ~42 dB and the energy emitted in the form of sound waves was within the range of 0.14 μJ to 5.26 μJ. This was from 0.03 to 1.07% of the energy of the incident drops.

  9. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    Science.gov (United States)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  10. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  11. Increased Morbidity and Mortality in Domestic Animals Eating Dropped and Bitten Fruit in Bangladeshi Villages: Implications for Zoonotic Disease Transmission.

    Science.gov (United States)

    Openshaw, John J; Hegde, Sonia; Sazzad, Hossain M S; Khan, Salah Uddin; Hossain, M Jahangir; Epstein, Jonathan H; Daszak, Peter; Gurley, Emily S; Luby, Stephen P

    2016-03-01

    We used data on feeding practices and domestic animal health gathered from 207 Bangladeshi villages to identify any association between grazing dropped fruit found on the ground or owners directly feeding bat- or bird-bitten fruit and animal health. We compared mortality and morbidity in domestic animals using a mixed effects model controlling for village clustering, herd size, and proxy measures of household wealth. Thirty percent of household heads reported that their animals grazed on dropped fruit and 20% reported that they actively fed bitten fruit to their domestic herds. Household heads allowing their cattle to graze on dropped fruit were more likely to report an illness within their herd (adjusted prevalence ratio 1.17, 95% CI 1.02-1.31). Household heads directly feeding goats bitten fruit were more likely to report illness (adjusted prevalence ratio 1.35, 95% CI 1.16-1.57) and deaths (adjusted prevalence ratio 1.64, 95% CI 1.13-2.4). Reporting of illnesses and deaths among goats rose as the frequency of feeding bitten fruit increased. One possible explanation for this finding is the transmission of bat pathogens to domestic animals via bitten fruit consumption.

  12. Drop jumping. II. The influence of dropping height on the biomechanics of drop jumping

    NARCIS (Netherlands)

    Bobbert, M F; Huijing, P A; van Ingen Schenau, G J

    In the literature, athletes preparing for explosive activities are recommended to include drop jumping in their training programs. For the execution of drop jumps, different techniques and different dropping heights can be used. This study was designed to investigate for the performance of bounce

  13. First drop dissimilarity in drop-on-demand inkjet devices

    International Nuclear Information System (INIS)

    Famili, Amin; Palkar, Saurabh A.; Baldy, William J. Jr.

    2011-01-01

    As inkjet printing technology is increasingly applied in a broader array of applications, careful characterization of its method of use is critical due to its inherent sensitivity. A common operational mode in inkjet technology known as drop-on-demand ejection is used as a way to deliver a controlled quantity of material to a precise location on a target. This method of operation allows ejection of individual or a sequence (burst) of drops based on a timed trigger event. This work presents an examination of sequences of drops as they are ejected, indicating a number of phenomena that must be considered when designing a drop-on-demand inkjet system. These phenomena appear to be driven by differences between the first ejected drop in a burst and those that follow it and result in a break-down of the linear relationship expected between driving amplitude and drop mass. This first drop, as quantified by high-speed videography and subsequent image analysis, can be different in morphology, trajectory, velocity, and volume from subsequent drops within a burst. These findings were confirmed orthogonally by both volume and mass measurement techniques which allowed quantitation down to single drops.

  14. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  15. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  16. Severe pain as a possible cause of dropped head syndrome that was attenuated after amputation of an ischemic lower limb.

    Science.gov (United States)

    Maki, Satoshi; Koda, Masao; Furuya, Takeo; Takahashi, Kazuhisa; Yamazaki, Masashi

    2016-03-02

    Dropped head syndrome (DHS) is defined as weakness of the neck extensor muscles causing a correctable chin-on-the-chest deformity. Here we report the case of a patient with severe pain from lower leg ischemia showing DHS whose symptoms were attenuated by pain relief after amputation of the severely ischemic lower leg. To our knowledge this is the first report indicating that severe pain can cause DHS. A 64-year-old Asian woman was referred to our department with a 1-month history of DHS. She also suffered from severe right foot pain because of limb ischemia. She began to complain of DHS as her gangrenous foot pain worsened. She had neck pain and difficulty with forward gaze. We found no clinical or laboratory findings of neuromuscular disorder or isolated neck extensor myopathy. We amputated her leg below the knee because of progressive foot gangrene. Her severe foot pain resolved after the surgery and her DHS was attenuated. Severe pain can cause DHS. If a patient with DHS has severe pain in another part of the body, we recommend considering aggressive pain relief as a treatment option.

  17. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  18. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  19. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  20. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  1. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  2. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  3. Drop Impact Dynamics with Sessile Drops and Geometries: Spreading, Jetting, and Fragmentation

    Science.gov (United States)

    Tilger, Christopher F.

    The tendency of surface tension to cause small parcels of fluid to form into drops allows convenient packaging, transport, dispersal of liquid phase matter. Liquid drop impacts with solids, liquids, and other drops have realized and additional future applications in biological, manufacturing, heat transfer, and combustion systems. Experiments were conducted to investigate the dynamics of multiple drop collisions, rather than the most-studied phenomenon of single drop impacts. Additional drop impacts were performed on rigid hemispheres representing sessile drops, angled substrates, and into the vertex of two tilted surfaces arranged into a vee shape. A qualitative inspection of drop-sessile drop impacts shows distinct post-impact shapes depending on the offset distance between the drops. At intermediate offset distances, distinct jets issue from the overlap region between the two drops projected areas. These jets are observed to reach their maximum extent at a critical offset distance ratio, epsilon epsilon ˜ 0.75-0.80, with substrate contact angle and W e having a lesser effect. Capillary waves that traverse the sessile drop after collision cause a lower aspect ratio liquid column to emanate from the sessile drop opposite the impact. In order to better understand the jetting phenomenon seen in the offset drop-sessile drop impacts, simpler solid geometries are investigated that elicit a similar behavior. Solid hemispheres do not show the singular jetting observed in the fluidic case, however, a simple vee formed by two intersection planar substrates do jet in a similar fashion to the fluidic case. A geometric model with partnered experiments is developed to describe the bisymmetric spread of an impacting drop on an angled substrate. This geometric model is used to guide a time of arrival based model for various features of the drop impact, which is used to predict jetting in various vee channel experiments.

  4. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  5. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  6. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  7. Constor registered full-scale prototype drop test and measuring program

    International Nuclear Information System (INIS)

    Koenig, S.; Diersch, R.; Quercetti, T.

    2004-01-01

    The CONSTOR registered steel-sandwich cask was developed as a cost-effective design by using conventional mechanical engineering technologies and commonly available materials. The CONSTOR registered consists of a cask body with an outer and an inner liner made of steel. At the upper end, the liners are welded to a ring made of forged steel. The space between the two liners is filled with heavy concrete named CONSTORIT for additional gamma and neutron shielding. The CONSTORIT consists of an iron aggregate frame and hardened cement paste. The liners of the cask and the forged head ring form the basis for the structural integrity, the CONSTORIT bears only a menial part of accident loads. The CONSTOR registered concept fulfils both the internationally valid IAEA criteria for transportation and the requirements for long-term intermediate storage in the US and various European countries. Since the beginning of the development of the CONSTOR registered design in the early nineties, two drop test series with half-scale models have already been performed. A full-scale model of a CONSTOR registered V for BWR inventory has been manufactured for the third drop test program starting in 2004, and will be presented in a first 9-meter drop test on the BAM drop test facility at Horstwalde near Berlin during the PATRAM 2004 Symposium. The transport package consists of a cask with a dummy basket, a puncture-resistant jacket and two impact limiters

  8. Pressure-Drop Considerations in the Characterization of Dew-Point Transfer Standards at High Temperatures

    Science.gov (United States)

    Mitter, H.; Böse, N.; Benyon, R.; Vicente, T.

    2012-09-01

    During calibration of precision optical dew-point hygrometers (DPHs), it is usually necessary to take into account the pressure drop induced by the gas flow between the "point of reference" and the "point of use" (mirror or measuring head of the DPH) either as a correction of the reference dew-point temperature or as part of the uncertainty estimation. At dew-point temperatures in the range of ambient temperature and below, it is sufficient to determine the pressure drop for the required gas flow, and to keep the volumetric flow constant during the measurements. In this case, it is feasible to keep the dry-gas flow into the dew-point generator constant or to measure the flow downstream the DPH at ambient temperature. In normal operation, at least one DPH in addition to the monitoring DPH are used, and this operation has to be applied to each instrument. The situation is different at high dew-point temperatures up to 95 °C, the currently achievable upper limit reported in this paper. With increasing dew-point temperatures, the reference gas contains increasing amounts of water vapour and a constant dry-gas flow will lead to a significant enhanced volume flow at the conditions at the point of use, and therefore, to a significantly varying pressure drop depending on the applied dew-point temperature. At dew-point temperatures above ambient temperature, it is also necessary to heat the reference gas and the mirror head of the DPH sufficiently to avoid condensation which will additionally increase the volume flow and the pressure drop. In this paper, a method is provided to calculate the dry-gas flow rate needed to maintain a known wet-gas flow rate through a chilled mirror for a range of temperature and pressures.

  9. Two-headed butterfly vs. mantis: do false antennae matter?

    Directory of Open Access Journals (Sweden)

    Tania G. López-Palafox

    2017-06-01

    Full Text Available The colour patterns and morphological peculiarities of the hindwings of several butterfly species result in the appearance of a head at the rear end of the insect’s body. Although some experimental evidence supports the hypothesis that the “false head” deflects predator attacks towards the rear end of the butterfly, more research is needed to determine the role of the different components of the “false head”. We explored the role of hindwing tails (presumably mimicking antennae in predator deception in the “false head” butterfly Callophrys xami. We exposed butterflies with intact wings and with hindwing tails experimentally ablated to female mantises (Stagmomantis limbata. We found no differences in the number of butterflies being attacked and the number of butterflies escaping predation between both groups. However, our behavioural observations indicate that other aspects of the “false head” help C. xami survive some mantis attacks, supporting the notion that they are adaptations against predators.

  10. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  11. The exploding head syndrome: polysomnographic recordings and therapeutic suggestions.

    Science.gov (United States)

    Sachs, C; Svanborg, E

    1991-06-01

    Attention has recently been drawn to a condition termed the exploding head syndrome, which is characterized by unpleasant, even terrifying sensations of flashing lights and/or sounds during reported sleep. Nine patients complaining of sensations of explosions in the head during sleep or drowsiness were investigated with polysomnographic recordings. None of them had any neurological disorder. Five patients reported explosions during the recording sessions. According to the recordings, the attacks always took place when the patients were awake and relaxed. In two cases abrupt electroencephalographic (EEG) and electromyographic changes indicating increasing alertness were recorded at the time of the reported attacks. In the remaining three cases no EEG changes were seen. Thus, there were no indications of an epileptic etiology to the condition. In all patients the symptoms ameliorated spontaneously with time. The severity of the symptoms was reduced by reassurance of the harmlessness of the condition. Clomipramine was prescribed to three patients who all reported immediate relief of symptoms. It is concluded that symptoms of this type are probably not true hypnagogic phenomena but may be an expression of emotional stress in the awake state.

  12. Elemental Water Impact Test: Phase 2 36-Inch Aluminum Tank Head

    Science.gov (United States)

    Vassilakos, Gregory J.

    2014-01-01

    Spacecraft are being designed based on LS-DYNA simulations of water landing impacts. The Elemental Water Impact Test (EWIT) series was undertaken to assess the accuracy of LS-DYNA water impact simulations. EWIT Phase 2 featured a 36-inch aluminum tank head. The tank head was outfitted with one accelerometer, twelve pressure transducers, three string potentiometers, and four strain gages. The tank head was dropped from heights of 1 foot and 2 feet. The focus of this report is the correlation of analytical models against test data. As a measure of prediction accuracy, peak responses from the baseline LS-DYNA model were compared to peak responses from the tests.

  13. Antipredatory function of head shape for vipers and their mimics.

    Directory of Open Access Journals (Sweden)

    Janne K Valkonen

    Full Text Available Most research into the adaptive significance of warning signals has focused on the colouration and patterns of prey animals. However, behaviour, odour and body shape can also have signal functions and thereby reduce predators' willingness to attack defended prey. European vipers all have a distinctive triangular head shape; and they are all venomous. Several non-venomous snakes, including the subfamily Natricinae, commonly flatten their heads (also known as head triangulation when disturbed. The adaptive significance of this potential behavioural mimicry has never been investigated.We experimentally tested if the triangular head shape typical of vipers offers protection against predation. We compared the predation pressure of free-ranging predators on artificial snakes with triangular-shaped heads against the pressure on replicas with narrow heads. Snakes of both head types had either zigzag patterned bodies, typical of European vipers, or plain (patternless bodies. Plain snakes with narrower Colubrid-like heads suffered significantly higher predation by raptors than snakes with triangular-shaped heads. Head shape did not, however, have an additive effect on survival in zigzag-patterned snakes, suggesting that species which differ from vipers in colouration and pattern would benefit most from behavioural mimicry. Our results demonstrate that the triangular head shape typical of vipers can act as a warning signal to predators. We suggest that head-shape mimicry may be a more common phenomenon among more diverse taxa than is currently recognised.

  14. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  15. Pathological Features of Fatal Crocodile Attacks in Northern Australia, 2005-2014.

    Science.gov (United States)

    Sinton, Terence J; Byard, Roger W

    2016-11-01

    Eleven deaths from crocodile attacks in the Northern Territory, Australia were reviewed. The male:female ratio was 8:3; age range-10-62 years, average 29.4 years. Four children were included (one boy and three girls, aged 10, 11, and two at 12 years), and there were seven aboriginal victims (64%). The attacks were witnessed in eight cases with the victims swimming in freshwater N = 5, standing on a river bank N = 1, fishing in fresh water N = 1, or diving in the sea N = 1. At autopsy, several distinct patterns of injury were observed ranging from complete traumatic disruption of the body with only incomplete remains for examination (N = 5), to crushing of the head with fractures of the skull (N = 4), crushing of the chest with fractures of the ribs and sternum (N = 2), and avulsion of limbs (N = 4). In one case, there was decapitation. Autopsy evaluations were complicated by decomposition and loss of body parts. © 2016 American Academy of Forensic Sciences.

  16. Computational fluid dynamic analysis of a closure head penetration in a pressurized water reactor

    Energy Technology Data Exchange (ETDEWEB)

    Forsyth, D.R.; Schwirian, R.E. [Westinghouse Electric Corp., Pittsburgh, PA (United States)

    1995-09-01

    ALLOY 600 has been used typically for penetrations through the closure head in pressurized water reactors because of its thermal compatibility with carbon steel, superior resistance to chloride attack and higher strength than the austenitic stainless steels. Recent plant operating experience with this alloy has indicated that this material may be susceptible to degradation. One of the major parameters relating to degradation of the head penetrations are the operational temperatures and stress levels in the penetration.

  17. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  18. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  19. Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae?

    Directory of Open Access Journals (Sweden)

    Rafael Braga da Silva

    2012-06-01

    Full Text Available Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae? The stink bug Supputius cincticeps (Stål (Hemiptera, Pentatomidae is a predator found in several Brazilian regions, which possesses desirable attributes as a natural control agent and in biological control programs. The aim of this study was to test if the attack behavior and predation success of S. cincticeps were affected by prey species. Larvae of Tenebrio molitor (L. (Coleoptera, Tenebrionidae, Spodoptera frugiperda (J. E. Smith (Lepidoptera, Noctuidae, and Thyrinteina arnobia (Stoll (Lepidoptera, Geometridae were offered to S. cincticeps in laboratory bioassays where predatory attack and prey defensive behaviors were observed for 2-hour periods. The attack behavior of S. cincticeps changed with the prey species offered. More than 25% of T. molitor and S. frugiperda larvae were immediately attacked, but T. arnobia was not immediately attacked by S. cincticeps. Successful attack (i.e., successful insertion of the predator stylets into the prey depends on the region of the body attacked, with a greater proportion of successful attacks in the anterior than in the median or posterior regions. Larvae of T. arnobia and S. frugiperda displayed a sequence of abrupt head and body movements in response to S. cincticeps attack. Attempts of predation were more successful on T. molitor and S. frugiperda than on T. arnobia. Information about the differential attack behavior of S. cincticeps on different prey species is important for designing successful biological control programs using this hemipteran predator.

  20. Clinical Symptoms of Minor Head Trauma and Abnormal Computed Tomography Scan

    Directory of Open Access Journals (Sweden)

    Maghsoudi

    2015-11-01

    Full Text Available Background Minor head trauma accounts for 70% to 90% of all head traumas. Previous studies stated that minor head traumas were associated with 7% - 20% significant abnormal findings in brain computed tomography (CT-scans. Objectives The aim of this study was to reevaluate clinical criteria of taking brain CT scan in patients who suffered from minor head trauma. Patients and Methods We enrolled 680 patients presented to an academic trauma hospital with minor head trauma in a prospective manner. All participants underwent brain CT scan if they met the inclusion criteria and the results of scans were compared with clinical examination finding. Results Loss of consciousness (GCS drop or amnesia was markedly associated with abnormal brain CT scan (P < 0.05. Interestingly, we found 7 patients with normal clinical examination but significant abnormal brain CT scan. Conclusions According to the results of our study, we recommend that all patients with minor head trauma underwent brain CT scan in order not to miss any life-threatening head injuries.

  1. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  2. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  3. [Optimize dropping process of Ginkgo biloba dropping pills by using design space approach].

    Science.gov (United States)

    Shen, Ji-Chen; Wang, Qing-Qing; Chen, An; Pan, Fang-Lai; Gong, Xing-Chu; Qu, Hai-Bin

    2017-07-01

    In this paper, a design space approach was applied to optimize the dropping process of Ginkgo biloba dropping pills. Firstly, potential critical process parameters and potential process critical quality attributes were determined through literature research and pre-experiments. Secondly, experiments were carried out according to Box-Behnken design. Then the critical process parameters and critical quality attributes were determined based on the experimental results. Thirdly, second-order polynomial models were used to describe the quantitative relationships between critical process parameters and critical quality attributes. Finally, a probability-based design space was calculated and verified. The verification results showed that efficient production of Ginkgo biloba dropping pills can be guaranteed by operating within the design space parameters. The recommended operation ranges for the critical dropping process parameters of Ginkgo biloba dropping pills were as follows: dropping distance of 5.5-6.7 cm, and dropping speed of 59-60 drops per minute, providing a reference for industrial production of Ginkgo biloba dropping pills. Copyright© by the Chinese Pharmaceutical Association.

  4. Lambda-dropping

    DEFF Research Database (Denmark)

    Danvy, Olivier; Schultz, Ulrik Pagh

    1997-01-01

    Lambda-lifting a functional program transforms it into a set of recursive equations. We present the symmetric transformation: lambda-dropping. Lambda-dropping a set of recursive equations restores block structure and lexical scope.For lack of scope, recursive equations must carry around all...... the parameters that any of their callees might possibly need. Both lambda-lifting and lambda-dropping thus require one to compute a transitive closure over the call graph:• for lambda-lifting: to establish the Def/Use path of each free variable (these free variables are then added as parameters to each...... of the functions in the call path);• for lambda-dropping: to establish the Def/Use path of each parameter (parameters whose use occurs in the same scope as their definition do not need to be passed along in the call path).Without free variables, a program is scope-insensitive. Its blocks are then free...

  5. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  6. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ranjeeth Kumar Sundararajan

    2015-01-01

    Full Text Available In wireless sensor network (WSN, the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

  7. Investigation on the relation between pressure drops and fluid chemical treatment

    International Nuclear Information System (INIS)

    Brun, C.; Engler, N.; Berthollon, G.; Muller, T.; Sala, B.; Combrade, P.; Turluer, G.

    2002-01-01

    Variations of primary coolant flow rate were sometimes observed on some plants some years ago. These variations come from variations of pressure drops in the various zones of the primary system. After many investigations, these changes were attributed to variations of physical and chemical conditions. One specific difficulty was to explain the level of head loss variations with the low amount of oxide present in a primary circuit. Another one was to account for the formation of deposits under high water velocity conditions. Therefore, Framatome-ANP launched laboratory tests to reproduce the observed head loss variations, identify the conditions of their occurrence and try to identify the root mechanisms. A small loop - called EMILIE - was implemented in the laboratories of the Technical Centre of Framatome-ANP in Le Creusot. It allows us to study the effect of the water chemistry and velocity, as well as the nature of the circuit surfaces on the occurrence of head loss variations and their relation with the amount, nature and morphology of oxide deposits. This paper summarizes the first results obtained and briefly discusses a possible mechanism. (authors)

  8. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  9. On the extraordinary strength of Prince Rupert's drops

    Science.gov (United States)

    Aben, H.; Anton, J.; Öis, M.; Viswanathan, K.; Chandrasekar, S.; Chaudhri, M. M.

    2016-12-01

    Prince Rupert's drops (PRDs), also known as Batavian tears, have been in existence since the early 17th century. They are made of a silicate glass of a high thermal expansion coefficient and have the shape of a tadpole. Typically, the diameter of the head of a PRD is in the range of 5-15 mm and that of the tail is 0.5 to 3.0 mm. PRDs have exceptional strength properties: the head of a PRD can withstand impact with a small hammer, or compression between tungsten carbide platens to high loads of ˜15 000 N, but the tail can be broken with just finger pressure leading to catastrophic disintegration of the PRD. We show here that the high strength of a PRD comes from large surface compressive stresses in the range of 400-700 MPa, determined using techniques of integrated photoelasticity. The surface compressive stresses can suppress Hertzian cone cracking during impact with a small hammer or compression between platens. Finally, it is argued that when the compressive force on a PRD is very high, plasticity in the PRD occurs, which leads to its eventual destruction with increasing load.

  10. Marginal eyespots on butterfly wings deflect bird attacks under low light intensities with UV wavelengths.

    Directory of Open Access Journals (Sweden)

    Martin Olofsson

    2010-05-01

    Full Text Available Predators preferentially attack vital body parts to avoid prey escape. Consequently, prey adaptations that make predators attack less crucial body parts are expected to evolve. Marginal eyespots on butterfly wings have long been thought to have this deflective, but hitherto undemonstrated function.Here we report that a butterfly, Lopinga achine, with broad-spectrum reflective white scales in its marginal eyespot pupils deceives a generalist avian predator, the blue tit, to attack the marginal eyespots, but only under particular conditions-in our experiments, low light intensities with a prominent UV component. Under high light intensity conditions with a similar UV component, and at low light intensities without UV, blue tits directed attacks towards the butterfly head.In nature, birds typically forage intensively at early dawn, when the light environment shifts to shorter wavelengths, and the contrast between the eyespot pupils and the background increases. Among butterflies, deflecting attacks is likely to be particularly important at dawn when low ambient temperatures make escape by flight impossible, and when insectivorous birds typically initiate another day's search for food. Our finding that the deflective function of eyespots is highly dependent on the ambient light environment helps explain why previous attempts have provided little support for the deflective role of marginal eyespots, and we hypothesize that the mechanism that we have discovered in our experiments in a laboratory setting may function also in nature when birds forage on resting butterflies under low light intensities.

  11. Marginal eyespots on butterfly wings deflect bird attacks under low light intensities with UV wavelengths.

    Science.gov (United States)

    Olofsson, Martin; Vallin, Adrian; Jakobsson, Sven; Wiklund, Christer

    2010-05-24

    Predators preferentially attack vital body parts to avoid prey escape. Consequently, prey adaptations that make predators attack less crucial body parts are expected to evolve. Marginal eyespots on butterfly wings have long been thought to have this deflective, but hitherto undemonstrated function. Here we report that a butterfly, Lopinga achine, with broad-spectrum reflective white scales in its marginal eyespot pupils deceives a generalist avian predator, the blue tit, to attack the marginal eyespots, but only under particular conditions-in our experiments, low light intensities with a prominent UV component. Under high light intensity conditions with a similar UV component, and at low light intensities without UV, blue tits directed attacks towards the butterfly head. In nature, birds typically forage intensively at early dawn, when the light environment shifts to shorter wavelengths, and the contrast between the eyespot pupils and the background increases. Among butterflies, deflecting attacks is likely to be particularly important at dawn when low ambient temperatures make escape by flight impossible, and when insectivorous birds typically initiate another day's search for food. Our finding that the deflective function of eyespots is highly dependent on the ambient light environment helps explain why previous attempts have provided little support for the deflective role of marginal eyespots, and we hypothesize that the mechanism that we have discovered in our experiments in a laboratory setting may function also in nature when birds forage on resting butterflies under low light intensities.

  12. Controlling charge on levitating drops.

    Science.gov (United States)

    Hilger, Ryan T; Westphall, Michael S; Smith, Lloyd M

    2007-08-01

    Levitation technologies are used in containerless processing of materials, as microscale manipulators and reactors, and in the study of single drops and particles. Presented here is a method for controlling the amount and polarity of charge on a levitating drop. The method uses single-axis acoustic levitation to trap and levitate a single, initially neutral drop with a diameter between 400 microm and 2 mm. This drop is then charged in a controllable manner using discrete packets of charge in the form of charged drops produced by a piezoelectric drop-on-demand dispenser equipped with a charging electrode. The magnitude of the charge on the dispensed drops can be adjusted by varying the voltage applied to the charging electrode. The polarity of the charge on the added drops can be changed allowing removal of charge from the trapped drop (by neutralization) and polarity reversal. The maximum amount of added charge is limited by repulsion of like charges between the drops in the trap. This charging scheme can aid in micromanipulation and the study of charged drops and particles using levitation.

  13. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  17. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Heatup of the TMI-2 lower head during core relocation

    International Nuclear Information System (INIS)

    Wang, S.K.; Sienicki, J.J.; Spencer, B.W.

    1989-01-01

    An analysis has been carried out to assess the potential of a melting attack upon the reactor vessel lower head and incore instrument nozzle penetration weldments during the TMI core relocation event at 224 minutes. Calculations were performed to determine the potential for molten corium to undergo breakup into droplets which freeze and form a debris bed versus impinging upon the lower head as one or more coherent streams. The effects of thermal-hydraulic interactions between corium streams and water inside the lower plenum, the effects of the core support assembly structure upon the corium, and the consequences of corium relocation by way of the core former region were examined. 19 refs., 24 figs

  19. Predation by the Dwarf Seahorse on Copepods: Quantifying Motion and Flows Using 3D High Speed Digital Holographic Cinematography - When Seahorses Attack!

    Science.gov (United States)

    Gemmell, Brad; Sheng, Jian; Buskey, Ed

    2008-11-01

    Copepods are an important planktonic food source for most of the world's fish species. This high predation pressure has led copepods to evolve an extremely effective escape response, with reaction times to hydrodynamic disturbances of less than 4 ms and escape speeds of over 500 body lengths per second. Using 3D high speed digital holographic cinematography (up to 2000 frames per second) we elucidate the role of entrainment flow fields generated by a natural visual predator, the dwarf seahorse (Hippocampus zosterae) during attacks on its prey, Acartia tonsa. Using phytoplankton as a tracer, we recorded and reconstructed 3D flow fields around the head of the seahorse and its prey during both successful and unsuccessful attacks to better understand how some attacks lead to capture with little or no detection from the copepod while others result in failed attacks. Attacks start with a slow approach to minimize the hydro-mechanical disturbance which is used by copepods to detect the approach of a potential predator. Successful attacks result in the seahorse using its pipette-like mouth to create suction faster than the copepod's response latency. As these characteristic scales of entrainment increase, a successful escape becomes more likely.

  20. Dynamics of deforming drops

    OpenAIRE

    Bouwhuis, W.

    2015-01-01

    Liquid drops play a dominant role in numerous industrial applications, such as spray coating, spray painting, inkjet printing, lithography processes, and spraying/sprinkling in agriculture or gardening. In all of these examples, the generation, flight, impact, and spreading of drops are separate stages of the corresponding industrial processes, which are all thoroughly studied for many years. This thesis focuses on drop dynamics, impact phenomena, Leidenfrost drops, and pouring flows. Based o...

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Scanning drop sensor

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Jian; Xiang, Chengxiang; Gregoire, John

    2017-05-09

    Electrochemical experiments are performed on a collection of samples by suspending a drop of electrolyte solution between an electrochemical experiment probe and one of the samples that serves as a test sample. During the electrochemical experiment, the electrolyte solution is added to the drop and an output solution is removed from the drop. The probe and collection of samples can be moved relative to one another so the probe can be scanned across the samples.

  3. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  4. Understanding evaporation characteristics of a drop of distilled sulfur mustard (HD) chemical agent from stainless steel and aluminum substrates

    Energy Technology Data Exchange (ETDEWEB)

    Jung, H., E-mail: junghs@add.re.kr; Lee, H.W.

    2014-05-01

    Highlights: • Evaporation rates of HD are obtained from stainless steel and aluminum substrates. • The rates increase with temperature and are linearly proportional to drop size. • HD evaporation from stainless steel follows only constant contact area mechanism. • HD evaporation from aluminum proceeds by a combined mechanism. - Abstract: We report herein the evaporation rates and mechanism of a drop of distilled sulfur mustard (HD) agent from stainless steel and aluminum substrates. For systematic analysis, we used a laboratory-sized wind tunnel, thermal desorption (TD) connected to gas chromatograph/mass spectrometry (GC/MS) and drop shape analysis (DSA). We found that the evaporation rates of HD from stainless steel and aluminum increased with temperature. The rates were also linearly proportional to drop size. The time-dependent contact angle measurement showed that the evaporation of the drop of HD proceeded only by constant contact area mechanism from stainless steel surface. On the other hand, the evaporation of HD from aluminum proceeded by a combined mechanism of constant contact area mode and constant contact angle mode. Our experimental data sets and analysis could be used to predict vapor and contact hazard persistence of chemical warfare agents (CWAs) in the air and on exterior surfaces with chemical releases, which assists the military decision influencing personnel safety and decontamination of the site upon a chemical attack event.

  5. Understanding evaporation characteristics of a drop of distilled sulfur mustard (HD) chemical agent from stainless steel and aluminum substrates

    International Nuclear Information System (INIS)

    Jung, H.; Lee, H.W.

    2014-01-01

    Highlights: • Evaporation rates of HD are obtained from stainless steel and aluminum substrates. • The rates increase with temperature and are linearly proportional to drop size. • HD evaporation from stainless steel follows only constant contact area mechanism. • HD evaporation from aluminum proceeds by a combined mechanism. - Abstract: We report herein the evaporation rates and mechanism of a drop of distilled sulfur mustard (HD) agent from stainless steel and aluminum substrates. For systematic analysis, we used a laboratory-sized wind tunnel, thermal desorption (TD) connected to gas chromatograph/mass spectrometry (GC/MS) and drop shape analysis (DSA). We found that the evaporation rates of HD from stainless steel and aluminum increased with temperature. The rates were also linearly proportional to drop size. The time-dependent contact angle measurement showed that the evaporation of the drop of HD proceeded only by constant contact area mechanism from stainless steel surface. On the other hand, the evaporation of HD from aluminum proceeded by a combined mechanism of constant contact area mode and constant contact angle mode. Our experimental data sets and analysis could be used to predict vapor and contact hazard persistence of chemical warfare agents (CWAs) in the air and on exterior surfaces with chemical releases, which assists the military decision influencing personnel safety and decontamination of the site upon a chemical attack event

  6. Scanning drop sensor

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Jian; Xiang, Chengxiang; Gregoire, John M.; Shinde, Aniketa A.; Guevarra, Dan W.; Jones, Ryan J.; Marcin, Martin R.; Mitrovic, Slobodan

    2017-05-09

    Electrochemical or electrochemical and photochemical experiments are performed on a collection of samples by suspending a drop of electrolyte solution between an electrochemical experiment probe and one of the samples that serves as a test sample. During the electrochemical experiment, the electrolyte solution is added to the drop and an output solution is removed from the drop. The probe and collection of samples can be moved relative to one another so the probe can be scanned across the samples.

  7. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  8. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  9. [Ultrastructural changes of myelinated fibers in the brain in continuous and attack-like paranoid schizophrenia].

    Science.gov (United States)

    Uranova, N A; Kolomeets, N S; Vikhreva, O V; Zimina, I S; Rakhmanova, V I; Orlovskaya, D D

    Previously the authors have reported the ultrastructural pathology of myelinated fibers (MF) in the brain in schizophrenia. The aim of the present study was to compare the effect of disease course on ultrastructural changes of MF. Postmortem electron microscopic morphometric study of MF was performed in the prefrontal cortex, caudate nucleus and hippocampus in 19 cases of paranoid schizophrenia. Fourteen cases of continuous schizophrenia, 5 cases of attack-like schizophrenia and 25 normal matched control cases were studied. The proportion (percentage) of pathological MF was estimated in the prefrontal cortex, layer 5, CA3 area of hippocampus, pyramidal layer, and in the head of the caudate nucleus. The percentage of MF having axonal atrophy and swelling of periaxonal oligodendrocyte process was significantly higher in both continuous and attack-like schizophrenia in all brain structures studied as compared to the control group. In the hippocampus and caudate nucleus, this parameter was increased significantly in attack-like schizophrenia as compared to continuous schizophrenia. In the prefrontal cortex. The percentage of the pathological MF having signs of deformation and destruction of myelin sheaths increased significantly only in continuous schizophrenia as compared to the control group. MF pathology is similar in attack-like and continuous paranoid schizophrenia but differ by the degree of severity of pathological MF. Abnormalities in MF contribute to the disconnectivity between the prefrontal cortex, caudate nucleus and hippocampus.

  10. Predicting brain acceleration during heading of soccer ball

    Science.gov (United States)

    Taha, Zahari; Hasnun Arif Hassan, Mohd; Azri Aris, Mohd; Anuar, Zulfika

    2013-12-01

    There has been a long debate whether purposeful heading could cause harm to the brain. Studies have shown that repetitive heading could lead to degeneration of brain cells, which is similarly found in patients with mild traumatic brain injury. A two-degree of freedom linear mathematical model was developed to study the impact of soccer ball to the brain during ball-to-head impact in soccer. From the model, the acceleration of the brain upon impact can be obtained. The model is a mass-spring-damper system, in which the skull is modelled as a mass and the neck is modelled as a spring-damper system. The brain is a mass with suspension characteristics that are also defined by a spring and a damper. The model was validated by experiment, in which a ball was dropped from different heights onto an instrumented dummy skull. The validation shows that the results obtained from the model are in a good agreement with the brain acceleration measured from the experiment. This findings show that a simple linear mathematical model can be useful in giving a preliminary insight on what human brain endures during a ball-to-head impact.

  11. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  12. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  14. Sensing Passive Eye Response to Impact Induced Head Acceleration Using MEMS IMUs.

    Science.gov (United States)

    Meng, Yuan; Bottenfield, Brent; Bolding, Mark; Liu, Lei; Adams, Mark L

    2018-02-01

    The eye may act as a surrogate for the brain in response to head acceleration during an impact. Passive eye movements in a dynamic system are sensed by microelectromechanical systems (MEMS) inertial measurement units (IMU) in this paper. The technique is validated using a three-dimensional printed scaled human skull model and on human volunteers by performing drop-and-impact experiments with ribbon-style flexible printed circuit board IMUs inserted in the eyes and reference IMUs on the heads. Data are captured by a microcontroller unit and processed using data fusion. Displacements are thus estimated and match the measured parameters. Relative accelerations and displacements of the eye to the head are computed indicating the influence of the concussion causing impacts.

  15. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  16. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  17. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  19. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  20. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  1. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  2. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  3. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  4. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  6. Development of a project on North Unit Irrigation District’s Main Canal at the Monroe Drop, using a novel low-head hydropower technology called the SLH100

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Abraham [Natel Energy, Inc., Alameda, CA (United States); Schneider, Gia [Natel Energy, Inc., Alameda, CA (United States); McKinstry, Katherine [Natel Energy, Inc., Alameda, CA (United States); Harwood, Meghan [Natel Energy, Inc., Alameda, CA (United States)

    2017-03-14

    Natel Energy is a low­-head, distributed hydropower company based out of Alameda, CA. Natel manufactures and sells proprietary hydroelectric turbines called hydroEngines® that are suitable for low-­head, high-­flow settings, and range from 30kW to 1 MW of capacity per unit. Natel’s hydroEngine is a state­-of­the-­art two stage impulse turbine, using blades mounted symmetrically on two belts perpendicular to the axis of travel, and using linearly­-moving foils, rather than a rotor, to enable efficient conversion of kinetic energy of large volumes of water at low head with no risk of cavitation. In addition, the hydroEngine can be installed at or above tailwater level, reducing the excavation necessary to build the powerhouse and thus reducing total installed cost and project footprint. Thus, the hydroEngine technology enables a new generation of small hydro installations with low cost of project development, fish-­friendly operations, and small project footprint. In September of 2015, Natel Energy formally commissioned its first project installation in Madras, Oregon, installing 1 SLH100 turbine at an existing drop structure on the North Unit Irrigation District (NUID) Main Canal. The water falls between 13.5 feet to 16.5 feet at this structure, depending on flow. The plant has an installed capacity of 250 kW and an expected annual generation of approximately 873 MWh. The plant operates at an annual capacity factor of 40%, and a capacity factor over the irrigation season, or period of available flow, of 80%. Annual capacity factor is calculated as a percentage of plant operating hours relative to a total of 8,760 hours in a year; because the irrigation canal in which the Project is located only runs water from April to October, the available flow capacity factor is higher. Net greenhouse gas reductions from the Monroe Project are estimated to be 602 tCO2/year. The purpose of this report is to provide an overview of the specifications for Natel’s first

  7. On angled bounce-off impact of a drop impinging on a flowing soap film

    Science.gov (United States)

    Basu, Saikat; Yawar, Ali; Concha, Andres; Bandi, M. M.

    2017-12-01

    Small drops impinging obliquely on thin flowing soap films frequently demonstrate the rare emergence of bulk elastic effects working in-tandem with the more commonplace hydrodynamic interactions. Three collision regimes are observable: (a) drop piercing through the film, (b) it coalescing with the flow, and (c) it bouncing off the film surface. During impact, the drop deforms along with a bulk elastic deformation of the film. For impacts that are close-to-tangential, the bounce-off regime predominates. We outline a reduced order analytical framework assuming a deformable drop and a deformable three-dimensional film, and the idealization invokes a phase-based parametric study. Angular inclination of the film and the ratio of post and pre-impact drop sizes entail the phase parameters. We also perform experiments with vertically descending droplets (constituted from deionized water) impacting against an inclined soap film, flowing under constant pressure head. Model-predicted phase domain for bounce-off compares well to our experimental findings. Additionally, the experiments exhibit momentum transfer to the film in the form of shed vortex dipoles, along with propagation of free surface waves. On consulting prior published work, we note that for locomotion of water-walking insects using an impulsive action, the momentum distribution to the shed vortices and waves are both significant, taking up respectively 2/3 and 1/3 of the imparted streamwise momentum. Considering the visually similar impulse actions, this theory, despite its assumption of a quiescent liquid bath of infinite depth, is applied to the drop bounce-off experiments, and the resultant shed vortex dipole momenta are compared to the momenta of the coherent vortex structures computed from particle imaging velocimetry data. The magnitudes reveal identical order (10-7 N s), suggesting that notwithstanding the disparities, the bounce-off regime may be tapped as a toy analog for impulse-based interfacial

  8. Hanging drop crystal growth apparatus

    Science.gov (United States)

    Naumann, Robert J. (Inventor); Witherow, William K. (Inventor); Carter, Daniel C. (Inventor); Bugg, Charles E. (Inventor); Suddath, Fred L. (Inventor)

    1990-01-01

    This invention relates generally to control systems for controlling crystal growth, and more particularly to such a system which uses a beam of light refracted by the fluid in which crystals are growing to detect concentration of solutes in the liquid. In a hanging drop apparatus, a laser beam is directed onto drop which refracts the laser light into primary and secondary bows, respectively, which in turn fall upon linear diode detector arrays. As concentration of solutes in drop increases due to solvent removal, these bows move farther apart on the arrays, with the relative separation being detected by arrays and used by a computer to adjust solvent vapor transport from the drop. A forward scattering detector is used to detect crystal nucleation in drop, and a humidity detector is used, in one embodiment, to detect relative humidity in the enclosure wherein drop is suspended. The novelty of this invention lies in utilizing angular variance of light refracted from drop to infer, by a computer algorithm, concentration of solutes therein. Additional novelty is believed to lie in using a forward scattering detector to detect nucleating crystallites in drop.

  9. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  10. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  11. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  12. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  13. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  14. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  15. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  16. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  17. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  18. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  19. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Vibration-Induced Climbing of Drops

    Science.gov (United States)

    Brunet, P.; Eggers, J.; Deegan, R. D.

    2007-10-01

    We report an experimental study of liquid drops moving against gravity, when placed on a vertically vibrating inclined plate, which is partially wetted by the drop. The frequency of vibrations ranges from 30 to 200 Hz, and, above a threshold in vibration acceleration, drops experience an upward motion. We attribute this surprising motion to the deformations of the drop, as a consequence of an up or down symmetry breaking induced by the presence of the substrate. We relate the direction of motion to contact angle measurements. This phenomenon can be used to move a drop along an arbitrary path in a plane, without special surface treatments or localized forcing.

  2. Development, Validation and Parametric study of a 3-Year-Old Child Head Finite Element Model

    Science.gov (United States)

    Cui, Shihai; Chen, Yue; Li, Haiyan; Ruan, ShiJie

    2015-12-01

    Traumatic brain injury caused by drop and traffic accidents is an important reason for children's death and disability. Recently, the computer finite element (FE) head model has been developed to investigate brain injury mechanism and biomechanical responses. Based on CT data of a healthy 3-year-old child head, the FE head model with detailed anatomical structure was developed. The deep brain structures such as white matter, gray matter, cerebral ventricle, hippocampus, were firstly created in this FE model. The FE model was validated by comparing the simulation results with that of cadaver experiments based on reconstructing the child and adult cadaver experiments. In addition, the effects of skull stiffness on the child head dynamic responses were further investigated. All the simulation results confirmed the good biofidelity of the FE model.

  3. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  4. A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Mahmoud Khasawneh

    2017-01-01

    Full Text Available Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.

  5. Drop Tower Physics

    Science.gov (United States)

    Dittrich, William A.

    2014-01-01

    The drop towers of yesteryear were used to make lead shot for muskets, as described in "The Physics Teacher" in April 2012. However, modern drop towers are essentially elevators designed so that the cable can "break" on demand, creating an environment with microgravity for a short period of time, currently up to nine seconds at…

  6. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  7. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  8. Characterizing Verified Head Impacts in High School Girls' Lacrosse.

    Science.gov (United States)

    Caswell, Shane V; Lincoln, Andrew E; Stone, Hannah; Kelshaw, Patricia; Putukian, Margot; Hepburn, Lisa; Higgins, Michael; Cortes, Nelson

    2017-12-01

    Girls' high school lacrosse players have higher rates of head and facial injuries than boys. Research indicates that these injuries are caused by stick, player, and ball contacts. Yet, no studies have characterized head impacts in girls' high school lacrosse. To characterize girls' high school lacrosse game-related impacts by frequency, magnitude, mechanism, player position, and game situation. Descriptive epidemiology study. Thirty-five female participants (mean age, 16.2 ± 1.2 years; mean height, 1.66 ± 0.05 m; mean weight, 61.2 ± 6.4 kg) volunteered during 28 games in the 2014 and 2015 lacrosse seasons. Participants wore impact sensors affixed to the right mastoid process before each game. All game-related impacts recorded by the sensors were verified using game video. Data were summarized for all verified impacts in terms of frequency, peak linear acceleration (PLA), and peak rotational acceleration (PRA). Descriptive statistics and impact rates were calculated. Fifty-eight verified game-related impacts ≥20 g were recorded (median PLA, 33.8 g; median PRA, 6151.1 rad/s 2 ) during 467 player-games. The impact rate for all game-related verified impacts was 0.12 per athlete-exposure (AE) (95% CI, 0.09-0.16), equivalent to 2.1 impacts per team game, indicating that each athlete suffered fewer than 2 head impacts per season ≥20 g. Of these impacts, 28 (48.3%) were confirmed to directly strike the head, corresponding with an impact rate of 0.05 per AE (95% CI, 0.00-0.10). Overall, midfielders (n = 28, 48.3%) sustained the most impacts, followed by defenders (n = 12, 20.7%), attackers (n = 11, 19.0%), and goalies (n = 7, 12.1%). Goalies demonstrated the highest median PLA and PRA (38.8 g and 8535.0 rad/s 2 , respectively). The most common impact mechanisms were contact with a stick (n = 25, 43.1%) and a player (n = 17, 29.3%), followed by the ball (n = 7, 12.1%) and the ground (n = 7, 12.1%). One hundred percent of ball impacts occurred to goalies. Most impacts

  9. Dynamic Response and Residual Helmet Liner Crush Using Cadaver Heads and Standard Headforms.

    Science.gov (United States)

    Bonin, S J; Luck, J F; Bass, C R; Gardiner, J C; Onar-Thomas, A; Asfour, S S; Siegmund, G P

    2017-03-01

    Biomechanical headforms are used for helmet certification testing and reconstructing helmeted head impacts; however, their biofidelity and direct applicability to human head and helmet responses remain unclear. Dynamic responses of cadaver heads and three headforms and residual foam liner deformations were compared during motorcycle helmet impacts. Instrumented, helmeted heads/headforms were dropped onto the forehead region against an instrumented flat anvil at 75, 150, and 195 J. Helmets were CT scanned to quantify maximum liner crush depth and crush volume. General linear models were used to quantify the effect of head type and impact energy on linear acceleration, head injury criterion (HIC), force, maximum liner crush depth, and liner crush volume and regression models were used to quantify the relationship between acceleration and both maximum crush depth and crush volume. The cadaver heads generated larger peak accelerations than all three headforms, larger HICs than the International Organization for Standardization (ISO), larger forces than the Hybrid III and ISO, larger maximum crush depth than the ISO, and larger crush volumes than the DOT. These significant differences between the cadaver heads and headforms need to be accounted for when attempting to estimate an impact exposure using a helmet's residual crush depth or volume.

  10. Differential responses of cells from human skin keratinocyte and bovine mammary epithelium to attack by pore-forming Staphylococcus aureus alpha-toxin.

    Science.gov (United States)

    Suriyaphol, Gunnaporn; Sarikaputi, Meena; Suriyaphol, Prapat

    2009-11-01

    Human skin keratinocytes HaCat attacked by Staphylococcus aureus alpha-toxin showed a transient drop of cellular ATP levels whereas in toxin-perforated bovine mammary epithelial cells (BMEC), the ATP levels dropped more slowly. Morphologically, during the ATP level depletion, HaCat cell developed a spacious intracellular vacuole together with the transient influx of trypan blue. WST-1 signal, which tested the function of mitochondrial enzyme in viable cells, also decreased concomitantly. On the other hand, BMEC excluded trypan blue and vacuolation was not observed throughout the experiment. We conclude that mammary epithelial cells resist the toxin better than keratinocytes. This is the first report showing that alpha-toxin enhances transient membrane permeability to large molecules, temporary vacuole formation and the transient defect of mitochondrial enzyme in viable cells without cell lysis.

  11. Drop "impact" on an airfoil surface.

    Science.gov (United States)

    Wu, Zhenlong

    2018-05-17

    Drop impact on an airfoil surface takes place in drop-laden two-phase flow conditions such as rain and icing, which are encountered by wind turbines or airplanes. This phenomenon is characterized by complex nonlinear interactions that manifest rich flow physics and pose unique modeling challenges. In this article, the state of the art of the research about drop impact on airfoil surface in the natural drop-laden two-phase flow environment is presented. The potential flow physics, hazards, characteristic parameters, droplet trajectory calculation, drop impact dynamics and effects are discussed. The most key points in establishing the governing equations for a drop-laden flow lie in the modeling of raindrop splash and water film. The various factors affecting the drop impact dynamics and the effects of drop impact on airfoil aerodynamic performance are summarized. Finally, the principle challenges and future research directions in the field as well as some promising measures to deal with the adverse effects of drop-laden flows on airfoil performance are proposed. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  13. Vortex flow in acoustically levitated drops

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Z.L.; Xie, W.J. [Department of Applied Physics, Northwestern Polytechnical University, Xi' an 710072 (China); Wei, B., E-mail: bbwei@nwpu.edu.cn [Department of Applied Physics, Northwestern Polytechnical University, Xi' an 710072 (China)

    2011-08-29

    The internal flow of acoustically levitated water drops is investigated experimentally. This study reveals a kind of vortex flow which rotates in the meridional plane of the levitated drop. The magnitude of fluid velocity is nearly vanishing at the drop center, whereas it increases toward the free surface of a levitated drop until the maximum value of about 80 mm/s. A transition of streamline shapes from concentric circles to ellipses takes place at the distance of about 1.2 mm from the drop center. The fluid velocity distribution is plotted as a function of polar angle for seven characteristic streamlines. -- Highlights: → We experimentally observe the internal flow of acoustically levitated water drops. → We present a fascinating structure of vortex flow inside the levitated water drop. → This vortex flow rotates around the drop center in the meridional plane. → Velocity distribution information of this vortex flow is quantitatively analyzed.

  14. Vortex flow in acoustically levitated drops

    International Nuclear Information System (INIS)

    Yan, Z.L.; Xie, W.J.; Wei, B.

    2011-01-01

    The internal flow of acoustically levitated water drops is investigated experimentally. This study reveals a kind of vortex flow which rotates in the meridional plane of the levitated drop. The magnitude of fluid velocity is nearly vanishing at the drop center, whereas it increases toward the free surface of a levitated drop until the maximum value of about 80 mm/s. A transition of streamline shapes from concentric circles to ellipses takes place at the distance of about 1.2 mm from the drop center. The fluid velocity distribution is plotted as a function of polar angle for seven characteristic streamlines. -- Highlights: → We experimentally observe the internal flow of acoustically levitated water drops. → We present a fascinating structure of vortex flow inside the levitated water drop. → This vortex flow rotates around the drop center in the meridional plane. → Velocity distribution information of this vortex flow is quantitatively analyzed.

  15. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  17. Range dependent characteristics in the head-related transfer functions of a bat-head cast: part 2. Binaural characteristics

    International Nuclear Information System (INIS)

    Kim, S; Allen, R; Rowan, D

    2012-01-01

    Further innovations in bio-inspired engineering based on biosonar systems, such as bats, may arise from more detailed understanding of the underlying acoustic processes. This includes the range-dependent properties of bat heads and ears, particularly at the higher frequencies of bat vocalizations. In a companion paper Kim et al (2012 Bioinspir. Biomim.), range-dependent head-related transfer functions of a bat head cast were investigated up to 100 kHz at either ear (i.e. monaural features). The current paper extends this to consider range-dependent spectral and temporal disparities between the two ears (i.e. binaural features), using experimental data and a spherical model of a bat head to provide insights into the physical basis for these features. It was found that binaural temporal and high-frequency binaural spectral features are approximately independent of distance, having the effect of decreasing their angular resolution at close range. In contrast, low-frequency binaural spectral features are strongly distance-dependent, such that angular sensitivity can be maintained by lowering the frequency of the echolocation emission at close range. Together with the companion paper Kim et al, we speculate that distance-dependent low-frequency monaural and binaural features at short range might help explain why some species of bats that drop the frequency of their calls on target approach while approaching a target. This also provides an impetus for the design of effective emissions in sonar engineering applied to similar tasks. (paper)

  18. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  19. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  20. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  1. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  2. Coalescence collision of liquid drops I: Off-center collisions of equal-size drops

    Directory of Open Access Journals (Sweden)

    Alejandro Acevedo-Malavé

    2011-09-01

    Full Text Available The Smoothed Particle Hydrodynamics method (SPH is used here to model off-center collisions of equal-size liquid drops in a three-dimensional space. In this study the Weber number is calculated for several conditions of the droplets dynamics and the velocity vector fields formed inside the drops during the collision process are shown. For the permanent coalescence the evolution of the kinetic and internal energy is shown and also the approaching to equilibrium of the resulting drop. Depending of the Weber number three possible outcomes for the collision of droplets is obtained: permanent coalescence, flocculation and fragmentation. The fragmentation phenomena are modeled and the formation of small satellite drops can be seen. The ligament that is formed follows the “end pinching” mechanism and it is transformed into a flat structure.

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  4. Passive Cushiony Biomechanics of Head Protection in Falling Geckos

    OpenAIRE

    Wang, Hao; Wang, Wenbo; Song, Yi; Cai, Lei; Dai, Zhendong

    2018-01-01

    Gekko geckos are capable to crawl on the steep even on upside-down surfaces. Such movement, especially at great altitude, puts them at high risks of incidentally dropping down and inevitable body or head impactions, though they may trigger air-righting reaction (ARR) to attenuate the landing shocks. However, the air-righting ability (ARA) in Gekko geckos is not fully developed. The implementation of ARR in some geckos is quite slow; and for those without tails, the ARR is even unobservable. S...

  5. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  6. "Self-Shaping" of Multicomponent Drops.

    Science.gov (United States)

    Cholakova, Diana; Valkova, Zhulieta; Tcholakova, Slavka; Denkov, Nikolai; Smoukov, Stoyan K

    2017-06-13

    In our recent study we showed that single-component emulsion drops, stabilized by proper surfactants, can spontaneously break symmetry and transform into various polygonal shapes during cooling [ Denkov Nature 2015 , 528 , 392 - 395 ]. This process involves the formation of a plastic rotator phase of self-assembled oil molecules beneath the drop surface. The plastic phase spontaneously forms a frame of plastic rods at the oil drop perimeter which supports the polygonal shapes. However, most of the common substances used in industry appear as mixtures of molecules rather than pure substances. Here we present a systematic study of the ability of multicomponent emulsion drops to deform upon cooling. The observed trends can be summarized as follows: (1) The general drop-shape evolution for multicomponent drops during cooling is the same as with single-component drops; however, some additional shapes are observed. (2) Preservation of the particle shape upon freezing is possible for alkane mixtures with chain length difference Δn ≤ 4; for greater Δn, phase separation within the droplet is observed. (3) Multicomponent particles prepared from alkanes with Δn ≤ 4 plastify upon cooling due to the formation of a bulk rotator phase within the particles. (4) If a compound, which cannot induce self-shaping when pure, is mixed with a certain amount of a compound which induces self-shaping, then drops prepared from this mixture can also self-shape upon cooling. (5) Self-emulsification phenomena are also observed for multicomponent drops. In addition to the three recently reported mechanisms of self-emulsification [ Tcholakova Nat. Commun. 2017 , ( 8 ), 15012 ], a new (fourth) mechanism is observed upon freezing for alkane mixtures with Δn > 4. It involves disintegration of the particles due to a phase separation of alkanes upon freezing.

  7. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  8. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  10. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  11. Dynamics of deforming drops

    NARCIS (Netherlands)

    Bouwhuis, W.

    2015-01-01

    Liquid drops play a dominant role in numerous industrial applications, such as spray coating, spray painting, inkjet printing, lithography processes, and spraying/sprinkling in agriculture or gardening. In all of these examples, the generation, flight, impact, and spreading of drops are separate

  12. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  13. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  14. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  15. Electrohydrodynamics of a viscous drop with inertia.

    Science.gov (United States)

    Nganguia, H; Young, Y-N; Layton, A T; Lai, M-C; Hu, W-F

    2016-05-01

    Most of the existing numerical and theoretical investigations on the electrohydrodynamics of a viscous drop have focused on the creeping Stokes flow regime, where nonlinear inertia effects are neglected. In this work we study the inertia effects on the electrodeformation of a viscous drop under a DC electric field using a novel second-order immersed interface method. The inertia effects are quantified by the Ohnesorge number Oh, and the electric field is characterized by an electric capillary number Ca_{E}. Below the critical Ca_{E}, small to moderate electric field strength gives rise to steady equilibrium drop shapes. We found that, at a fixed Ca_{E}, inertia effects induce larger deformation for an oblate drop than a prolate drop, consistent with previous results in the literature. Moreover, our simulations results indicate that inertia effects on the equilibrium drop deformation are dictated by the direction of normal electric stress on the drop interface: Larger drop deformation is found when the normal electric stress points outward, and smaller drop deformation is found otherwise. To our knowledge, such inertia effects on the equilibrium drop deformation has not been reported in the literature. Above the critical Ca_{E}, no steady equilibrium drop deformation can be found, and often the drop breaks up into a number of daughter droplets. In particular, our Navier-Stokes simulations show that, for the parameters we use, (1) daughter droplets are larger in the presence of inertia, (2) the drop deformation evolves more rapidly compared to creeping flow, and (3) complex distribution of electric stresses for drops with inertia effects. Our results suggest that normal electric pressure may be a useful tool in predicting drop pinch-off in oblate deformations.

  16. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  17. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  18. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  19. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  20. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  1. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  2. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  3. Hereditary Neuropathy with Liability to Pressure Palsy: A Recurrent and Bilateral Foot Drop Case Report

    Directory of Open Access Journals (Sweden)

    Filipa Flor-de-Lima

    2013-01-01

    Full Text Available Hereditary neuropathy with liability to pressure palsy is characterized by acute, painless, recurrent mononeuropathies secondary to minor trauma or compression. A 16-year-old boy had the first episode of right foot drop after minor motorcycle accident. Electromyography revealed conduction block and slowing velocity conduction of the right deep peroneal nerve at the fibular head. After motor rehabilitation, he fully recovered. Six months later he had the second episode of foot drop in the opposite site after prolonged squatting position. Electromyography revealed sensorimotor polyneuropathy of left peroneal, sural, posterior tibial, and deep peroneal nerves and also of ulnar, radial, and median nerves of both upper limbs. Histological examination revealed sensory nerve demyelination and focal thickenings of myelin fibers. The diagnosis of hereditary neuropathy with liability to pressure palsy was confirmed by PMP22 deletion of chromosome 17p11.2. He started motor rehabilitation and avoidance of stressing factors with progressive recovery. After one-year followup, he was completely asymptomatic. Recurrent bilateral foot drop history, “sausage-like” swellings of myelin in histological examination, and the results of electromyography led the authors to consider the diagnosis despite negative family history. The authors highlight this rare disease in pediatric population and the importance of high index of clinical suspicion for its diagnosis.

  4. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  5. Capillary Thinning of Particle-laden Drops

    Science.gov (United States)

    Wagoner, Brayden; Thete, Sumeet; Jahns, Matt; Doshi, Pankaj; Basaran, Osman

    2015-11-01

    Drop formation is central in many applications such as ink-jet printing, microfluidic devices, and atomization. During drop formation, a thinning filament is created between the about-to-form drop and the fluid hanging from the nozzle. Therefore, the physics of capillary thinning of filaments is key to understanding drop formation and has been thoroughly studied for pure Newtonian fluids. The thinning dynamics is, however, altered completely when the fluid contains particles, the physics of which is not well understood. In this work, we explore the impact of solid particles on filament thinning and drop formation by using a combination of experiments and numerical simulations.

  6. Retrospective study of 48 cases of post-operative radiotherapy for head and neck cancer

    International Nuclear Information System (INIS)

    Mnejja, W.; Yahiaoui, S.; Siala, W.; Daoud, J.; Ghorbel, A.; Frikha, M.

    2011-01-01

    The authors report a study which aimed at assessing therapeutic results after post-operative radiotherapy of 48 patients suffering from head and neck cancers. The analysis is made in terms of cancer control, survival without recurrence and global survival. The post-operative radiotherapy improves the disease control rate. Ganglionary attack and capsular failure are survival prognosis factors. The concomitant association of chemo-therapy and radiotherapy should improve therapeutic results. Short communication

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  8. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  9. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  10. Turbulence, bubbles and drops

    NARCIS (Netherlands)

    van der Veen, Roeland

    2016-01-01

    In this thesis, several questions related to drop impact and Taylor-Couette turbulence are answered. The deformation of a drop just before impact can cause a bubble to be entrapped. For many applications, such as inkjet printing, it is crucial to control the size of this entrapped bubble. To study

  11. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  13. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  14. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  15. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  16. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  17. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  19. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  20. Drop impact splashing and air entrapment

    KAUST Repository

    Thoraval, Marie-Jean

    2013-03-01

    Drop impact is a canonical problem in fluid mechanics, with numerous applications in industrial as well as natural phenomena. The extremely simple initial configuration of the experiment can produce a very large variety of fast and complex dynamics. Scientific progress was made in parallel with major improvements in imaging and computational technologies. Most recently, high-speed imaging video cameras have opened the exploration of new phenomena occurring at the micro-second scale, and parallel computing allowed realistic direct numerical simulations of drop impacts. We combine these tools to bring a new understanding of two fundamental aspects of drop impacts: splashing and air entrapment. The early dynamics of a drop impacting on a liquid pool at high velocity produces an ejecta sheet, emerging horizontally in the neck between the drop and the pool. We show how the interaction of this thin liquid sheet with the air, the drop or the pool, can produce micro-droplets and bubble rings. Then we detail how the breakup of the air film stretched between the drop and the pool for lower impact velocities can produce a myriad of micro-bubbles.

  1. Axisymmetric Liquid Hanging Drops

    Science.gov (United States)

    Meister, Erich C.; Latychevskaia, Tatiana Yu

    2006-01-01

    The geometry of drops hanging on a circular capillary can be determined by numerically solving a dimensionless differential equation that is independent on any material properties, which enables one to follow the change of the height, surface area, and contact angle of drops hanging on a particular capillary. The results show that the application…

  2. Insights from the pollination drop proteome and the ovule transcriptome of Cephalotaxus at the time of pollination drop production.

    Science.gov (United States)

    Pirone-Davies, Cary; Prior, Natalie; von Aderkas, Patrick; Smith, Derek; Hardie, Darryl; Friedman, William E; Mathews, Sarah

    2016-05-01

    Many gymnosperms produce an ovular secretion, the pollination drop, during reproduction. The drops serve as a landing site for pollen, but also contain a suite of ions and organic compounds, including proteins, that suggests diverse roles for the drop during pollination. Proteins in the drops of species of Chamaecyparis, Juniperus, Taxus, Pseudotsuga, Ephedra and Welwitschia are thought to function in the conversion of sugars, defence against pathogens, and pollen growth and development. To better understand gymnosperm pollination biology, the pollination drop proteomes of pollination drops from two species of Cephalotaxus have been characterized and an ovular transcriptome for C. sinensis has been assembled. Mass spectrometry was used to identify proteins in the pollination drops of Cephalotaxus sinensis and C. koreana RNA-sequencing (RNA-Seq) was employed to assemble a transcriptome and identify transcripts present in the ovules of C. sinensis at the time of pollination drop production. About 30 proteins were detected in the pollination drops of both species. Many of these have been detected in the drops of other gymnosperms and probably function in defence, polysaccharide metabolism and pollen tube growth. Other proteins appear to be unique to Cephalotaxus, and their putative functions include starch and callose degradation, among others. Together, the proteins appear either to have been secreted into the drop or to occur there due to breakdown of ovular cells during drop production. Ovular transcripts represent a wide range of gene ontology categories, and some may be involved in drop formation, ovule development and pollen-ovule interactions. The proteome of Cephalotaxus pollination drops shares a number of components with those of other conifers and gnetophytes, including proteins for defence such as chitinases and for carbohydrate modification such as β-galactosidase. Proteins likely to be of intracellular origin, however, form a larger component of drops

  3. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  4. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  5. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  6. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  7. [Tularemia in a jogger woman after the attack by a common buzzard (Buteo buteo): A "One Health" case report].

    Science.gov (United States)

    Ehrensperger, F; Riederer, L; Friedl, A

    2018-03-01

    A female jogger was attacked by a common buzzard (Buteo buteo) and was scratched lightly at the back of the head. One week later she was taken ill with high fever and headache which was later diagnosed as ulcero-glandular tularemia in regional lymph nodes, caused by Francisella tularensis. Recovery was only achieved after several weeks of systemic antibiotic treatment (Gentamicin/ Ciprofloxacine). Tularemia is a well known zoonotic disease, called "rabbit fever", mainly affecting rabbits and hares, but also small rodents. Human infection occurs often following tick bites or bloodsucking insects, or in hunters or slaughterers handling infected animals. Bites by mice have also been reported as a cause of tularemia. For the first time we report this case of tularemia as a result of an attack by a bird of prey. We assume that the bird acted as a vector just carrying the F. tularensis on its claws or beak, but we cannot exclude an infection of the bird itself. Several other joggers had also been attacked by a common buzzard in the same area shortly after the above described event and one of these also became infected with F. tularensis.

  8. CANFLEX fuel bundle junction pressure drop

    International Nuclear Information System (INIS)

    Chung, H. J.; Chung, C. H.; Jun, J. S.; Hong, S. D.; Chang, S. K.; Kim, B. D.

    1996-11-01

    This report describes the junction pressure drop test results which are to used to determine the alignment angle between bundles to achieve the most probable fuel string pressure drop for randomly aligned bundles for use in the fuel string total pressure drop test. (author). 4 tabs., 17 figs

  9. CANFLEX fuel bundle junction pressure drop

    Energy Technology Data Exchange (ETDEWEB)

    Chung, H. J.; Chung, C. H.; Jun, J. S.; Hong, S. D.; Chang, S. K.; Kim, B. D.

    1996-11-01

    This report describes the junction pressure drop test results which are to used to determine the alignment angle between bundles to achieve the most probable fuel string pressure drop for randomly aligned bundles for use in the fuel string total pressure drop test. (author). 4 tabs., 17 figs.

  10. 49 CFR 178.603 - Drop test.

    Science.gov (United States)

    2010-10-01

    ... used for the hydrostatic pressure or stacking test. Exceptions for the number of steel and aluminum..., non-resilient, flat and horizontal surface. (e) Drop height. Drop heights, measured as the vertical... than flat drops, the center of gravity of the test packaging must be vertically over the point of...

  11. The Role of Interface on the Impact Characteristics and Cranial Fracture Patterns Using the Immature Porcine Head Model.

    Science.gov (United States)

    Deland, Trevor S; Niespodziewanski, Emily; Fenton, Todd W; Haut, Roger C

    2016-01-01

    The role of impact interface characteristics on the biomechanics and patterns of cranial fracture has not been investigated in detail, and especially for the pediatric head. In this study, infant porcine skulls aged 2-19 days were dropped with an energy to cause fracturing onto four surfaces varying in stiffness from a rigid plate to one covered with plush carpeting. Results showed that heads dropped onto the rigid surface produced more extensive cranial fracturing than onto carpeted surfaces. Contact forces generated at fracture initiation and the overall maximum contact forces were generally lower for the rigid than carpeted impacts. While the degree of cranial fracturing from impacts onto the heavy carpeted surface was comparable to that of lower-energy rigid surface impacts, there were fewer diastatic fractures. This suggests that characteristics of the cranial fracture patterns may be used to differentiate energy level from impact interface in pediatric forensic cases. © 2015 American Academy of Forensic Sciences.

  12. Head waves in ultrasonic testing. Physical principle and application to welded joint testing

    International Nuclear Information System (INIS)

    Wustenberg, H.; Erhard, A.

    1984-01-01

    A head wave sensor is developed from distinct emitter and receiver sensors using longitudinal waves under a 70 0 incidence. These heat wave sensors present a high sensitivity for underlying cracks and are not influenced by surface accidents like liquid drops or welding projection. They are multi mode sensors emitting simultaneously longitudinal head waves, a main longitudinal lobe and a transverse wave with a maximum at about 38 0 . This wave combination can be used for automatic testing of welded joints even with austenitic materials for defect detection near internal or external surfaces. This process can substitute or complete liquid penetrant inspection or magnetic inspection for testing pipes (13 references are given) [fr

  13. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  14. Passive Cushiony Biomechanics of Head Protection in Falling Geckos

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2018-01-01

    Full Text Available Gekko geckos are capable to crawl on the steep even on upside-down surfaces. Such movement, especially at great altitude, puts them at high risks of incidentally dropping down and inevitable body or head impactions, though they may trigger air-righting reaction (ARR to attenuate the landing shocks. However, the air-righting ability (ARA in Gekko geckos is not fully developed. The implementation of ARR in some geckos is quite slow; and for those without tails, the ARR is even unobservable. Since ARA is compromised in Gekko geckos, there must be some other mechanisms responsible for protecting them from head injuries during falls. In this study, we looked into a Gekko gecko’s brain to study its internal environment and structure, using the magnetic resonance imaging (MRI technique. The results showed that the brain parenchyma was fully surrounded by the cerebrospinal fluid (CSF in the skull. A succulent characteristic was presented, which meant the intracalvarium was significantly occupied by the CSF, up to 45% in volume. Then a simplified three-dimensional finite element model was built, and a dynamic simulation was conducted to evaluate the mechanical property of this succulent characteristic during the head impactions. These implied the succulent characteristic may play certain roles on the self-protection in case of head impaction, which is adaptable to the Gekko gecko’s locomotion and behavior.

  15. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  16. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  17. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  18. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  19. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  20. Liquid-gas mass transfer at drop structures

    DEFF Research Database (Denmark)

    Matias, Natércia; Nielsen, Asbjørn Haaning; Vollertsen, Jes

    2017-01-01

    -water mass transfer, little is known about hydrogen sulfide emission under highly turbulent conditions (e.g., drop structures, hydraulic jumps). In this study, experimental work was carried out to analyze the influence of characteristics of drops on reaeration. Physical models were built, mimicking typical...... sewer drop structures and allowing different types of drops, drop heights, tailwater depths and flow rates. In total, 125 tests were performed. Based on their results, empirical expressions translating the relationship between the mass transfer of oxygen and physical parameters of drop structures were...... established. Then, by applying the two-film theory with two-reference substances, the relation to hydrogen sulfide release was defined. The experiments confirmed that the choice of the type of drop structure is critical to determine the uptake/emission rates. By quantifying the air-water mass transfer rates...

  1. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  2. Nonlinear oscillations of inviscid free drops

    Science.gov (United States)

    Patzek, T. W.; Benner, R. E., Jr.; Basaran, O. A.; Scriven, L. E.

    1991-01-01

    The present analysis of free liquid drops' inviscid oscillations proceeds through solution of Bernoulli's equation to obtain the free surface shape and of Laplace's equation for the velocity potential field. Results thus obtained encompass drop-shape sequences, pressure distributions, particle paths, and the temporal evolution of kinetic and surface energies; accuracy is verified by the near-constant drop volume and total energy, as well as the diminutiveness of mass and momentum fluxes across drop surfaces. Further insight into the nature of oscillations is provided by Fourier power spectrum analyses of mode interactions and frequency shifts.

  3. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  4. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  6. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  8. The Drop Tower Bremen -Experiment Operation

    Science.gov (United States)

    Könemann, Thorben; von Kampen, Peter; Rath, Hans J.

    The idea behind the drop tower facility of the Center of Applied Space Technology and Micro-gravity (ZARM) in Bremen is to provide an inimitable technical opportunity of a daily access to short-term weightlessness on earth. In this way ZARM`s european unique ground-based microgravity laboratory displays an excellent economic alternative for research in space-related conditions at low costs comparable to orbital platforms. Many national and international ex-perimentalists motivated by these prospects decide to benefit from the high-quality and easy accessible microgravity environment only provided by the Drop Tower Bremen. Corresponding experiments in reduced gravity could open new perspectives of investigation methods and give scientists an impressive potential for a future technology and multidisciplinary applications on different research fields like Fundamental Physics, Astrophysics, Fluid Dynamics, Combus-tion, Material Science, Chemistry and Biology. Generally, realizing microgravity experiments at ZARM`s drop tower facility meet new requirements of the experimental hardware and may lead to some technical constraints in the setups. In any case the ZARM Drop Tower Operation and Service Company (ZARM FAB mbH) maintaining the drop tower facility is prepared to as-sist experimentalists by offering own air-conditioned laboratories, clean rooms, workshops and consulting engineers, as well as scientific personal. Furthermore, ZARM`s on-site apartment can be used for accommodations during the experiment campaigns. In terms of approaching drop tower experimenting, consulting of experimentalists is mandatory to successfully accomplish the pursued drop or catapult capsule experiment. For this purpose there will be a lot of expertise and help given by ZARM FAB mbH in strong cooperation to-gether with the experimentalists. However, in comparison to standard laboratory setups the drop or catapult capsule setup seems to be completely different at first view. While defining a

  9. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  10. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  11. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  12. Pendent_Drop: An ImageJ Plugin to Measure the Surface Tension from an Image of a Pendent Drop

    Directory of Open Access Journals (Sweden)

    Adrian Daerr

    2016-01-01

    Full Text Available The pendent drop method for surface tension measurement consists in analysing the shape of an axisymmetric drop hanging from a capillary tube. This software is an add-on for the public domain image processing software ImageJ which matches a theoretical profile to the contour of a pendent drop, either interactively or by automatically minimising the mismatch. It provides an estimate of the surface tension, drop volume and surface area from the best matching parameters. It can be used in a headless setup. It is hosted on http://fiji.sc/List_of_update_sites with the source code on https://github.com/adaerr/pendent-drop

  13. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  14. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  15. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  16. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  17. Total Site Heat Integration Considering Pressure Drops

    Directory of Open Access Journals (Sweden)

    Kew Hong Chew

    2015-02-01

    Full Text Available Pressure drop is an important consideration in Total Site Heat Integration (TSHI. This is due to the typically large distances between the different plants and the flow across plant elevations and equipment, including heat exchangers. Failure to consider pressure drop during utility targeting and heat exchanger network (HEN synthesis may, at best, lead to optimistic energy targets, and at worst, an inoperable system if the pumps or compressors cannot overcome the actual pressure drop. Most studies have addressed the pressure drop factor in terms of pumping cost, forbidden matches or allowable pressure drop constraints in the optimisation of HEN. This study looks at the implication of pressure drop in the context of a Total Site. The graphical Pinch-based TSHI methodology is extended to consider the pressure drop factor during the minimum energy requirement (MER targeting stage. The improved methodology provides a more realistic estimation of the MER targets and valuable insights for the implementation of the TSHI design. In the case study, when pressure drop in the steam distribution networks is considered, the heating and cooling duties increase by 14.5% and 4.5%.

  18. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  19. Drop size measurements in Venturi scrubbers

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez Alonso, D.; Azzopardi, B.J. [Nottingham Univ. (United Kingdom). Dept. of Chemical Engineering; Goncalves, J.A.S.; Coury, J.R. [Universidade Federal de Sao Carlos (Brazil). Departamento de Engenharia Quimica

    2001-07-01

    Venturi scrubbers are high efficiency gas cleaners in which suspended particles are removed from gas streams by drops formed by liquid atomisation, usually in the Venturi throat. The size of the drops formed are of fundamental importance to the performance of the equipment, both in terms of pressure drop and dust removal efficiency. In this study, drop sizes in a cylindrical laboratory-scale Venturi scrubber were measured using a laser diffraction technique. Gas velocity and liquid to gas ratios varied from 50 to 90 m/s and 0.5 to 2.0 1/m{sup 3}, respectively. Water was injected using two different arrangements: either as jets in the throat or as a film just upstream of the convergence. Drop size measurements were performed at three positions in the case of jet injection: two located along the throat, and the last one at the end of the diffuser. The present data shows that the Sauter mean diameter of the spray can be well correlated by the equation of Boll et al. (J. Air Pollut. Control Assoc. 24 (1974) 932). Drop size distributions are satisfactorily represented by a Rosin-Rammler function. This paper also provides a simple method for calculating the parameters of the Rosin-Rammler function. As a result of this work, drop sizes in Venturi scrubbers can be estimated with much higher accuracy. (Author)

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  2. Reduced Baroreflex Sensitivity in Cluster Headache Patients

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Mehlsen, Jesper; Brinth, Louise

    2015-01-01

    by baroreflex sensitivity (BRS) in CH patients. METHODS: Twenty-six active CH patients and an equal number of age-, sex-, and BMI-matched controls underwent head-up tilt table test and BRS was determined by the sequence method. RESULTS: Compared with controls, patients exhibited a blunted reactivity of RR...... patients who had not (n = 13, 16.0 ms/mmHg, P = .1523). In the tilted position, the drop in SBP at the carotid sinuses was higher in patients who had recently suffered an attack. Despite this, they exhibited a less marked shortening of RR intervals when compared with patients who had been attack free...... of the autonomic nervous system or in the central relay of impulses from the baroreceptors....

  3. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  4. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  5. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  6. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  7. Sepsis from dropped clips at laparoscopic cholecystectomy

    International Nuclear Information System (INIS)

    Hussain, Sarwat

    2001-01-01

    We report seven patients in whom five dropped surgical clips and two gallstones were visualized in the peritoneal cavity, on radiological studies. In two, subphrenic abscesses and empyemas developed as a result of dropped clips into the peritoneal cavity during or following laparoscopic cholecystectomy. In one of these two, a clip was removed surgically from the site of an abscess. In two other patients dropped gallstones, and in three, dropped clips led to no complications. These were seen incidentally on studies done for other indications. Abdominal abscess secondary to dropped gallstones is a well-recognized complication of laparoscopic cholecystectomy (LC). We conclude that even though dropped surgical clips usually do not cause problems, they should be considered as a risk additional to other well-known causes of post-LC abdominal sepsis

  8. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  9. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  10. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  11. Micro-splashing by drop impacts

    KAUST Repository

    Thoroddsen, Sigurdur T; Takehara, Kohsei; Etoh, Takeharugoji

    2012-01-01

    We use ultra-high-speed video imaging to observe directly the earliest onset of prompt splashing when a drop impacts onto a smooth solid surface. We capture the start of the ejecta sheet travelling along the solid substrate and show how it breaks up immediately upon emergence from the underneath the drop. The resulting micro-droplets are much smaller and faster than previously reported and may have gone unobserved owing to their very small size and rapid ejection velocities, which approach 100 m s-1, for typical impact conditions of large rain drops. We propose a phenomenological mechanism which predicts the velocity and size distribution of the resulting microdroplets. We also observe azimuthal undulations which may help promote the earliest breakup of the ejecta. This instability occurs in the cusp in the free surface where the drop surface meets the radially ejected liquid sheet. © 2012 Cambridge University Press.

  12. Micro-splashing by drop impacts

    KAUST Repository

    Thoroddsen, Sigurdur T.

    2012-07-18

    We use ultra-high-speed video imaging to observe directly the earliest onset of prompt splashing when a drop impacts onto a smooth solid surface. We capture the start of the ejecta sheet travelling along the solid substrate and show how it breaks up immediately upon emergence from the underneath the drop. The resulting micro-droplets are much smaller and faster than previously reported and may have gone unobserved owing to their very small size and rapid ejection velocities, which approach 100 m s-1, for typical impact conditions of large rain drops. We propose a phenomenological mechanism which predicts the velocity and size distribution of the resulting microdroplets. We also observe azimuthal undulations which may help promote the earliest breakup of the ejecta. This instability occurs in the cusp in the free surface where the drop surface meets the radially ejected liquid sheet. © 2012 Cambridge University Press.

  13. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  14. Thermal and stress analyses of the reactor pressure vessel lower head of the Three Mile Island Unit 2

    International Nuclear Information System (INIS)

    Hashimoto, K.; Onizawa, K.; Kurihara, R.; Kawasaki, S.; Soda, K.

    1992-01-01

    Thermal and stress analyses were performed using the finite element analysis code ABAQUS to clarify the factors which caused tears in the stainless steel liner of the reactor pressure vessel lower head of the Three Mile Island Unit 2 (TMI-2) reactor pressure vessel during the accident on 28 March 1979. The present analyses covered the events which occurred after approximately 20 tons of molten core material were relocated to the lower head of the reactor pressure vessel. They showed that the tensile stress was highest in the case where the relocated core material consisting of homogeneous UO 2 debris was assumed to attack the lower head and the debris was then quenched. The peak tensile stress was in the vicinity of the welded zone of the penetration nozzle. This result agrees with the findings from the examination of the TMI-2 reactor pressure vessel that major tears in the stainless steel liner were observed around two penetration nozzles of the lower head. (author)

  15. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  16. Heading and head injuries in soccer.

    Science.gov (United States)

    Kirkendall, D T; Jordan, S E; Garrett, W E

    2001-01-01

    In the world of sports, soccer is unique because of the purposeful use of the unprotected head for controlling and advancing the ball. This skill obviously places the player at risk of head injury and the game does carry some risk. Head injury can be a result of contact of the head with another head (or other body parts), ground, goal post, other unknown objects or even the ball. Such impacts can lead to contusions, fractures, eye injuries, concussions or even, in rare cases, death. Coaches, players, parents and physicians are rightly concerned about the risk of head injury in soccer. Current research shows that selected soccer players have some degree of cognitive dysfunction. It is important to determine the reasons behind such deficits. Purposeful heading has been blamed, but a closer look at the studies that focus on heading has revealed methodological concerns that question the validity of blaming purposeful heading of the ball. The player's history and age (did they play when the ball was leather and could absorb significant amounts of water), alcohol intake, drug intake, learning disabilities, concussion definition and control group use/composition are all factors that cloud the ability to blame purposeful heading. What does seem clear is that a player's history of concussive episodes is a more likely explanation for cognitive deficits. While it is likely that the subconcussive impact of purposeful heading is a doubtful factor in the noted deficits, it is unknown whether multiple subconcussive impacts might have some lingering effects. In addition, it is unknown whether the noted deficits have any affect on daily life. Proper instruction in the technique is critical because if the ball contacts an unprepared head (as in accidental head-ball contacts), the potential for serious injury is possible. To further our understanding of the relationship of heading, head injury and cognitive deficits, we need to: learn more about the actual impact of a ball on the

  17. Pressure drop in ET-RR-1

    International Nuclear Information System (INIS)

    Khattab, M.; Mina, A.R.

    1990-01-01

    Measurements of pressure drop through a bundle comprising 16 rods and their lower arrangement grid as well as orifices similar to those of ET-RR-1 core have been done. Experiments are carried out under adiabatic turbulent flow conditions at about 35 degree C. Bundle Reynolds number range is 4 x 10 -2 x 10. Orifices of diameters 4.5, 3.25 or 2.5 cm. are mounted underneath the bundle. The bundle and lower grid pressure drop coefficients are 3.75 and 1.8 respectively. Orifices pressure drop coefficients are 2.65, 19.67 and 53.55 respectively. The ratio of bundle pressure drop to that of 4.5 cm. Orifice diameter is 1.415. The pressure drop coefficients are utilizer to calculate flow through bundles. The flow rate per bundle is 39.1, 20.4 or 13.1 m 3 /hr. Depending on orifice diameter

  18. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  19. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  20. Drop trampoline

    Science.gov (United States)

    Chantelot, Pierre; Coux, Martin; Clanet, Christophe; Quere, David

    2017-11-01

    Superhydrophobic substrates inspired from the lotus leaf have the ability to reflect impacting water drops. They do so very efficiently and contact lasts typically 10 ms for millimetric droplets. Yet unlike a lotus leaf most synthetic substrates are rigid. Focusing on the interplay between substrate flexibility and liquid repellency might allow us to understand the dynamic properties of natural surfaces. We perform liquid marbles impacts at velocity V onto thin ( 0.01 mm) stretched circular PDMS membranes. We obtain contact time reductions of up to 70%. The bouncing mechanism is drastically modified compared to that on a rigid substrate: the marble leaves the substrate while it is still spread in a disk shape as it is kicked upwards by the membrane. We show that the bouncing is controlled by an interplay between the dynamics of the drop and the membrane.

  1. Drop Spreading with Random Viscosity

    Science.gov (United States)

    Xu, Feng; Jensen, Oliver

    2016-11-01

    Airway mucus acts as a barrier to protect the lung. However as a biological material, its physical properties are known imperfectly and can be spatially heterogeneous. In this study we assess the impact of these uncertainties on the rate of spreading of a drop (representing an inhaled aerosol) over a mucus film. We model the film as Newtonian, having a viscosity that depends linearly on the concentration of a passive solute (a crude proxy for mucin proteins). Given an initial random solute (and hence viscosity) distribution, described as a Gaussian random field with a given correlation structure, we seek to quantify the uncertainties in outcomes as the drop spreads. Using lubrication theory, we describe the spreading of the drop in terms of a system of coupled nonlinear PDEs governing the evolution of film height and the vertically-averaged solute concentration. We perform Monte Carlo simulations to predict the variability in the drop centre location and width (1D) or area (2D). We show how simulation results are well described (at much lower computational cost) by a low-order model using a weak disorder expansion. Our results show for example how variability in the drop location is a non-monotonic function of the solute correlation length increases. Engineering and Physical Sciences Research Council.

  2. Thermocapillary reorientation of Janus drops

    Science.gov (United States)

    Rosales, Rodolfo; Saenz, Pedro

    2017-11-01

    Janus drops, named after the Ancient Roman two-faced god, are liquid drops formed from two immiscible fluids. Experimental observations indicate that a Janus drop may re-orientate in response to an applied external thermal gradient due to the Marangoni effect. Depending on the angle between the interior interface and the direction of the temperature gradient, disparities in the physical properties of the constituent liquids may lead to asymmetries in the thermocapillary flow. As a result, the drop will move along a curved path until a torque-free configuration is achieved, point after which it will continue on a straight trajectory. Here, we present the results of a theoretical investigation of this realignment phenomenon in the Stokes regime and in the limit of non-deformable interfaces. A 3D semi-analytical method in terms of polar spherical harmonics is developed to characterize and rationalize the hydrodynamic response (forces and torques), flow (velocity and temperature distribution) and trajectory of a Janus drop moving during the temperature-driven reorientation process. Furthermore, we discuss how this phenomenon may be exploited to develop dynamically reconfigurable micro-lenses. This work was partially supported by the US National Science Foundation through Grants DMS-1614043 and DMS-1719637.

  3. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  4. Chemical effects head-loss research in support of generic safety issue 191.

    Energy Technology Data Exchange (ETDEWEB)

    Park, J. H.; Kasza, K.; Fisher, B.; Oras, J.; Natesan, K.; Shack, W. J.; Nuclear Engineering Division

    2006-10-31

    sump pH and fiberglass insulation is prevalent, relatively high concentrations of soluble aluminum can be expected. Tests in which the dissolved aluminum (Al) resulted from aluminum nitrate additions were used to investigate potential chemical effects that may lead to high head loss. Dissolved Al concentrations of 100 ppm were shown to lead to large pressure drops for the screen area to sump volume ratio and fiber debris bed studied. No chemical effects on head loss were observed in sodium tetraborate buffered solutions even for environments with high ratios of submerged Al area to sump volume. However, in tests with much higher concentrations of dissolved Al than expected in plants, large pressure drops did occur. Interaction with NUKON/Cal-Sil debris mixtures produced much lower head losses than observed in corresponding tests with TSP, although tests were not performed over the full range of Cal-Sil that might be of interest.

  5. Drop of egg production in chickens by experimental infection with an avian metapneumovirus strain PLE8T1 derived from swollen head syndrome and the application to evaluate vaccine.

    Science.gov (United States)

    Sugiyama, Miki; Koimaru, Hiroyuki; Shiba, Masahiro; Ono, Eriko; Nagata, Tadashi; Ito, Toshihiro

    2006-08-01

    Decreases in egg production and increased incidence of abnormal eggs due to malformation of egg shells were observed in specific pathogen free (SPF) 173-day-old laying hens inoculated intravenously with an avian metapneumovirus (aMPV) strain PLE8T1. This strain was derived from an isolate from broiler birds exhibiting swollen head syndrome (SHS). Some SPF birds inoculated with the virus showed, slight diarrhea without any respiratory symptoms. Thus, the PLE8T1 strain was used as a challenge virus to evaluate efficacy of aMPV vaccines. SPF chickens which received a live attenuated aMPV vaccine (NEMOVAC; Merial) at 7 or 77 days old and an inactivated aMPV vaccine (OVO-4; Merial) at 105 days old were protected against poor egg production caused by the challenge with the PLE8T1 strain. Thus, aMPV, the PLE8T1 strain passaged 22 times after isolation, from birds exhibiting SHS, could induce a drop in egg production in laying hens accompanied by malformation of egg shells. It was suggested that this challenge system could be applied to evaluate the efficacy of aMPV vaccine.

  6. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  7. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  8. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  9. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  10. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  11. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  12. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  13. CPAS Preflight Drop Test Analysis Process

    Science.gov (United States)

    Englert, Megan E.; Bledsoe, Kristin J.; Romero, Leah M.

    2015-01-01

    Throughout the Capsule Parachute Assembly System (CPAS) drop test program, the CPAS Analysis Team has developed a simulation and analysis process to support drop test planning and execution. This process includes multiple phases focused on developing test simulations and communicating results to all groups involved in the drop test. CPAS Engineering Development Unit (EDU) series drop test planning begins with the development of a basic operational concept for each test. Trajectory simulation tools include the Flight Analysis and Simulation Tool (FAST) for single bodies, and the Automatic Dynamic Analysis of Mechanical Systems (ADAMS) simulation for the mated vehicle. Results are communicated to the team at the Test Configuration Review (TCR) and Test Readiness Review (TRR), as well as at Analysis Integrated Product Team (IPT) meetings in earlier and intermediate phases of the pre-test planning. The ability to plan and communicate efficiently with rapidly changing objectives and tight schedule constraints is a necessity for safe and successful drop tests.

  14. Blood drop patterns: Formation and applications.

    Science.gov (United States)

    Chen, Ruoyang; Zhang, Liyuan; Zang, Duyang; Shen, Wei

    2016-05-01

    The drying of a drop of blood or plasma on a solid substrate leads to the formation of interesting and complex patterns. Inter- and intra-cellular and macromolecular interactions in the drying plasma or blood drop are responsible for the final morphologies of the dried patterns. Changes in these cellular and macromolecular components in blood caused by diseases have been suspected to cause changes in the dried drop patterns of plasma and whole blood, which could be used as simple diagnostic tools to identify the health of humans and livestock. However, complex physicochemical driving forces involved in the pattern formation are not fully understood. This review focuses on the scientific development in microscopic observations and pattern interpretation of dried plasma and whole blood samples, as well as the diagnostic applications of pattern analysis. Dried drop patterns of plasma consist of intricate visible cracks in the outer region and fine structures in the central region, which are mainly influenced by the presence and concentration of inorganic salts and proteins during drying. The shrinkage of macromolecular gel and its adhesion to the substrate surface have been thought to be responsible for the formation of the cracks. Dried drop patterns of whole blood have three characteristic zones; their formation as functions of drying time has been reported in the literature. Some research works have applied engineering treatment to the evaporation process of whole blood samples. The sensitivities of the resultant patterns to the relative humidity of the environment, the wettability of the substrates, and the size of the drop have been reported. These research works shed light on the mechanisms of spreading, evaporation, gelation, and crack formation of the blood drops on solid substrates, as well as on the potential applications of dried drop patterns of plasma and whole blood in diagnosis. Crown Copyright © 2016. Published by Elsevier B.V. All rights reserved.

  15. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  16. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  17. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  18. CFD Simulation and Optimization of Very Low Head Axial Flow Turbine Runner

    Directory of Open Access Journals (Sweden)

    Yohannis Mitiku Tobo

    2015-10-01

    Full Text Available The main objective of this work is Computational Fluid Dynamics (CFD modelling, simulation and optimization of very low head axial flow turbine runner  to be used to drive  a centrifugal pump of turbine-driven pump. The ultimate goal of the optimization is to produce a power of 1kW at head less than 1m from flowing  river to drive centrifugal pump using mechanical coupling (speed multiplier gear directly. Flow rate, blade numbers, turbine rotational speed, inlet angle are parameters used in CFD modeling,  simulation and design optimization of the turbine runner. The computed results show that power developed by a turbine runner increases with increasing flow rate. Pressure inside the turbine runner increases with flow rate but, runner efficiency increases for some flow rate and almost constant thereafter. Efficiency and power developed by a runner drops quickly if turbine speed increases due to higher pressure losses and conversion of pressure energy to kinetic energy inside the runner. Increasing blade number increases power developed but, efficiency does not increase always. Efficiency increases for some blade number and drops down due to the fact that  change in direction of the relative flow vector at the runner exit, which decreases the net rotational momentum and increases the axial flow velocity.

  19. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  20. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  1. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  2. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  3. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  4. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  5. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  6. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  7. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  8. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  9. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  10. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  11. Hydrothermal waves in evaporating sessile drops

    OpenAIRE

    Brutin, D.; Rigollet, F.; Niliot, C. Le

    2009-01-01

    Drop evaporation is a simple phenomena but still unclear concerning the mechanisms of evaporation. A common agreement of the scientific community based on experimental and numerical work evidences that most of the evaporation occurs at the triple line. However, the rate of evaporation is still empirically predicted due to the lack of knowledge on the convection cells which develop inside the drop under evaporation. The evaporation of sessile drop is more complicated than it appears due to the...

  12. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  13. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

    Directory of Open Access Journals (Sweden)

    Dae-Kyo Jeong

    2017-11-01

    Full Text Available In this paper, we model and investigate the random access (RA performance of sensor nodes (SN in a wireless sensor network (WSN. In the WSN, a central head sensor (HS collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

  14. Hymenopterous parasitoids attacking Acanthiophilus helianthi Rossi (Diptera: Tephritidae pupae in Kohgiluyeh Safflower farms of Iran

    Directory of Open Access Journals (Sweden)

    K. Saeidi

    2016-12-01

    Full Text Available The Safflower capsule fly (SCF, Acanthiophilus helianthi Rossi (Diptera: Tephritidae is the most destructive insect pest attacking the Safflower Carthamus tinctorius L. plant which are cultivated as an oil crop. It is mainly controlled through application of broad-spectrum insecticides, which can adversely affect safflower farms ecosystem and consequently human health. Since a first step in setting up an integrated pest management program is to assess the biological control agents within the ecosystem. Therefore, in this research work the pupal parasitoids of Safflower capsule fly a main insect pest attacking Safflower plants were identified. The impact of these parasitoids against this pest was evaluated on the varying pest generations and within different locations in Kohgiluyeh province during 2008-2009 seasons. Pupal parasitoid adults of SCF were recorded from fieldreared pupae, which had been collected from heavily infested small flower heads of the first generation as well from large flower heads of the second and third generations. Rate of parasitism on A. helianthi pupae was estimated as the number of parasitoids over the total count of parasitoids and flies. Ten hymenopterous species belonging to different families parasitizing insect pupae were screened as follows: Bracon hebetor (Spinola, 1808 and Bracon luteator (Spinola, 1808 (Braconidae; Isocolus tinctorious (Melika and Gharaei, 2006 (Cynipidae; Pronotalia carlinarum (Szelenyi and Erdos, 1951 (Eulophidae; Eurytoma acroptilae (Zerova, 1986 (Eurytomidae; Ormyrus orientalis (Walker, 1871 (Ormyridae; Colotrechnus viridis (Masi, 1921 and Pteromalus sp. (Walker, 1976 (Pteromalidae; and Antistrophoplex conthurnatus (Zerova, 2000 and Microdontomenus annulatus (Masi, 1899 (Torymidae. The average parasitization rate was 23±1 as revealed through the present study. The highest parasitization rate occurred during the first generation in all localities tested, as well as in years. Statistical

  15. The Effect of Soil Type and Moisture Content on Head Impacts on Natural Grass Athletic Fields

    Directory of Open Access Journals (Sweden)

    Kyley Dickson

    2018-02-01

    Full Text Available Studies are warranted to evaluate head injury criterion (HIC on athletic fields to determine baseline numbers and compare those findings to current critical thresholds for impact attenuation. A two year (2016 and 2017 study was conducted on University of Tennessee athletic fields (Knoxville, TN, USA to determine the effect of soil type (cohesive soil, United States Golf Association sand specifications and grass species (Poa pratensis and Cynodon dactylon × C. transvaalensis on HIC. Additionally soil moisture conditions monitored were: dry (0.06–0.16 m3/m3, acceptable (0.17–0.29 m3/m3, and wet (0.30–0.40 m3/m3. A linear relationship (r = 0.91 was identified between drop height (0.5–2.9 M and HIC value (35-1423 HIC on granular root zones of both grass types. However, HIC on cohesive soil is a function of soil water content in addition to drop height. These results demonstrate to aid in head injury prevention on cohesive soil athletic fields the HIC can be lowered by managing soil water content.

  16. Referred pain from myofascial trigger points in head and neck-shoulder muscles reproduces head pain features in children with chronic tension type headache.

    Science.gov (United States)

    Fernández-de-las-Peñas, César; Fernández-Mayoralas, Daniel M; Ortega-Santiago, Ricardo; Ambite-Quesada, Silvia; Palacios-Ceña, Domingo; Pareja, Juan A

    2011-02-01

    Our aim was to describe the referred pain pattern and areas from trigger points (TrPs) in head, neck, and shoulder muscles in children with chronic tension type headache (CTTH). Fifty children (14 boys, 36 girls, mean age: 8 ± 2) with CTTH and 50 age- and sex- matched children participated. Bilateral temporalis, masseter, superior oblique, upper trapezius, sternocleidomastoid, suboccipital, and levator scapula muscles were examined for TrPs by an assessor blinded to the children's condition. TrPs were identified with palpation and considered active when local and referred pains reproduce headache pain attacks. The referred pain areas were drawn on anatomical maps, digitalized, and also measured. The total number of TrPs was significantly greater in children with CTTH as compared to healthy children (P < 0.001). Active TrPs were only present in children with CTTH (P < 0.001). Within children with CTTH, a significant positive association between the number of active TrPs and headache duration (r (s) = 0.315; P = 0.026) was observed: the greater the number of active TrPs, the longer the duration of headache attack. Significant differences in referred pain areas between groups (P < 0.001) and muscles (P < 0.001) were found: the referred pain areas were larger in CTTH children (P < 0.001), and the referred pain area elicited by suboccipital TrPs was larger than the referred pain from the remaining TrPs (P < 0.001). Significant positive correlations between some headache clinical parameters and the size of the referred pain area were found. Our results showed that the local and referred pains elicited from active TrPs in head, neck and shoulder shared similar pain pattern as spontaneous CTTH in children, supporting a relevant role of active TrPs in CTTH in children.

  17. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  18. Parametric resonance in acoustically levitated water drops

    International Nuclear Information System (INIS)

    Shen, C.L.; Xie, W.J.; Wei, B.

    2010-01-01

    Liquid drops can be suspended in air with acoustic levitation method. When the sound pressure is periodically modulated, the levitated drop is usually forced into an axisymmetric oscillation. However, a transition from axisymmetric oscillation into sectorial oscillation occurs when the modulation frequency approaches some specific values. The frequency of the sectorial oscillation is almost exactly half of the modulation frequency. It is demonstrated that this transition is induced by the parametric resonance of levitated drop. The natural frequency of sectorial oscillation is found to decrease with the increase of drop distortion extent.

  19. Parametric resonance in acoustically levitated water drops

    Energy Technology Data Exchange (ETDEWEB)

    Shen, C.L.; Xie, W.J. [Department of Applied Physics, Northwestern Polytechnical University, Xi' an 710072 (China); Wei, B., E-mail: bbwei@nwpu.edu.c [Department of Applied Physics, Northwestern Polytechnical University, Xi' an 710072 (China)

    2010-05-10

    Liquid drops can be suspended in air with acoustic levitation method. When the sound pressure is periodically modulated, the levitated drop is usually forced into an axisymmetric oscillation. However, a transition from axisymmetric oscillation into sectorial oscillation occurs when the modulation frequency approaches some specific values. The frequency of the sectorial oscillation is almost exactly half of the modulation frequency. It is demonstrated that this transition is induced by the parametric resonance of levitated drop. The natural frequency of sectorial oscillation is found to decrease with the increase of drop distortion extent.

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  1. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  2. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  3. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  4. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  5. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  6. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  7. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  8. Deformed liquid marbles: Freezing drop oscillations with powders

    KAUST Repository

    Marston, Jeremy; Zhu, Y.; Vakarelski, Ivan Uriev; Thoroddsen, Sigurdur T

    2012-01-01

    In this work we show that when a liquid drop impacts onto a fine-grained hydrophobic powder, the final form of the drop can be very different from the spherical form with which it impacts. In all cases, the drop rebounds due to the hydrophobic nature of the powder. However, we find that above a critical impact speed, the drop undergoes a permanent deformation to a highly non-spherical shape with a near-complete coverage of powder, which then freezes the drop oscillations during rebound. © 2012 Elsevier B.V.

  9. Deformed liquid marbles: Freezing drop oscillations with powders

    KAUST Repository

    Marston, Jeremy

    2012-09-01

    In this work we show that when a liquid drop impacts onto a fine-grained hydrophobic powder, the final form of the drop can be very different from the spherical form with which it impacts. In all cases, the drop rebounds due to the hydrophobic nature of the powder. However, we find that above a critical impact speed, the drop undergoes a permanent deformation to a highly non-spherical shape with a near-complete coverage of powder, which then freezes the drop oscillations during rebound. © 2012 Elsevier B.V.

  10. Meningioma of Foramen Magnum Causing Drop Attacks

    Directory of Open Access Journals (Sweden)

    Amit Mahore

    2015-01-01

    Full Text Available A 52-year-old female presented with frequent episodes of falls without loss of consciousness. These episodes lasted for brief period followed by full neurological recovery. Magnetic resonance imaging (MRI of the brain showed foramen magnum meningioma encasing left vertebral artery. The patient had dramatic improvement after excision of the tumor.

  11. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  12. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  13. Levitation of a drop over a film flow

    Science.gov (United States)

    Sreenivas, K. R.; de, P. K.; Arakeri, Jaywant H.

    1999-02-01

    A vertical jet of water impinging on a horizontal surface produces a radial film flow followed by a circular hydraulic jump. We report a phenomenon where fairly large (1 ml) drops of liquid levitate just upstream of the jump on a thin air layer between the drop and the film flow. We explain the phenomenon using lubrication theory. Bearing action both in the air film and the water film seems to be necessary to support large drops. Horizontal support is given to the drop by the hydraulic jump. A variety of drop shapes is observed depending on the volume of the drop and liquid properties. We show that interaction of the forces due to gravity, surface tension, viscosity and inertia produces these various shapes.

  14. Head injury as a PTSD predictor among Oklahoma City bombing survivors.

    Science.gov (United States)

    Walilko, Timothy; North, Carol; Young, Lee Ann; Lux, Warren E; Warden, Deborah L; Jaffee, Michael S; Moore, David F

    2009-12-01

    The aim of the Oklahoma City (OKC) bombing retrospective review was to investigate the relationship between physical injury, environmental contributors, and psychiatric disorders such as posttraumatic stress disorder (PTSD) in an event-based, matched design study focused on injury. The 182 selected participants were a random subset of the 1,092 direct survivors from the OKC bombing. Only 124 of these 182 cases had a full complement of medical/clinical data in the OKC database. These 124 cases were assessed to explore relationships among PTSD diagnoses, levels of blast exposure, and physical injuries. Associations among variables were statistically tested using contingency analysis and logistic regression. Comparison of the PTSD cases to symptoms/diagnoses reported in the medical records reveals a statistically significant association between PTSD and head/brain injuries associated with head acceleration. PTSD was not highly correlated with other injuries. Although blast pressure and impulse were highly correlated with head injuries, the correlation with PTSD was not statistically significant. Thus, a correlation between blast pressure and PTSD may exist, but higher fidelity pressure calculations are required to elucidate this potential relationship. This study provides clear evidence that head injury is associated with subsequent PTSD, giving caregivers' information on what physical injuries may suggest the development of psychologic disorders to aid them in developing a profile for the identification of future survivors of terrorist attacks and Warfighters with brain injuries and potential PTSD.

  15. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  16. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  17. Stability of Armour Units in Oscillatory Flow

    OpenAIRE

    Burcharth, Hans F.; Thompson, A. C.

    1983-01-01

    As part of a program to study the hydraulics of wave attack on rubble mound breakwaters tests were made on model armour units in a steady flow through a layer laid on a slope. The flow angle has little effect on stability for dolosse or rock layers. The head drop at failure across each type of layer is similar but the dolosse layer is more permeable and fails as a whole. There was no viscous scale effect. These results and earlier tests in oscillating flow suggest a 'reservoir' effect is impo...

  18. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  1. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  2. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  3. Drop Test Results of CRDM under Seismic Loads

    International Nuclear Information System (INIS)

    Choi, Myoung-Hwan; Cho, Yeong-Garp; Kim, Gyeong-Ho; Sun, Jong-Oh; Huh, Hyung

    2016-01-01

    This paper describes the test results to demonstrate the drop performance of CRDM under seismic loads. The top-mounted CRDM driven by the stepping motor for Jordan Research and Training Reactor (JRTR) has been developed in KAERI. The CRDM for JRTR has been optimized by the design improvement based on that of the HANARO. It is necessary to verify the drop performance under seismic loads such as operating basis earthquake (OBE) and safe shutdown earthquake (SSE). Especially, the CAR drop times are important data for the safety analysis. confirm the drop performance under seismic loads. The delay of drop time at Rig no. 2 due to seismic loads is greater than that at Rig no. 3. The total pure drop times under seismic loads are estimated as 1.169 and 1.855, respectively

  4. Drop Test Results of CRDM under Seismic Loads

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Myoung-Hwan; Cho, Yeong-Garp; Kim, Gyeong-Ho; Sun, Jong-Oh; Huh, Hyung [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    This paper describes the test results to demonstrate the drop performance of CRDM under seismic loads. The top-mounted CRDM driven by the stepping motor for Jordan Research and Training Reactor (JRTR) has been developed in KAERI. The CRDM for JRTR has been optimized by the design improvement based on that of the HANARO. It is necessary to verify the drop performance under seismic loads such as operating basis earthquake (OBE) and safe shutdown earthquake (SSE). Especially, the CAR drop times are important data for the safety analysis. confirm the drop performance under seismic loads. The delay of drop time at Rig no. 2 due to seismic loads is greater than that at Rig no. 3. The total pure drop times under seismic loads are estimated as 1.169 and 1.855, respectively.

  5. Impact of granular drops

    KAUST Repository

    Marston, J. O.

    2013-07-15

    We investigate the spreading and splashing of granular drops during impact with a solid target. The granular drops are formed from roughly spherical balls of sand mixed with water, which is used as a binder to hold the ball together during free-fall. We measure the instantaneous spread diameter for different impact speeds and find that the normalized spread diameter d/D grows as (tV/D)1/2. The speeds of the grains ejected during the “splash” are measured and they rarely exceed twice that of the impact speed.

  6. Impact of granular drops

    KAUST Repository

    Marston, J. O.; Mansoor, Mohammad M.; Thoroddsen, Sigurdur T

    2013-01-01

    We investigate the spreading and splashing of granular drops during impact with a solid target. The granular drops are formed from roughly spherical balls of sand mixed with water, which is used as a binder to hold the ball together during free-fall. We measure the instantaneous spread diameter for different impact speeds and find that the normalized spread diameter d/D grows as (tV/D)1/2. The speeds of the grains ejected during the “splash” are measured and they rarely exceed twice that of the impact speed.

  7. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  8. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  9. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  10. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  11. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  12. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  13. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  14. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  15. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  16. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  19. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  20. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  1. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  2. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Forecasting Individual Headache Attacks Using Perceived Stress: Development of a Multivariable Prediction Model for Persons With Episodic Migraine.

    Science.gov (United States)

    Houle, Timothy T; Turner, Dana P; Golding, Adrienne N; Porter, John A H; Martin, Vincent T; Penzien, Donald B; Tegeler, Charles H

    2017-07-01

    To develop and validate a prediction model that forecasts future migraine attacks for an individual headache sufferer. Many headache patients and physicians believe that precipitants of headache can be identified and avoided or managed to reduce the frequency of headache attacks. Of the numerous candidate triggers, perceived stress has received considerable attention for its association with the onset of headache in episodic and chronic headache sufferers. However, no evidence is available to support forecasting headache attacks within individuals using any of the candidate headache triggers. This longitudinal cohort with forecasting model development study enrolled 100 participants with episodic migraine with or without aura, and N = 95 contributed 4626 days of electronic diary data and were included in the analysis. Individual headache forecasts were derived from current headache state and current levels of stress using several aspects of the Daily Stress Inventory, a measure of daily hassles that is completed at the end of each day. The primary outcome measure was the presence/absence of any headache attack (head pain > 0 on a numerical rating scale of 0-10) over the next 24 h period. After removing missing data (n = 431 days), participants in the study experienced a headache attack on 1613/4195 (38.5%) days. A generalized linear mixed-effects forecast model using either the frequency of stressful events or the perceived intensity of these events fit the data well. This simple forecasting model possessed promising predictive utility with an AUC of 0.73 (95% CI 0.71-0.75) in the training sample and an AUC of 0.65 (95% CI 0.6-0.67) in a leave-one-out validation sample. This forecasting model had a Brier score of 0.202 and possessed good calibration between forecasted probabilities and observed frequencies but had only low levels of resolution (ie, sharpness). This study demonstrates that future headache attacks can be forecasted for a diverse group of

  5. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  6. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  7. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  8. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  10. Thyrotoxicosis Presenting as Unilateral Drop Foot.

    Science.gov (United States)

    Hara, Kenju; Miyata, Hajime; Motegi, Takahide; Shibano, Ken; Ishiguro, Hideaki

    2017-01-01

    Neuromuscular disorders associated with hyperthyroidism have several variations in their clinical phenotype, such as ophthalmopathy, periodic paralysis, and thyrotoxic myopathy. We herein report an unusual case of thyrotoxic myopathy presenting as unilateral drop foot. Histopathological examinations of the left tibialis anterior muscle showed marked variation in the fiber size, mild inflammatory cell infiltration, and necrotic and regenerated muscle fibers with predominantly type 1 fiber atrophy. Medical treatment with propylthiouracil resulted in complete improvement of the left drop foot. This case expands the phenotype of thyrotoxicosis and suggests that thyrotoxicosis be considered as a possible cause of unilateral drop foot.

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  12. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  13. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  14. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  15. Bubble and Drop Nonlinear Dynamics (BDND)

    Science.gov (United States)

    Trinh, E. H.; Leal, L. Gary; Thomas, D. A.; Crouch, R. K.

    1998-01-01

    Free drops and bubbles are weakly nonlinear mechanical systems that are relatively simple to characterize experimentally in 1-G as well as in microgravity. The understanding of the details of their motion contributes to the fundamental study of nonlinear phenomena and to the measurement of the thermophysical properties of freely levitated melts. The goal of this Glovebox-based experimental investigation is the low-gravity assessment of the capabilities of a modular apparatus based on ultrasonic resonators and on the pseudo- extinction optical method. The required experimental task is the accurate measurements of the large-amplitude dynamics of free drops and bubbles in the absence of large biasing influences such as gravity and levitation fields. A single-axis levitator used for the positioning of drops in air, and an ultrasonic water-filled resonator for the trapping of air bubbles have been evaluated in low-gravity and in 1-G. The basic feasibility of drop positioning and shape oscillations measurements has been verified by using a laptop-interfaced automated data acquisition and the optical extinction technique. The major purpose of the investigation was to identify the salient technical issues associated with the development of a full-scale Microgravity experiment on single drop and bubble dynamics.

  16. Drop Testing Representative Multi-Canister Overpacks

    Energy Technology Data Exchange (ETDEWEB)

    Snow, Spencer D. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Morton, Dana K. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-06-01

    The objective of the work reported herein was to determine the ability of the Multi- Canister Overpack (MCO) canister design to maintain its containment boundary after an accidental drop event. Two test MCO canisters were assembled at Hanford, prepared for testing at the Idaho National Engineering and Environmental Laboratory (INEEL), drop tested at Sandia National Laboratories, and evaluated back at the INEEL. In addition to the actual testing efforts, finite element plastic analysis techniques were used to make both pre-test and post-test predictions of the test MCOs structural deformations. The completed effort has demonstrated that the canister design is capable of maintaining a 50 psig pressure boundary after drop testing. Based on helium leak testing methods, one test MCO was determined to have a leakage rate not greater than 1x10-5 std cc/sec (prior internal helium presence prevented a more rigorous test) and the remaining test MCO had a measured leakage rate less than 1x10-7 std cc/sec (i.e., a leaktight containment) after the drop test. The effort has also demonstrated the capability of finite element methods using plastic analysis techniques to accurately predict the structural deformations of canisters subjected to an accidental drop event.

  17. Spent Nuclear Fuel (SNF) Bounding Drop Support Calculations

    International Nuclear Information System (INIS)

    CHENAULT, D.M.

    1999-01-01

    This report evaluates different drop heights, concrete and other impact media to which the transport package and/or the MCO is dropped. A prediction method is derived for estimating the resultant impact factor for determining the bounding drop case for the SNF Project

  18. Wetting and evaporation of binary mixture drops.

    Science.gov (United States)

    Sefiane, Khellil; David, Samuel; Shanahan, Martin E R

    2008-09-11

    Experimental results on the wetting behavior of water, methanol, and binary mixture sessile drops on a smooth, polymer-coated substrate are reported. The wetting behavior of evaporating water/methanol drops was also studied in a water-saturated environment. Drop parameters (contact angle, shape, and volume) were monitored in time. The effects of the initial relative concentrations on subsequent evaporation and wetting dynamics were investigated. Physical mechanisms responsible for the various types of wetting behavior during different stages are proposed and discussed. Competition between evaporation and hydrodynamic flow are evoked. Using an environment saturated with water vapor allowed further exploration of the controlling mechanisms and underlying processes. Wetting stages attributed to differential evaporation of methanol were identified. Methanol, the more volatile component, evaporates predominantly in the initial stage. The data, however, suggest that a small proportion of methanol remained in the drop after the first stage of evaporation. This residual methanol within the drop seems to influence subsequent wetting behavior strongly.

  19. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  20. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  1. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  2. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  3. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  4. Drop-out from a psychodynamic group psychotherapy outpatient unit.

    Science.gov (United States)

    Jensen, Hans Henrik; Mortensen, Erik Lykke; Lotz, Martin

    2014-11-01

    BACKGROUND. Drop-out from psychotherapy is common and represents a considerable problem in clinical practice and research. Aim. To explore pre-treatment predictors of early and late drop-out from psychodynamic group therapy in a public outpatient unit for non-psychotic disorders in Denmark. Methods. Naturalistic design including 329 patients, the majority with mood, neurotic and personality disorders referred to 39-session group therapy. Predictors were socio-demographic and clinical variables, self-reported symptoms (Symptom Check List-90-Revised) and personality style (Millon Clinical Multiaxial Inventory-II). Drop-out was classified into early and late premature termination excluding patients who dropped out for external reasons. Results. Drop-out comprised 20.6% (68 patients) of the sample. Logistic regression revealed social functioning, vocational training, alcohol problems and antisocial behavior to be related to drop-out. However, early drop-outs had prominent agoraphobic symptoms, lower interpersonal sensitivity and compulsive personality features, and late drop-outs cognitive and somatic anxiety symptoms and antisocial personality features. Clinical and psychological variables accounted for the major part of variance in predictions of drop-out, which ranged from 15.6% to 19.5% (Nagelkerke Pseudo R-Square). Conclusion. Social functioning was consistently associated with drop-out, but personality characteristics and anxiety symptoms differentiated between early and late drop-out. Failure to discriminate between stages of premature termination may explain some of the inconsistencies in the drop-out literature. Clinical implications. Before selection of patients to time-limited psychodynamic groups, self-reported symptoms should be thoroughly considered. Patients with agoraphobic symptoms should be offered alternative treatment. Awareness of and motivation to work with interpersonal issues may be essential for compliance with group therapy.

  5. Reducing Variability in Stress Drop with Root-Mean Acceleration

    Science.gov (United States)

    Crempien, J.; Archuleta, R. J.

    2012-12-01

    Stress drop is a fundamental property of the earthquake source. For a given tectonic region stress drop is assumed to be constant allowing for the scaling of earthquake spectra. However, the variability of the stress drop, either for worldwide catalogs or regional catalogs, is quite large. The variability around the median value is on the order of 1.5 in log10 units. One question that continues to pervade the analysis of stress drop is whether this variability is an inherent characteristic of the Earth or is an artifact of the determination of stress drop via the use of the spectral analysis. It is simple to see that the stress drop determined by seismic moment times corner frequency cubed that errors in the corner frequency will strongly influence the variability in the stress drop. To avoid this strong dependence on corner frequency cubed, we have examined the determination of stress drop based on the approach proposed by Hanks (1979), namely using the root-mean-square acceleration. The stress drop determined using rms acceleration may be advantageous because the stress drop is only affected by the square root of the corner frequency. To test this approach we have determined stress drops for the 2000 Tottori earthquake and its aftershocks. We use both the classic method of fitting to a spectrum as well as using rms acceleration. For a preliminary analysis of eight aftershocks and the mainshock we find that the variability in stress drop is reduced by about a factor of two. This approach needs more careful analysis of more events, which will be shown at the meeting.

  6. Why Do Students Drop Advanced Mathematics?

    Science.gov (United States)

    Horn, Ilana

    2004-01-01

    Students, especially black, Latino and Native American youth and students of low socio-economic status drop out of advanced mathematics. Teachers must coordinate their expectations, their knowledge of students and their teaching practices in order to stop struggling students from dropping out of advanced math classes.

  7. Delayed frost growth on jumping-drop superhydrophobic surfaces.

    Science.gov (United States)

    Boreyko, Jonathan B; Collier, C Patrick

    2013-02-26

    Self-propelled jumping drops are continuously removed from a condensing superhydrophobic surface to enable a micrometric steady-state drop size. Here, we report that subcooled condensate on a chilled superhydrophobic surface are able to repeatedly jump off the surface before heterogeneous ice nucleation occurs. Frost still forms on the superhydrophobic surface due to ice nucleation at neighboring edge defects, which eventually spreads over the entire surface via an interdrop frost wave. The growth of this interdrop frost front is shown to be up to 3 times slower on the superhydrophobic surface compared to a control hydrophobic surface, due to the jumping-drop effect dynamically minimizing the average drop size and surface coverage of the condensate. A simple scaling model is developed to relate the success and speed of interdrop ice bridging to the drop size distribution. While other reports of condensation frosting on superhydrophobic surfaces have focused exclusively on liquid-solid ice nucleation for isolated drops, these findings reveal that the growth of frost is an interdrop phenomenon that is strongly coupled to the wettability and drop size distribution of the surface. A jumping-drop superhydrophobic condenser minimized frost formation relative to a conventional dropwise condenser in two respects: preventing heterogeneous ice nucleation by continuously removing subcooled condensate, and delaying frost growth by limiting the success of interdrop ice bridge formation.

  8. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  9. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  10. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  11. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  12. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  13. Hanging drop crystal growth apparatus and method

    Science.gov (United States)

    Carter, Daniel C. (Inventor); Smith, Robbie E. (Inventor)

    1989-01-01

    An apparatus (10) is constructed having a cylindrical enclosure (16) within which a disc-shaped wicking element (18) is positioned. A well or recess (22) is cut into an upper side (24) of this wicking element, and a glass cover plate or slip (28) having a protein drop disposed thereon is sealably positioned on the wicking element (18), with drop (12) being positioned over well or recess (22). A flow of control fluid is generated by a programmable gradient former (16), with this control fluid having a vapor pressure that is selectively variable. This flow of control fluid is coupled to the wicking element (18) where control fluid vapor diffusing from walls (26) of the recess (22) is exposed to the drop (12), forming a vapor pressure gradient between the drop (12) and the control fluid vapor. Initially, this gradient is adjusted to draw solvent from the drop (12) at a relatively high rate, and as the critical supersaturation point is approached (the point at which crystal nucleation occurs), the gradient is reduced to more slowly draw solvent from the drop (12). This allows discrete protein molecules more time to orient themselves into an ordered crystalline lattice, producing protein crystals which, when processed by X-ray crystallography, possess a high degree of resolution.

  14. Free drop impact analysis of shipping cask

    International Nuclear Information System (INIS)

    Pfeiffer, P.A.; Kennedy, J.M.

    1989-01-01

    The WHAMS-2D and WHAMS-3D codes were used to analyze the dynamic response of the RAS/TREAT shielded shipping cask subjected to transient leadings for the purpose of assessing potential damage to the various components that comprise the the cask. The paper describes how these codes can be used to provide and intermediate level of detail between full three-dimensional finite element calculations and hand calculations which are cost effective for design purposes. Three free drops were adressed: (1) a thirty foot axial drop on either end; (2) a thirty foot oblique angle drop with the cask having several different orientations from the vertical with impact on the cask corner; and (3) a thirty foot side drop with simultaneous impact on the lifting trunnion and the bottom end. Results are presented for two models of the side and oblique angle drops; one model includes only the mass of the lapped sleeves of depleted uranium (DU) while the other includes the mass and stiffness of the DU. The results of the end drop analyses are given for models with and without imperfections in the cask. Comparison of the analysis to hand calculations and simplified analyses are given. (orig.)

  15. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  16. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  17. Electrowetting-on-dielectrics for manipulation of oil drops and gas bubbles in aqueous-shell compound drops.

    Science.gov (United States)

    Li, Jiang; Wang, Yixuan; Chen, Haosheng; Wan, Jiandi

    2014-11-21

    We present the manipulation of oil, organic and gaseous chemicals by electrowetting-on-dielectric (EWOD) technology using aqueous-shell compound drops. We demonstrate that the transport and coalescence of viscous oil drops, the reaction of bromine with styrene in benzene solution, and the reaction of red blood cells with carbon monoxide bubbles can be accomplished using this method.

  18. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  19. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  20. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  1. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  2. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  3. Experimental and Computational Analysis of Unidirectional Flow Through Stirling Engine Heater Head

    Science.gov (United States)

    Wilson, Scott D.; Dyson, Rodger W.; Tew, Roy C.; Demko, Rikako

    2006-01-01

    A high efficiency Stirling Radioisotope Generator (SRG) is being developed for possible use in long-duration space science missions. NASA s advanced technology goals for next generation Stirling convertors include increasing the Carnot efficiency and percent of Carnot efficiency. To help achieve these goals, a multi-dimensional Computational Fluid Dynamics (CFD) code is being developed to numerically model unsteady fluid flow and heat transfer phenomena of the oscillating working gas inside Stirling convertors. In the absence of transient pressure drop data for the zero mean oscillating multi-dimensional flows present in the Technology Demonstration Convertors on test at NASA Glenn Research Center, unidirectional flow pressure drop test data is used to compare against 2D and 3D computational solutions. This study focuses on tracking pressure drop and mass flow rate data for unidirectional flow though a Stirling heater head using a commercial CFD code (CFD-ACE). The commercial CFD code uses a porous-media model which is dependent on permeability and the inertial coefficient present in the linear and nonlinear terms of the Darcy-Forchheimer equation. Permeability and inertial coefficient were calculated from unidirectional flow test data. CFD simulations of the unidirectional flow test were validated using the porous-media model input parameters which increased simulation accuracy by 14 percent on average.

  4. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  5. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  6. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  7. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  8. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  9. Studying the field induced breakup of acoustically levitated drops

    Science.gov (United States)

    Warschat, C.; Riedel, J.

    2017-10-01

    Coulomb fission of charged droplets (The terms drop and droplet are often used synonymous. Throughout this manuscript, to avoid confusion, the terms drop and droplet will be used for liquid spheres with radii in the millimeter range and the micrometer range, respectively. In our experiments, the first correspond to the parent drop while the latter describes the ejected progeny droplets.) is a well-studied natural phenomenon. Controlled droplet fission is already successfully employed in several technological applications. Still, since the occurring surface rupture relies on the exact understanding and description of the liquid gas boundary, some details are still under debate. Most empirical systematic studies observe falling micrometer droplets passing through the electric field inside a plate capacitor. This approach, although easily applicable and reliable, limits the experimental degrees of freedom regarding the observable time and the maximum size of the drops and can only be performed in consecutive individual observations of different subsequent drops. Here we present a novel setup to study the field induced breakup of acoustically levitated drops. The design does not bear any restrictions towards the temporal window of observation, and allows handling of drops of a tunable radius ranging from 10 μm to several millimeters and a real-time monitoring of one single drop. Our comprehensive study includes a time resolved visual inspection, laser shadowgraphy, laser induced fluorescence imaging, and ambient mass spectrometric interrogation of the nascent Taylor cone. The results shown for a millimeter sized drop, previously inaccessible for Coulomb fission experiments, are mostly comparable with previous results for smaller drops. The major difference is the time scale and the threshold potential of the drop rupture. Both values, however, resemble theoretically extrapolations to the larger radius. The technique allows for a systematic study of breakup behavior of

  10. Motion of a drop driven by substrate vibrations

    Science.gov (United States)

    Brunet, P.; Eggers, J.; Deegan, R. D.

    2009-01-01

    We report an experimental study of liquid drops moving against gravity, when placed on a vertically vibrating inclined plate, which is partially wet by the drop. Frequency of vibrations ranges from 30 to 200 Hz, and above a threshold in vibration acceleration, drops experience an upward motion. We attribute this surprising motion to the deformations of the drop, as a consequence of an up/down symmetry-breaking induced by the presence of the substrate. We relate the direction of motion to contact angle measurements.

  11. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  12. Experimental Investigation of 3-D flow fields around the mouth of the Dwarf Seahorse during attacks on planktonic prey

    Science.gov (United States)

    Gemmell, Brad; Buskey, Edward; Sheng, Jian

    2009-11-01

    Copepods are an important planktonic food source for fish species. High predation has led to the development of effective escape responses with short reaction times (less than 2 ms), maximum escape velocities of over 500 body lengths per second and shear sensitivity as low as 1.5s-1. Using high speed digital holography (2 kfps), we measure 3-D distributions of velocity generated by a dwarf seahorse (Hippocampus zosterae) during attacks on its copepod prey, Acartia tonsa. It is found that successful attacks often produce smaller or even no detectable hydrodynamic disturbances around the strike zone, when compared to unsuccessful attempts. In this paper, we will provide quantitative characterization of this ``low-flow'' zone. Further, to elucidate the role of a possible geometrical advantage of the seahorse's head in minimizing its bow wave, high-speed time resolved PIV measurements are conducted in a low-speed water tunnel. On-going analysis will provide insights and implications in understanding the dynamics of flows around the stagnation point at high Reynolds number flow. Sponsored by NSF.

  13. The new Drop Tower catapult system

    Science.gov (United States)

    von Kampen, Peter; Kaczmarczik, Ulrich; Rath, Hans J.

    2006-07-01

    The Center of Applied Space Technology and Microgravity (ZARM) was founded in 1985 as an institute of the University Bremen, which focuses on research on gravitational and space-related phenomena. In 1988, the construction of the "Drop Tower" began. Since then, the eye-catching tower with a height of 146 m and its characteristic glass roof has become the emblem of the technology centre in Bremen. The Drop Tower Bremen provides a facility for experiments under conditions of weightlessness. Items are considered weightless, when they are in "free fall", i.e. moving without propulsion within the gravity field of the earth. The height of the tower limits the simple "free fall" experiment period to max. 4.74 s. With the inauguration of the catapult system in December 2004, the ZARM is entering a new dimension. This world novelty will meet scientists' demands of extending the experiment period up to 9.5 s. Since turning the first sod on May 3rd, 1988, the later installation of the catapult system has been taken into account by building the necessary chamber under the tower. The catapult system is located in a chamber 10 m below the base of the tower. This chamber is almost completely occupied by 12 huge pressure tanks. These tanks are placed around the elongation of the vacuum chamber of the drop tube. In its centre there is the pneumatic piston that accelerates the drop capsule by the pressure difference between the vacuum inside the drop tube and the pressure inside the tanks. The acceleration level is adjusted by means of a servo hydraulic breaking system controlling the piston velocity. After only a quarter of a second the drop capsule achieves its lift-off speed of 175 km/h. With this exact speed, the capsule will rise up to the top of the tower and afterwards fall down again into the deceleration unit which has been moved under the drop tube in the meantime. The scientific advantages of the doubled experiment time are obvious: during almost 10 s of high

  14. Heads Up

    Science.gov (United States)

    ... Connect with Us HEADS UP Apps Reshaping the Culture Around Concussion in Sports Get HEADS UP on Your Web Site Concussion ... HEADS UP on your web site! Create a culture of safety for young athletes Officials, learn how you can ... UP to Providers HEADS UP to Youth Sports HEADS UP to School Sports HEADS UP to ...

  15. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  16. Theory of magnetostriction of electron-hole drops in Ge

    International Nuclear Information System (INIS)

    Markiewicz, R.S.

    1978-01-01

    A large mass of electron-hole liquid (γ drop) formed in a strain-induced potential well in Ge is known to distort its shape significantly in a magnetic field B > or approx. = 1 kG. It is shown in this paper that the shape change can be understood in detail as due to a ''recombination current'' of electron-hole pairs needed to replace those pairs which recombine in the drop volume. The Lorentz force deflects this current and produces a macroscopic dipole current loop inside the drop. The drop then changes shape to minimize its total energy, including magnetic, strain, and surface energies. While the drop usually flattens along the field direction, both para- and diamagnetic effects (elongated drops) are found to be possible, depending on excitation conditions, in accord with experiment. Similar effects are predicted to occur in small drops in unstrained Ge. This paper presents a magnetohydrodynamic theory of the magnetostriction which takes into account density variations which occur in the strain well and in high magnetic fields. A simpler theory is given for the special case in which the drop may be considered incompressible (small drops and moderate fields). Effects of carrier mass anisotropy and fluid viscosity are taken into consideration

  17. Ground Motion Prediction Equations Empowered by Stress Drop Measurement

    Science.gov (United States)

    Miyake, H.; Oth, A.

    2015-12-01

    Significant variation of stress drop is a crucial issue for ground motion prediction equations and probabilistic seismic hazard assessment, since only a few ground motion prediction equations take into account stress drop. In addition to average and sigma studies of stress drop and ground motion prediction equations (e.g., Cotton et al., 2013; Baltay and Hanks, 2014), we explore 1-to-1 relationship for each earthquake between stress drop and between-event residual of a ground motion prediction equation. We used the stress drop dataset of Oth (2013) for Japanese crustal earthquakes ranging 0.1 to 100 MPa and K-NET/KiK-net ground motion dataset against for several ground motion prediction equations with volcanic front treatment. Between-event residuals for ground accelerations and velocities are generally coincident with stress drop, as investigated by seismic intensity measures of Oth et al. (2015). Moreover, we found faster attenuation of ground acceleration and velocities for large stress drop events for the similar fault distance range and focal depth. It may suggest an alternative parameterization of stress drop to control attenuation distance rate for ground motion prediction equations. We also investigate 1-to-1 relationship and sigma for regional/national-scale stress drop variation and current national-scale ground motion equations.

  18. Pressure Drop of Chamfer on Spacer Grid Strap

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Euijae; Kim, Kanghoon; Kim, Kyounghong; Nahm, Keeyil [KEPCO Nuclear Fuel Co., Daejeon (Korea, Republic of)

    2014-05-15

    A swirl flow and cross flow are generated by the spacer grid with mixing vane that enhances the thermal performance and critical heat flux (CHF). The additional pressure drop makes it difficult to meet acceptance criteria for overall pressure drop in fuel assembly depending upon the pump capacity. The chamfer on the end of spacer grid strap is one solution to reduce additional pressure drop without any adverse effect on flow fields. In this research, the pressure drop tests for spacer grid with and without chamfer were carried out at the hydraulic test facility. The result can be applied to develop high performance nuclear fuel assemblies for Pressurized Water Reactor (PWR) plants. The pressure drop tests for 5x5 spacer grid with and without chamfer as well as 6x6 spacer grid with and without chamfer were carried out at the INFINIT test facility. The Reynolds number ranged about from 16000 to 75000. The sweep-up and sweep-down test showed that the direction of sweep did not affect the pressure drop. The chamfer on spacer grid strap reduced the pressure drop due to the decreased in ratio of inlet area to outlet area. The pressure loss coefficient for spacer grid with chamfer was by up to 13.8 % lower than that for spacer grid without chamfer. Hence, the chamfer on spacer grid strap was one of effective ways to reduce the pressure drop.

  19. Drop impact entrapment of bubble rings

    KAUST Repository

    Thoraval, M.-J.

    2013-04-29

    We use ultra-high-speed video imaging to look at the initial contact of a drop impacting on a liquid layer. We observe experimentally the vortex street and the bubble-ring entrapments predicted numerically, for high impact velocities, by Thoraval et al. (Phys. Rev. Lett., vol. 108, 2012, article 264506). These dynamics mainly occur within 50 -s after the first contact, requiring imaging at 1 million f.p.s. For a water drop impacting on a thin layer of water, the entrapment of isolated bubbles starts through azimuthal instability, which forms at low impact velocities, in the neck connecting the drop and pool. For Reynolds number Re above -12 000, up to 10 partial bubble rings have been observed at the base of the ejecta, starting when the contact is -20% of the drop size. More regular bubble rings are observed for a pool of ethanol or methanol. The video imaging shows rotation around some of these air cylinders, which can temporarily delay their breakup into micro-bubbles. The different refractive index in the pool liquid reveals the destabilization of the vortices and the formation of streamwise vortices and intricate vortex tangles. Fine-scale axisymmetry is thereby destroyed. We show also that the shape of the drop has a strong influence on these dynamics. 2013 Cambridge University Press.

  20. Linear headache: a recurrent unilateral head pain circumscribed in a line-shaped area.

    Science.gov (United States)

    Wang, Yu; Tian, Miao-Miao; Wang, Xian-Hong; Zhu, Xiao-Qun; Liu, Ying; Lu, Ya-Nan; Pan, Qing-Qing

    2014-06-26

    A headache circumscribed in a line-shaped area but not confined to the territory of one particular nerve had ever been described in Epicrania Fugax (EF) of which the head pain is moving and ultrashort. In a 25-month period from Feb 2012 to Mar 2014, we encountered 12 patients with a paroxysmal motionless head pain restricted in a linear trajectory. The head pain trajectory was similar to that of EF, but its all other features obviously different from those of EF. We named this distinctive but undescribed type of headache linear headache (LH). A detailed clinical feature of the headache was obtained in all cases to differentiate with EF, trigeminal autonomic cephalalgias (TACs) and cranial neuralgia. Similarities and differences in clinical features were compared between LH and migraine. The twelve LH patients (mean age 43.9 ± 12.2) complained of a recurrent, moderate to severe, distending (n = 9), pressure-like (n = 3) or pulsating (n = 3) pain within a strictly unilateral line-shaped area. The painful line is distributed from occipital or occipitocervical region to the ipsilateral eye (n = 5), forehead (n = 6) or parietal region (n = 1). The pain line has a trajecory similar to that of EF but no characteristics of moving. The headache duration would be ranged from five minutes to three days, but usually from half day to one day in most cases (n = 8). Six patients had the accompaniment of nausea with or without vomiting, and two patients had the accompaniment of ipsilateral dizziness. The attacks could be either spontaneous (n = 10) or triggered by noise, depression and resting after physical activity (n = 1), or by stress and staying up late (n = 1). The frequency of attacks was variable. The patients had well response to flunarizine, sodium valproate and amitriptyline but not to carbamazepine or oxcarbazepine. LH is different from EF, trigeminal autonomic cephalalgias (TACs) and cranial neuralgia, but it had couple of features similar to that of migraine. The

  1. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  2. Marangoni Flow Induced Evaporation Enhancement on Binary Sessile Drops.

    Science.gov (United States)

    Chen, Pin; Harmand, Souad; Ouenzerfi, Safouene; Schiffler, Jesse

    2017-06-15

    The evaporation processes of pure water, pure 1-butanol, and 5% 1-butanol aqueous solution drops on heated hydrophobic substrates are investigated to determine the effect of temperature on the drop evaporation behavior. The evolution of the parameters (contact angle, diameter, and volume) during evaporation measured using a drop shape analyzer and the infrared thermal mapping of the drop surface recorded by an infrared camera were used in investigating the evaporation process. The pure 1-butanol drop does not show any thermal instability at different substrate temperatures, while the convection cells created by the thermal Marangoni effect appear on the surface of the pure water drop from 50 °C. Because 1-butanol and water have different surface tensions, the infrared video of the 5% 1-butanol aqueous solution drop shows that the convection cells are generated by the solutal Marangoni effect at any substrate temperature. Furthermore, when the substrate temperature exceeds 50 °C, coexistence of the thermal and solutal Marangoni flows is observed. By analyzing the relation between the ratio of the evaporation rate of pure water and 1-butanol aqueous solution drops and the Marangoni number, a series of empirical equations for predicting the evaporation rates of pure water and 1-butanol aqueous solution drops at the initial time as well as the equations for the evaporation rate of 1-butanol aqueous solution drop before the depletion of alcohol are derived. The results of these equations correspond fairly well to the experimental data.

  3. Drop-out rate and drop-out reasons among promising Norwegian track and field athletes: a 25 year study

    OpenAIRE

    Enoksen, Eystein

    2011-01-01

    © Eystein Enoksen, 2011 The aim of the present study was to identify the total drop-out rate and drop-out reasons for a group of promising track and field athletes. 202 males and 98 females, aged 16 ±2 years, took part in this study. Questionnaires were administrated in 1975, 1983, and 1989. In-depth interviews were conducted in 1989 and in 2000. A chi-square test was administrated to test the difference between males and females dropping out and to test the most significant reasons influe...

  4. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  5. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  6. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  7. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  8. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  9. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  10. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  11. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  12. University Drop-Out: An Italian Experience

    Science.gov (United States)

    Belloc, Filippo; Maruotti, Antonello; Petrella, Lea

    2010-01-01

    University students' drop-out is a crucial issue for the universities' efficiency evaluation and funding. In this paper, we analyze the drop-out rate of the Economics and Business faculty of Sapienza University of Rome. We use administrative data on 9,725 undergraduates students enrolled in three-years bachelor programs from 2001 to 2007 and…

  13. Acoustic forcing of a liquid drop

    Science.gov (United States)

    Lyell, M. J.

    1992-01-01

    The development of systems such as acoustic levitation chambers will allow for the positioning and manipulation of material samples (drops) in a microgravity environment. This provides the capability for fundamental studies in droplet dynamics as well as containerless processing work. Such systems use acoustic radiation pressure forces to position or to further manipulate (e.g., oscillate) the sample. The primary objective was to determine the effect of a viscous acoustic field/tangential radiation pressure forcing on drop oscillations. To this end, the viscous acoustic field is determined. Modified (forced) hydrodynamic field equations which result from a consistent perturbation expansion scheme are solved. This is done in the separate cases of an unmodulated and a modulated acoustic field. The effect of the tangential radiation stress on the hydrodynamic field (drop oscillations) is found to manifest as a correction to the velocity field in a sublayer region near the drop/host interface. Moreover, the forcing due to the radiation pressure vector at the interface is modified by inclusion of tangential stresses.

  14. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  15. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  16. Evaporation of a sessile water drop and a drop of aqueous salt solution.

    Science.gov (United States)

    Misyura, S Y

    2017-11-07

    The influence of various factors on the evaporation of drops of water and aqueous salt solution has been experimentally studied. Typically, in the studies of drop evaporation, only the diffusive vapor transfer, radiation and the molecular heat conduction are taken into account. However, vapor-gas convection plays an important role at droplet evaporation. In the absence of droplet boiling, the influence of gas convection turns out to be the prevailing factor. At nucleate boiling, a prevailing role is played by bubbles generation and vapor jet discharge at a bubble collapse. The gas convection behavior for water and aqueous salt solution is substantially different. With a growth of salt concentration over time, the influence of the convective component first increases, reaches an extremum and then significantly decreases. At nucleate boiling in a salt solution it is incorrect to simulate the droplet evaporation and the heat transfer in quasi-stationary approximation. The evaporation at nucleate boiling in a liquid drop is divided into several characteristic time intervals. Each of these intervals is characterized by a noticeable change in both the evaporation rate and the convection role.

  17. The origin of star-shaped oscillations of Leidenfrost drops

    Science.gov (United States)

    Ma, Xiaolei; Burton, Justin C.

    We experimentally investigate the oscillations of Leidenfrost drops of water, liquid nitrogen, ethanol, methanol, acetone and isopropyl alcohol. The drops levitate on a cushion of evaporated vapor over a hot, curved surface which keeps the drops stationary. We observe star-shaped modes along the periphery of the drop, with mode numbers n = 2 to 13. The number of observed modes is sensitive to the properties of the liquid. The pressure oscillation frequency in the vapor layer under the drop is approximately twice that of the drop frequency, which is consistent with a parametric forcing mechanism. However, the Rayleigh and thermal Marangoni numbers are of order 10,000, indicating that convection should play a dominating role as well. Surprisingly, we find that the wavelength and frequency of the oscillations only depend on the thickness of the liquid, which is twice the capillary length, and do not depend on the mode number, substrate temperature, or the substrate curvature. This robust behavior suggests that the wavelength for the oscillations is set by thermal convection inside the drop, and is less dependent on the flow in the vapor layer under the drop

  18. DROpS: an object of learning in computer simulation of discrete events

    Directory of Open Access Journals (Sweden)

    Hugo Alves Silva Ribeiro

    2015-09-01

    Full Text Available This work presents the “Realistic Dynamics Of Simulated Operations” (DROpS, the name given to the dynamics using the “dropper” device as an object of teaching and learning. The objective is to present alternatives for professors teaching content related to simulation of discrete events to graduate students in production engineering. The aim is to enable students to develop skills related to data collection, modeling, statistical analysis, and interpretation of results. This dynamic has been developed and applied to the students by placing them in a situation analogous to a real industry, where various concepts related to computer simulation were discussed, allowing the students to put these concepts into practice in an interactive manner, thus facilitating learning

  19. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  20. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  1. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  2. Propelling a water drop with the vapor-mediated Marangoni effect

    Science.gov (United States)

    Kim, Seungho; Kim, Ho-Young

    2013-11-01

    We show that a water drop on solid surfaces can be propelled just by placing a volatile alcohol drop nearby. It is found to be because the water-air interface near the alcohol drop mixes with alcohol vapor, thereby locally lowering the surface tension. The surface-tension-gradient induces the motion of the water drop, enabling the trajectory control of water drops through the motion of remote alcohol drops. This vapor-mediated Marangoni effect also gives rise to other interesting interfacial flow phenomena, such as nucleation of holes on a water film and ballooning of a water drop hanging from a syringe needle with the approach of an alcohol drop. We visualize such interfacial dynamics with a high-speed camera and rationalize their salient features by scaling analysis. This work was supported by the National Research Foundation of Korea (grant no. 2012-008023).

  3. Allelic drop-out probabilities estimated by logistic regression

    DEFF Research Database (Denmark)

    Tvedebrink, Torben; Eriksen, Poul Svante; Asplund, Maria

    2012-01-01

    We discuss the model for estimating drop-out probabilities presented by Tvedebrink et al. [7] and the concerns, that have been raised. The criticism of the model has demonstrated that the model is not perfect. However, the model is very useful for advanced forensic genetic work, where allelic drop-out...... is occurring. With this discussion, we hope to improve the drop-out model, so that it can be used for practical forensic genetics and stimulate further discussions. We discuss how to estimate drop-out probabilities when using a varying number of PCR cycles and other experimental conditions....

  4. Clear lens extraction for the treatment of persistent accommodative spasm after head trauma.

    Science.gov (United States)

    McMurray, Catherine J; Burley, Celeste D; Elder, Mark J

    2004-12-01

    We report the case of a 28-year-old man with decreased visual acuity after closed head trauma sustained in a motor vehicle accident 16 weeks earlier. Several structures thought to be associated with the control of accommodation were injured. The patient had a persistent accommodative spasm causing up to 7.0 diopters of pseudomyopia. We present the patient's progress through the clinic, including manifest and cycloplegic refractions and results of a trial with atropine drops, and successful transition to bilateral pseudophakia 2 years and 9 months after the accident.

  5. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  6. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  7. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  8. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  9. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  10. Drop Performance Test of CRDMs for JRTR

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Myoung-Hwan; Cho, Yeong-Garp; Chung, Jong-Ha [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kim, Jung-Hyun [POSCO Plandtec Co. Ltd, Ulsan (Korea, Republic of); Lee, Kwan-Hee [RIST, Pohang (Korea, Republic of)

    2015-10-15

    The drop test results of CRDMs with AC-type electromagnet show that the initial delay times are not satisfied with the requirement, 0.15 seconds. After the replacement of the electromagnet from AC-type to DCtype, the drop times of CARs and accelerations due to the impact of moving parts are satisfied with all requirements. As a result, it is found that four CRDMs to be installed at site have a good drop performance, and meet all performance requirements. A control rod drive mechanism (CRDM) is a device to control the position of a control absorber rod (CAR) in the core by using a stepping motor which is commanded by the reactor regulating system (RRS) to control the reactivity during the normal operation of the reactor. The top-mounted CRDM driven by the stepping motor for Jordan Research and Training Reactor (JRTR) has been developed in KAERI. The CRDM for JRTR has been optimized by the design improvement based on that of the HANARO. It is necessary to verify the performances such as the stepping, drop, endurance, vibration, seismic and structural integrity for active components. Especially, the CAR drop curves are important data for the safety analysis. This paper describes the test results to demonstrate the drop performances of a prototype and 4 CRDMs to be installed at site. The tests are carried out at a test rig simulating the actual reactor's conditions.

  11. Research on combustion of black-liquor drops

    International Nuclear Information System (INIS)

    Macek, A.

    1999-01-01

    Black liquor, the major by-product of the kraft process for production of pulp, is one of the most important industrial fuels. It is burned in recovery boilers in the form of large spray drops (mm), with the objective of simultaneous recovery of heat and chemicals (sodium and sulfur). Even though black-liquor combustion in boilers has been practised for over half a century, research efforts toward improvement of combustion efficiency and abatement of environmental emissions are much more recent. The present paper addresses a specific aspect of that research, namely, elucidation of processes which occur during combustion of black-liquor drops in boiler-gas streams. The paper (a) gives a brief description of the kraft process, (b) reviews the experimental and theoretical (modeling) research advances on combustion of kraft-liquor drops during the 1980s and 1990s, (c) re-examines the results of an earlier combustion study in which black-liquor drops were observed in free flight at temperatures near those in recovery boilers, and (d) recommends input for the modeling of in-flight combustion of kraft-liquor drops in recovery boilers. (author)

  12. The evaporation of the charged and uncharged water drops

    Indian Academy of Sciences (India)

    Drop evaporation; ventilation coefficient; evaporation-effect of electrical forces. ... to study the effect of ventilation on the rate of evaporation of the millimeter sized ... a ventilated drop to reach its equilibrium temperature increases with the drop ...

  13. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  14. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  15. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  16. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  17. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  18. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  19. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  20. Generic versus brand-name North American topical glaucoma drops.

    Science.gov (United States)

    Mammo, Zaid N; Flanagan, John G; James, David F; Trope, Graham E

    2012-02-01

    To determine whether brand-name glaucoma drops differ from generic equivalents in bottle design, viscosity, surface tension, and volume in North America. Experimental study. We studied 5 bottles each of 11 kinds of glaucoma drops. Density-based calculations of drop volume were assessed using 0.1 mg analytic balance. Viscosity was measured using rotational rheometery. Bottle tip diameter was measured using 0.05 mm Vernier calipers. Surface tension was measured using a Fisher Scientific (Ottawa, ON) tensiometer. For the American brand-name Timoptic XE, the average drop volume was 38 ± 3.1 μL versus 24 ± 1.5 μL of Timolol GFS (p brand-name Timoptic XE, the average drop volume was 42 ± 4.0 μL versus 25 ± 2 μL of timolol maleate EX (p brand-name Timoptic drop volume was 28 ± 1.4 μL versus 35 ± 1.9 μL Apo-Timop (p brand-name Timoptic delivered significantly smaller drop volumes than generic Apo-Timop. Careful consideration should be given to drop viscosity and bottle design when generic ophthalmic products are evaluated for interchangeability and market entry. Copyright © 2012 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  1. Electric generation and ratcheted transport of contact-charged drops

    Science.gov (United States)

    Cartier, Charles A.; Graybill, Jason R.; Bishop, Kyle J. M.

    2017-10-01

    We describe a simple microfluidic system that enables the steady generation and efficient transport of aqueous drops using only a constant voltage input. Drop generation is achieved through an electrohydrodynamic dripping mechanism by which conductive drops grow and detach from a grounded nozzle in response to an electric field. The now-charged drops are transported down a ratcheted channel by contact charge electrophoresis powered by the same voltage input used for drop generation. We investigate how the drop size, generation frequency, and transport velocity depend on system parameters such as the liquid viscosity, interfacial tension, applied voltage, and channel dimensions. The observed trends are well explained by a series of scaling analyses that provide insight into the dominant physical mechanisms underlying drop generation and ratcheted transport. We identify the conditions necessary for achieving reliable operation and discuss the various modes of failure that can arise when these conditions are violated. Our results demonstrate that simple electric inputs can power increasingly complex droplet operations with potential opportunities for inexpensive and portable microfluidic systems.

  2. Inverse Leidenfrost effect: self-propelling drops on a bath

    Science.gov (United States)

    Gauthier, Anais; van der Meer, Devaraj; Lohse, Detlef; Physics of Fluids Team

    2017-11-01

    When deposited on very hot solid, volatile drops can levitate over a cushion of vapor, in the so-called Leidenfrost state. This phenomenon can also be observed on a hot bath and similarly to the solid case, drops are very mobile due to the absence of contact with the substrate that sustains them. We discuss here a situation of ``inverse Leidenfrost effect'' where room-temperature drops levitate on a liquid nitrogen pool - the vapor is generated here by the bath sustaining the relatively hot drop. We show that the drop's movement is not random: the liquid goes across the bath in straight lines, a pattern only disrupted by elastic bouncing on the edges. In addition, the drops are initially self-propelled; first at rest, they accelerate for a few seconds and reach velocities of the order of a few cm/s, before slowing down. We investigate experimentally the parameters that affect their successive acceleration and deceleration, such as the size and nature of the drops and we discuss the origin of this pattern.

  3. Many Drops Interactions I: Simulation of Coalescence, Flocculation and Fragmentation of Multiple Colliding Drops with Smoothed Particle Hydrodynamics

    Directory of Open Access Journals (Sweden)

    Alejandro Acevedo-Malavé

    2012-06-01

    Full Text Available Smoothed Particle Hydrodynamics (SPH is a Lagrangian mesh-free formalism and has been useful to model continuous fluid. This formalism is employed to solve the Navier-Stokes equations by replacing the fluid with a set of particles. These particles are interpolation points from which properties of the fluid can be determined. In this study, the SPH method is applied to simulate the hydrodynamics interaction of many drops, showing some settings for the coalescence, fragmentation and flocculation problem of equally sized liquid drops in three-dimensional spaces. For small velocities the drops interact only through their deformed surfaces and the flocculation of the droplets arises. This result is very different if the collision velocity is large enough for the fragmentation of droplets takes place. We observe that for velocities around 15 mm/ms the coalescence of droplets occurs. The velocity vector fields formed inside the drops during the collision process are shown.

  4. Drop formation of black liquor spraying; Mustalipeaen pisaroituminen

    Energy Technology Data Exchange (ETDEWEB)

    Fogelholm, C J; Kankkunen, A; Nieminen, K; Laine, J; Miikkulainen, P [Helsinki Univ. of Technology, Otaniemi (Finland): Lab. of Energy Technology and Environmental Protection

    1997-10-01

    Black liquor is a spent liquor of the pulp and paper industry. It is burned in kraft recovery boilers for chemical and energy recovery. The high dry solids content and viscosity of black liquor require a high spraying temperature. This affects the performance of the boiler. Kraft recovery boiler deposit formation, emissions and chemical recovery are strongly affected by the drop size and the velocity of the black liquor spray formed by a splashplate nozzle. The sheet breakup mechanism is studied with a system based on a video and image-analysis. The drop size of mill-scale nozzles was measured also with an image-analysis-system. Measurements were carried out in a spray test chamber. The sheet breakup mechanism and drop size tests were carried out both below and over the boiling point of black liquor. Special attention was paid to the effect of flashing on drop formation. Temperature increase normally decreases drop size. In the temperature where the wavy-sheet disintegration changes to perforated-sheet disintegration the drop size increases. Spray velocity rises when the temperature is increased above the boiling point. (orig.)

  5. Ultrasonic defect-sizing using decibel drop methods. I

    International Nuclear Information System (INIS)

    Murphy, R.V.

    1987-03-01

    Results are reported of a study performed to investigate the accuracy and repeatability of various ultrasonic decibel (dB) drop sizing methods in determining the length, vertical extent and orientation of artificial and real weld flaws in thin steel sections. Seven artificial flaws and nine real weld flaws were examined; over 200 data plots were produced. The general findings are: a) length and vertical extent are assessed most accurately when using a 14 dB drop from the maximum indication amplitude; b) decibel drops less that 14 dB generally undersize flaws while decibel drops greater than 14 dB generally oversize flaws; c) flaws which are smaller than the width of the sound beam cannot be assessed accurately using dB drop methods; d) large flaws are assessed most accurately when the sound beam strikes the flaws at near normal incidence; e) the vertical extent and orientation of large flaws are plotted most accurately using the beam centre line method as opposed to the beam profile method; and, f) the limitations of dB-drop-sizing methods have considerable ramifications for CAN3-N285.4-M83 and ASME XI evaluation criteria

  6. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  7. OCCURENCE OF FUSARIUM HEAD BLIGHT OF WHEAT IN SLOVAKIA UNDER THE NATURAL INFECTION

    Directory of Open Access Journals (Sweden)

    Kamil Hudec

    2013-09-01

    Full Text Available Occurrence of Fusarium head blight FHB was documented during two consecutive years in June 2011 2012 under the natural conditions in winter wheat Triticum aestivum L. Observations were conducted at six different localities in four climatic regions in Slovakia. Incidence and severity of FHB were evaluated at the end of flowering stage in three replications. Each replication contained 100 spikes. These data served as a basis for FHB index calculations. Obtained FHB index values indicated that the environmental conditions of the year 2011 were more favourable to the development of FHB infection. Higher FHB index values were reached at localities with precipitation higher than 100% of long-term average. Although significantly higher incidence of heads with FHB symptoms was recorded in climatic region 02 quite warm, dry, hilly, correlation between the climatic regions was not confirmed. Except of the climatic conditions, the FHB development can be influenced by nitrogen application. The highest levels of FHB index was in coincidence with the highest and the lowest nitrogen rates applied. In all other cases, the effect of the mineral nutrition on head blight attack was unclear. Analyses of nitrogen forms applied revealed that nitrogen forms had no impact on FHB index value.

  8. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Head-on crashes on two-way interurban roads: a public health concern in road safety.

    Science.gov (United States)

    Olabarria, Marta; Santamariña-Rubio, Elena; Marí-Dell'Olmo, Marc; Gotsens, Mercè; Novoa, Ana M; Borrell, Carme; Pérez, Katherine

    2015-09-01

    To describe the magnitude and characteristics of crashes and drivers involved in head-on crashes on two-way interurban roads in Spain between 2007 and 2012, and to identify the factors associated with the likelihood of head-on crashes on these roads compared with other types of crash. A cross-sectional study was conducted using the National Crash Register. The dependent variables were head-on crashes with injury (yes/no) and drivers involved in head-on crashes (yes/no). Factors associated with head-on crashes and with being a driver involved in a head-on crash versus other types of crash were studied using a multivariate robust Poisson regression model to estimate proportion ratios (PR) and confidence intervals (95% CI). There were 9,192 head-on crashes on two-way Spanish interurban roads. A total of 15,412 men and 3,862 women drivers were involved. Compared with other types of crash, head-on collisions were more likely on roads 7 m or more wide, on road sections with curves, narrowings or drop changes, on wet or snowy surfaces, and in twilight conditions. Transgressions committed by drivers involved in head-on crashes were driving in the opposite direction and incorrectly overtaking another vehicle. Factors associated with a lower probability of head-on crashes were the existence of medians (PR=0.57; 95%CI: 0.48-0.68) and a paved shoulder of less than 1.5 meters (PR=0.81; 95%CI: 0.77-0.86) or from 1.5 to 2.45 meters (PR=0.90; 95%CI: 0.84-0.96). This study allowed the characterization of crashes and drivers involved in head-on crashes on two-way interurban roads. The lower probability observed on roads with median strips point to these measures as an effective way to reduce these collisions. Copyright © 2014 SESPAS. Published by Elsevier Espana. All rights reserved.

  11. Elemental Water Impact Test: Phase 3 Plunge Depth of a 36-Inch Aluminum Tank Head

    Science.gov (United States)

    Vassilakos, Gregory J.

    2014-01-01

    Spacecraft are being designed based on LS-DYNA water landing simulations. The Elemental Water Impact Test (EWIT) series was undertaken to assess the accuracy of LS-DYNA water impact simulations. Phase 3 featured a composite tank head that was tested at a range of heights to verify the ability to predict structural failure of composites. To support planning for Phase 3, a test series was conducted with an aluminum tank head dropped from heights of 2, 6, 10, and 12 feet to verify that the test article would not impact the bottom of the test pool. This report focuses on the comparisons of the measured plunge depths to LS-DYNA predictions. The results for the tank head model demonstrated the following. 1. LS-DYNA provides accurate predictions for peak accelerations. 2. LS-DYNA consistently under-predicts plunge depth. An allowance of at least 20% should be added to the LS-DYNA predictions. 3. The LS-DYNA predictions for plunge depth are relatively insensitive to the fluid-structure coupling stiffness.

  12. Drop test of reinforced concrete slab onto storage cask

    International Nuclear Information System (INIS)

    Kato, Y.; Hattori, S.; Ito, C.; Sirai, K.; Ozaki, S.; Kato, O.

    1993-01-01

    In this research, drop tests onto full-scale casks considering the specifications of a falling object (weight, construction, drop height, etc.) demonstrate and evaluate the integrity of casks in case a heavy object drops into the storage facilities. (J.P.N.)

  13. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  14. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  15. Investigation of Effective Parameters of Drop-on-Demand Droplet Generator

    Directory of Open Access Journals (Sweden)

    Mojtaba Ghodsi

    2017-06-01

    Full Text Available This article presents a design and development of a drop-on-demand (DOD droplets generator. This generator uses molten metal as a liquid and can be used in fabrication, prototyping and any kind of printing with solder droplets. This setup consists of a vibrator solenoid with tunable frequency to produce a semi-spherical shape of molten metal, close to the surface of fabrication. This design also has a nozzle with micro-size orifice, a rod for transmitting force and a heater to melt the metal and keep it in superheat temperature. This DOD can produce droplets in different sizes (less than 550 µm by controlling the vibration frequency of solenoid. This ability together with the accuracy of the droplets in positioning (the error is less than ±20 µm for 1.5 mm amplitude can be used in different applications.  Moreover, in this paper, the impact of initial position of the head and temperature on the average diameter of droplets and the impact of the frequency on the shape of the droplets have been tested and discussed

  16. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  17. Stability of Armour Units in Oscillatory Flow

    DEFF Research Database (Denmark)

    Burcharth, Hans F.; Thompson, A. C.

    1983-01-01

    As part of a program to study the hydraulics of wave attack on rubble mound breakwaters tests were made on model armour units in a steady flow through a layer laid on a slope. The flow angle has little effect on stability for dolosse or rock layers. The head drop at failure across each type...... of layer is similar but the dolosse layer is more permeable and fails as a whole. There was no viscous scale effect. These results and earlier tests in oscillating flow suggest a 'reservoir' effect is important in the stability in steep waves....

  18. Stability of Armour Units in Flow Through a Layer

    DEFF Research Database (Denmark)

    Burcharth, Hans F.; C. Thompson, Alex

    1984-01-01

    As part of a program to study the hydraulics of wave attack on rubble mound breakwaters tests were made on model armour units in a steady flow through a layer laid on a slope. The flow angle has little effect on stability for dolosse or rock layers. The head drop at failure across each type...... of layer is similar but the dolosse layer is more permeable and fails as a whole. There was no viscous scale effect. These results and earlier tests in oscillating flow suggest a 'reservoir' effect is important in the stability in steep waves....

  19. Impact of ultra-viscous drops: air-film gliding and extreme wetting

    KAUST Repository

    Langley, Kenneth; Li, Erqiang; Thoroddsen, Sigurdur T

    2017-01-01

    water drop, the viscous-dominated flow in the thin air layer counteracts the inertia of the drop liquid. For highly viscous drops the viscous stresses within the liquid also affect the interplay between the drop and the gas. Here the drop also forms a

  20. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  1. Effect of humidity on the filter pressure drop

    International Nuclear Information System (INIS)

    Vendel, J.; Letourneau, P.

    1995-01-01

    The effects of humidity on the filter pressure drop have been reported in some previous studies in which it is difficult to draw definite conclusions. These studies show contradictory effects of humidity on the pressure drop probably due to differences in the hygroscopicity of the test aerosols. The objective of this paper is to present experimental results on the evolution of the filter pressure drop versus mass loading, for different test aerosols and relative humidities. Present results are compared to those found in various publication. An experimental device has been designed to measure filter pressure drop as the function of the areal density for relative humidity varying in the range of 9 % to 85 %. Experiments have been conducted with hygroscopic: (CsOH) and nonhygroscopic aerosols (TiO 2 ). Cesium hydroxyde (CsOH) of size of 2 μ M AMMD has been generated by an ultrasonic generator and the 0.7 μm AMMD titanium oxyde has been dispersed by a open-quotes turn-tableclose quotes generator. As it is noted in the BISWAS'publication [3], present results show, in the case of nonhygroscopic aerosols, a linear relationship of pressure drop to mass loading. For hygroscopic aerosols two cases must be considered: for relative humidity below the deliquescent point of the aerosol, the relationship of pressure drop to mass loading remains linear; above the deliquescent point, the results show a sudden increase in the pressure drop and the mass capacity of the filter is drastically reduced

  2. Effect of humidity on the filter pressure drop

    Energy Technology Data Exchange (ETDEWEB)

    Vendel, J.; Letourneau, P. [Institut de Protection et de Surete Nucleaire, Gif-sur-Yvette (France)

    1995-02-01

    The effects of humidity on the filter pressure drop have been reported in some previous studies in which it is difficult to draw definite conclusions. These studies show contradictory effects of humidity on the pressure drop probably due to differences in the hygroscopicity of the test aerosols. The objective of this paper is to present experimental results on the evolution of the filter pressure drop versus mass loading, for different test aerosols and relative humidities. Present results are compared to those found in various publication. An experimental device has been designed to measure filter pressure drop as the function of the areal density for relative humidity varying in the range of 9 % to 85 %. Experiments have been conducted with hygroscopic: (CsOH) and nonhygroscopic aerosols (TiO{sub 2}). Cesium hydroxyde (CsOH) of size of 2 {mu} M AMMD has been generated by an ultrasonic generator and the 0.7 {mu}m AMMD titanium oxyde has been dispersed by a {open_quotes}turn-table{close_quotes} generator. As it is noted in the BISWAS`publication [3], present results show, in the case of nonhygroscopic aerosols, a linear relationship of pressure drop to mass loading. For hygroscopic aerosols two cases must be considered: for relative humidity below the deliquescent point of the aerosol, the relationship of pressure drop to mass loading remains linear; above the deliquescent point, the results show a sudden increase in the pressure drop and the mass capacity of the filter is drastically reduced.

  3. Hereditary angioedema attacks resolve faster and are shorter after early icatibant treatment.

    Directory of Open Access Journals (Sweden)

    Marcus Maurer

    Full Text Available BACKGROUND: Attacks of hereditary angioedema (HAE are unpredictable and, if affecting the upper airway, can be lethal. Icatibant is used for physician- or patient self-administered symptomatic treatment of HAE attacks in adults. Its mode of action includes disruption of the bradykinin pathway via blockade of the bradykinin B(2 receptor. Early treatment is believed to shorten attack duration and prevent severe outcomes; however, evidence to support these benefits is lacking. OBJECTIVE: To examine the impact of timing of icatibant administration on the duration and resolution of HAE type I and II attacks. METHODS: The Icatibant Outcome Survey is an international, prospective, observational study for patients treated with icatibant. Data on timings and outcomes of icatibant treatment for HAE attacks were collected between July 2009-February 2012. A mixed-model of repeated measures was performed for 426 attacks in 136 HAE type I and II patients. RESULTS: Attack duration was significantly shorter in patients treated <1 hour of attack onset compared with those treated ≥ 1 hour (6.1 hours versus 16.8 hours [p<0.001]. Similar significant effects were observed for <2 hours versus ≥ 2 hours (7.2 hours versus 20.2 hours [p<0.001] and <5 hours versus ≥ 5 hours (8.0 hours versus 23.5 hours [p<0.001]. Treatment within 1 hour of attack onset also significantly reduced time to attack resolution (5.8 hours versus 8.8 hours [p<0.05]. Self-administrators were more likely to treat early and experience shorter attacks than those treated by a healthcare professional. CONCLUSION: Early blockade of the bradykinin B(2 receptor with icatibant, particularly within the first hour of attack onset, significantly reduced attack duration and time to attack resolution.

  4. Ballistic Jumping Drops on Superhydrophobic Surfaces via Electrostatic Manipulation.

    Science.gov (United States)

    Li, Ning; Wu, Lei; Yu, Cunlong; Dai, Haoyu; Wang, Ting; Dong, Zhichao; Jiang, Lei

    2018-02-01

    The ballistic ejection of liquid drops by electrostatic manipulating has both fundamental and practical implications, from raindrops in thunderclouds to self-cleaning, anti-icing, condensation, and heat transfer enhancements. In this paper, the ballistic jumping behavior of liquid drops from a superhydrophobic surface is investigated. Powered by the repulsion of the same kind of charges, water drops can jump from the surface. The electrostatic acting time for the jumping of a microliter supercooled drop only takes several milliseconds, even shorter than the time for icing. In addition, one can control the ballistic jumping direction precisely by the relative position above the electrostatic field. The approach offers a facile method that can be used to manipulate the ballistic drop jumping via an electrostatic field, opening the possibility of energy efficient drop detaching techniques in various applications. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Pre-attack signs and symptoms in cluster headache: Characteristics and time profile.

    Science.gov (United States)

    Snoer, Agneta; Lund, Nunu; Beske, Rasmus; Jensen, Rigmor; Barloese, Mads

    2018-05-01

    Introduction In contrast to the premonitory phase of migraine, little is known about the pre-attack (prodromal) phase of a cluster headache. We aimed to describe the nature, prevalence, and duration of pre-attack symptoms in cluster headache. Methods Eighty patients with episodic cluster headache or chronic cluster headache, according to ICHD-3 beta criteria, were invited to participate. In this observational study, patients underwent a semi-structured interview where they were asked about the presence of 31 symptoms/signs in relation to a typical cluster headache attack. Symptoms included previously reported cluster headache pre-attack symptoms, premonitory migraine symptoms and accompanying symptoms of migraine and cluster headache. Results Pre-attack symptoms were reported by 83.3% of patients, with an average of 4.25 (SD 3.9) per patient. Local and painful symptoms, occurring with a median of 10 minutes before attack, were reported by 70%. Local and painless symptoms and signs, occurring with a median of 10 minutes before attack, were reported by 43.8% and general symptoms, occurring with a median of 20 minutes before attack, were reported by 62.5% of patients. Apart from a dull/aching sensation in the attack area being significantly ( p cluster headache. Since the origin of cluster headache attacks is still unresolved, studies of pre-attack symptoms could contribute to the understanding of cluster headache pathophysiology. Furthermore, identification and recognition of pre-attack symptoms could potentially allow earlier abortive treatment.

  6. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  7. Investigations of internal turbulent flows in a low-head tubular pump and its performance predictions

    International Nuclear Information System (INIS)

    Tang, X L; Chen, X S; Wang, F J; Yang, W; Wu, Y L

    2012-01-01

    Based on the RANS equations, standard k−ε turbulence model and SIMPLE algorithm, the internal turbulent flows in a low-head tubular pump were simulated by using the FLUENT software. Based on the predicted flow fields, the external performance curves including the head-discharge, efficiency-discharge and power-discharge curves were further obtained. The calculated results indicate that the internal flow pattern is smooth at the best efficiency point (BEP). When it works under off-design operating cases, the flow pattern inside the diffuser and the discharge passage is disorder, and at the same time, the hydraulic losses mainly come from the secondary flows. At large flow rates, the minimum static pressure near the inlet of the blade pressure surfaces due to the negative attack angle. At small flow rates, the minimum value happens near the inlet of the suction surfaces. At the BEP, the lowest static pressure appears in the region behind the suction surfaces inlet. The newly-designed model is validated by the comparisons between its predicted external performance and the experimental data of the JGM-3 model. This research provides some important references for the optimization of a low-head tubular pump.

  8. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  9. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  10. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  11. Annual Occurrence of Meteorite-Dropping Fireballs

    Science.gov (United States)

    Konovalova, Natalia; Jopek, Tadeusz J.

    2016-07-01

    The event of Chelyabinsk meteorite has brought about change the earlier opinion about limits of the sizes of potentially dangerous asteroidal fragments that crossed the Earth's orbit and irrupted in the Earth's atmosphere making the brightest fireball. The observations of the fireballs by fireball networks allows to get the more precise data on atmospheric trajectories and coordinates of predicted landing place of the meteorite. For the reason to search the periods of fireball activity is built the annual distribution of the numbers of meteorites with the known fall dates and of the meteorite-dropping fireballs versus the solar longitude. The resulting profile of the annual activity of meteorites and meteorite-dropping fireballs shows several periods of increased activity in the course of the year. The analysis of the atmospheric trajectories and physical properties of sporadic meteorite-dropping fireballs observed in Tajikistan by instrumental methods in the summer‒autumn periods of increased fireballs activity has been made. As a result the structural strength, the bulk density and terminal mass of the studied fireballs that can survive in the Earth atmosphere and became meteorites was obtained. From the photographic IAU MDC_2003 meteor database and published sources based on the orbit proximity as determined by D-criterion of Southworth and Hawkins the fireballs that could be the members of group of meteorite-dropping fireballs, was found. Among the near Earth's objects (NEOs) the searching for parent bodies for meteorite-dropping fireballs was made and the evolution of orbits of these objects in the past on a long interval of time was investigated.

  12. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  13. The effect of dropping impact on bruising pomegranate fruit

    Directory of Open Access Journals (Sweden)

    M Mohammad Shafie

    2016-04-01

    Full Text Available Introduction: The pomegranate journey from orchard to supermarket is very complex and pomegranates are subjected to the variety of static and dynamic loads that could result in this damage and bruise occurring. Bruise area and bruise volume are the most important parameters to evaluate fruit damage occurred in harvest and postharvest stages. The bruising is defined as damage to fruit flesh usually with no abrasion of the peel. The two different types of dynamic loading which can physically cause fruit bruising are impact and vibration. The impact and vibration loadings may occur during picking or sorting as the pomegranates are dropped into storage bins and during transportation. The focus of this work was on the impact loading as this appeared to be the most prevalent. In view of the limitations of conventional testing methods (ASTM D3332 Standard Test Methods for Mechanical Shock Fragility of Products, the method and procedure for determining dropping bruise boundary of fruit were also established by adapting free-fall dropping tests. Materials and Methods: After the ‘Malas-e-Saveh’ pomegranates had been selected, they were numbered, and the weight and dimension of each sample were measured and recorded. Firmness in cheek region of each fruit was also measured. Fruit firmness was determined by measuring the maximum force during perforating the sample to a depth of 10 mm at a velocity of 100 mm min-1 with an 8 mm diameter cylindrical penetrometer mounted onto a STM-5 Universal Testing Machine (SANTAM, Design CO. LTD., England. Free-fall dropping tests with a series of drop heights (6, 7, 10, 15, 30 and 60 cm were conducted on fresh ‘Malas-e-Saveh’ pomegranates. Three samples were used for each dropping height, and each sample was subjected to impact on two different positions. Before the test was started, it was necessary to control the sample's drop position. The cheek of sample was placed on the fruit holder. An aluminum plate mounted

  14. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  15. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  16. Liquid toroidal drop under uniform electric field

    Science.gov (United States)

    Zabarankin, Michael

    2017-06-01

    The problem of a stationary liquid toroidal drop freely suspended in another fluid and subjected to an electric field uniform at infinity is addressed analytically. Taylor's discriminating function implies that, when the phases have equal viscosities and are assumed to be slightly conducting (leaky dielectrics), a spherical drop is stationary when Q=(2R2+3R+2)/(7R2), where R and Q are ratios of the phases' electric conductivities and dielectric constants, respectively. This condition holds for any electric capillary number, CaE, that defines the ratio of electric stress to surface tension. Pairam and Fernández-Nieves showed experimentally that, in the absence of external forces (CaE=0), a toroidal drop shrinks towards its centre, and, consequently, the drop can be stationary only for some CaE>0. This work finds Q and CaE such that, under the presence of an electric field and with equal viscosities of the phases, a toroidal drop having major radius ρ and volume 4π/3 is qualitatively stationary-the normal velocity of the drop's interface is minute and the interface coincides visually with a streamline. The found Q and CaE depend on R and ρ, and for large ρ, e.g. ρ≥3, they have simple approximations: Q˜(R2+R+1)/(3R2) and CaE∼3 √{3 π ρ / 2 } (6 ln ⁡ρ +2 ln ⁡[96 π ]-9 )/ (12 ln ⁡ρ +4 ln ⁡[96 π ]-17 ) (R+1 ) 2/ (R-1 ) 2.

  17. 9 m side drop test of scale model

    International Nuclear Information System (INIS)

    Ku, Jeong-Hoe; Chung, Seong-Hwan; Lee, Ju-Chan; Seo, Ki-Seog

    1993-01-01

    A type B(U) shipping cask had been developed in KAERI for transporting PWR spent fuel. Since the cask is to transport spent PWR fuel, it must be designed to meet all of the structural requirements specified in domestic packaging regulations and IAEA safety series No.6. This paper describes the side drop testing of a one - third scale model cask. The crush and deformations of the shock absorbing covers directly control the deceleration experiences of the cask during the 9 m side drop impact. The shock absorbing covers greatly mitigated the inertia forces of the cask body due to the side drop impact. Compared with the side drop test and finite element analysis, it was verified that the 1/3 scale model cask maintain its structural integrity of the model cask under the side drop impact. The test and analysis results could be used as the basic data to evaluate the structural integrity of the real cask. (J.P.N.)

  18. Rapid determination of caffeine in one drop of beverages and foods using drop-to-drop solvent microextraction with gas chromatography/mass spectrometry.

    Science.gov (United States)

    Shrivas, Kamlesh; Wu, Hui-Fen

    2007-11-02

    A simple and rapid sample cleanup and preconcentration method for the quantitative determination of caffeine in one drop of beverages and foods by gas chromatography/mass spectrometry (GC/MS) has been proposed using drop-to-drop solvent microextraction (DDSME). The best optimum experimental conditions for DDSME were: chloroform as the extraction solvent, 5 min extraction time, 0.5 microL exposure volume of the extraction phase and no salt addition at room temperature. The optimized methodology exhibited good linearity between 0.05 and 5.0 microg/mL with correlation coefficient of 0.980. The relative standard deviation (RSD) and limits of detection (LOD) of the DDSME/GC/MS method were 4.4% and 4.0 ng/mL, respectively. Relative recovery of caffeine in beverages and foods were found to be 96.6-101%, which showing good reliability of this method. This DDSME excludes the major disadvantages of conventional method of caffeine extraction, like large amount of organic solvent and sample consumption and long sample pre-treatment process. So, this approach proves that the DDSME/GC/MS technique can be applied as a simple, fast and feasible diagnosis tool for environmental, food and biological application for extremely small amount of real sample analysis.

  19. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  20. Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

    International Nuclear Information System (INIS)

    Wang Wei-Long; Gao Ming; Ma Zhi

    2015-01-01

    Passive Faraday-mirror (PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure (POVM) operators plays an important role in this attack. In this paper, we propose a simple scheme to implement the POVM in PFM attack on an Faraday–Michelson quantum cryptography system. Since the POVM can not be implemented directly with previous methods, in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first, without changing the attacking effect by calculation. Based on the methods proposed by Ahnert and Payne, the linear-optical setup for implementing the POVM operators is derived. At last, the complete setup for realizing the PFM attack is presented with all parameters. Furthermore, our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. (paper)

  1. Air-drop blood supply in the French Army.

    Science.gov (United States)

    Javaudin, Olivier; Baillon, A; Varin, N; Martinaud, C; Pouget, T; Civadier, C; Clavier, B; Sailliol, A

    2018-02-12

    Haemorrhagic shock remains the leading cause of preventable death in overseas and austere settings. Transfusion of blood components is critical in the management of this kind of injury. For French naval and ground military units, this supply often takes too long considering the short shelf-life of red blood cell concentrates (RBCs) and the limited duration of transport in cooling containers (five to six days). Air-drop supply could be an alternative to overcome these difficulties on the condition that air-drop does not cause damage to blood units. After a period of study and technical development of packaging, four air-drops at medium and high altitudes were performed with an aircraft of the French Air Force. After this, one air-drop was carried out at medium altitude with 10 RBCs and 10 French lyophilised plasma (FLYP). A second air-drop was performed with a soldier carrying one FLYP unit at 12 000 feet. For these air-drops real blood products were used, and quality control testing and temperature monitoring were performed. The temperatures inside the containers were within the normal ranges. Visual inspection indicated that transfusion packaging and dumped products did not undergo deterioration. The quality control data on RBCs and FLYP, including haemostasis, suggested no difference before and after air-drop. The operational implementation of the air-drop of blood products seems to be one of the solutions for the supply of blood products in military austere settings or far forward on battlefield, allowing safe and early transfusion. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Nectar and pollination drops: how different are they?

    Science.gov (United States)

    Nepi, Massimo; von Aderkas, Patrick; Wagner, Rebecca; Mugnaini, Serena; Coulter, Andrea; Pacini, Ettore

    2009-08-01

    Pollination drops and nectars (floral nectars) are secretions related to plant reproduction. The pollination drop is the landing site for the majority of gymnosperm pollen, whereas nectar of angiosperm flowers represents a common nutritional resource for a large variety of pollinators. Extrafloral nectars also are known from all vascular plants, although among the gymnosperms they are restricted to the Gnetales. Extrafloral nectars are not generally involved in reproduction but serve as 'reward' for ants defending plants against herbivores (indirect defence). Although very different in their task, nectars and pollination drops share some features, e.g. basic chemical composition and eventual consumption by animals. This has led some authors to call these secretions collectively nectar. Modern techniques that permit chemical analysis and protein characterization have very recently added important information about these sugary secretions that appear to be much more than a 'reward' for pollinating (floral nectar) and defending animals (extrafloral nectar) or a landing site for pollen (pollination drop). Nectar and pollination drops contain sugars as the main components, but the total concentration and the relative proportions are different. They also contain amino acids, of which proline is frequently the most abundant. Proteomic studies have revealed the presence of common functional classes of proteins such as invertases and defence-related proteins in nectar (floral and extrafloral) and pollination drops. Invertases allow for dynamic rearrangement of sugar composition following secretion. Defence-related proteins provide protection from invasion by fungi and bacteria. Currently, only few species have been studied in any depth. The chemical composition of the pollination drop must be investigated in a larger number of species if eventual phylogenetic relationships are to be revealed. Much more information can be provided from further proteomic studies of both

  3. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  4. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  5. Controlling Vapor Pressure In Hanging-Drop Crystallization

    Science.gov (United States)

    Carter, Daniel C.; Smith, Robbie

    1988-01-01

    Rate of evaporation adjusted to produce larger crystals. Device helps to control vapor pressure of water and other solvents in vicinity of hanging drop of solution containing dissolved enzyme protein. Well of porous frit (sintered glass) holds solution in proximity to drop of solution containing protein or enzyme. Vapor from solution in frit controls evaporation of solvent from drop to control precipitation of protein or enzyme. With device, rate of nucleation limited to decrease number and increase size (and perhaps quality) of crystals - large crystals of higher quality needed for x-ray diffraction studies of macromolecules.

  6. Application of Proteomics to the Study of Pollination Drops

    Directory of Open Access Journals (Sweden)

    Natalie Prior

    2013-04-01

    Full Text Available Premise of the study: Pollination drops are a formative component in gymnosperm pollen-ovule interactions. Proteomics offers a direct method for the discovery of proteins associated with this early stage of sexual reproduction. Methods: Pollination drops were sampled from eight gymnosperm species: Chamaecyparis lawsoniana (Port Orford cedar, Ephedra monosperma, Ginkgo biloba, Juniperus oxycedrus (prickly juniper, Larix ×marschlinsii, Pseudotsuga menziesii (Douglas-fir, Taxus ×media, and Welwitschia mirabilis. Drops were collected by micropipette using techniques focused on preventing sample contamination. Drop proteins were separated using both gel and gel-free methods. Tandem mass spectrometric methods were used including a triple quadrupole and an Orbitrap. Results: Proteins are present in all pollination drops. Consistency in the protein complement over time was shown in L. ×marschlinsii. Representative mass spectra from W. mirabilis chitinase peptide and E. monosperma serine carboxypeptidase peptide demonstrated high quality results. We provide a summary of gymnosperm pollination drop proteins that have been discovered to date via proteomics. Discussion: Using proteomic methods, a dozen classes of proteins have been identified to date. Proteomics presents a way forward in deepening our understanding of the biological function of pollination drops.

  7. Cavity optomechanics in a levitated helium drop

    Science.gov (United States)

    Childress, L.; Schmidt, M. P.; Kashkanova, A. D.; Brown, C. D.; Harris, G. I.; Aiello, A.; Marquardt, F.; Harris, J. G. E.

    2017-12-01

    We describe a proposal for a type of optomechanical system based on a drop of liquid helium that is magnetically levitated in vacuum. In the proposed device, the drop would serve three roles: its optical whispering-gallery modes would provide the optical cavity, its surface vibrations would constitute the mechanical element, and evaporation of He atoms from its surface would provide continuous refrigeration. We analyze the feasibility of such a system in light of previous experimental demonstrations of its essential components: magnetic levitation of mm-scale and cm-scale drops of liquid He , evaporative cooling of He droplets in vacuum, and coupling to high-quality optical whispering-gallery modes in a wide range of liquids. We find that the combination of these features could result in a device that approaches the single-photon strong-coupling regime, due to the high optical quality factors attainable at low temperatures. Moreover, the system offers a unique opportunity to use optical techniques to study the motion of a superfluid that is freely levitating in vacuum (in the case of 4He). Alternatively, for a normal fluid drop of 3He, we propose to exploit the coupling between the drop's rotations and vibrations to perform quantum nondemolition measurements of angular momentum.

  8. Self-excited hydrothermal waves in evaporating sessile drops

    Science.gov (United States)

    Sefiane, K.; Moffat, J. R.; Matar, O. K.; Craster, R. V.

    2008-08-01

    Pattern formation driven by the spontaneous evaporation of sessile drops of methanol, ethanol, and FC-72 using infrared thermography is observed and, in certain cases, interpreted in terms of hydrothermal waves. Both methanol and ethanol drops exhibit thermal wave trains, whose wave number depends strongly on the liquid volatililty and substrate thermal conductivity. The FC-72 drops develop cellular structures whose size is proportional to the local thickness. Prior to this work, hydrothermal waves have been observed in the absence of evaporation in shallow liquid layers subjected to an imposed temperature gradient. In contrast, here both the temperature gradients and the drop thickness vary spatially and temporally and are a natural consequence of the evaporation process.

  9. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  10. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  11. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    Science.gov (United States)

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  12. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  13. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  14. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  15. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  16. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  17. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  18. Drop Impact on Textile Material: Effect of Fabric Properties

    Directory of Open Access Journals (Sweden)

    Romdhani Zouhaier

    2014-09-01

    Full Text Available This paper presents an experimental study of impact of water drop on a surface in a spreading regime with no splashing. Three surfaces were studied: virgin glass, coating film and woven cotton fabric at different construction parameters. All experiments were carried out using water drop with the same free fall high. Digidrop with high-resolution camera is used to measure the different parameters characterising this phenomenon. Results show an important effect of the height of the free fall on the drop profile and the spreading behaviour. An important drop deformation at the surface impact was observed. Then, fabric construction as the weft count deeply affects the drop impact. For plain weave, an increase of weft count causes a decrease in penetration and increase in the spreading rate. The same result was obtained for coated fabric. Therefore, the impact energy was modified and the drop shape was affected, which directly influenced the spreading rate.

  19. A study of fungi on droppings of certain birds

    Directory of Open Access Journals (Sweden)

    C. S. Singh

    2014-08-01

    Full Text Available Droppings of fowl, owl, parrot, pigeon and sparrow were asepticaly collected in sterilized bottles from different places at Gorakhpur, 54 fungi were isolated. The number of fungi was more in the pigeon showing considerable decrease in the fowl and the sparrow. In the parrot and the owl, however. the fungi were egual in number. The number of Phycomycetes was almost the same on droppings of all birds, from parrot only one species could be isolated. A larger number of Ascomyteces was recorded from fowl, less from pigeon and owl and the least (two each on sparrow and parrot droppings. The Basidiomycetes, represented by two species only, were recorded on owl and pigeon droppings. Pigeon droppings yielded the largest number of Deuteromycetes. They were egual in numbers on owl and parrot while on fowl and sparrow their number was comparatively less. Mycelia sterilia, though poor in their numbers, were recorded on all the bird droppings excepting owl.

  20. Afterlife of a Drop Impacting a Liquid Pool

    Science.gov (United States)

    Saha, Abhishek; Wei, Yanju; Tang, Xiaoyu; Law, Chung K.

    2017-11-01

    Drop impact on liquid pool is ubiquitous in industrial processes, such as inkjet printing and spray coating. While merging of drop with the impacted liquid surface is essential to facilitate the printing and coating processes, it is the afterlife of this merged drop and associated mixing which control the quality of the printed or coated surface. In this talk we will report an experimental study on the structural evolution of the merged droplet inside the liquid pool. First, we will analyze the depth of the crater created on the pool surface by the impacted drop for a range of impact inertia, and we will derive a scaling relation and the associated characteristic time-scale. Next, we will focus on the toroidal vortex formed by the moving drop inside the liquid pool and assess the characteristic time and length scales of the penetration process. The geometry of the vortex structure which qualitatively indicates the degree of mixedness will also be discussed. Finally, we will present the results from experiments with various viscosities to demonstrate the role of viscous dissipation on the geometry and structure formed by the drop. This work is supported by the Army Research Office and the Xerox Corporation.