115 resultados para Attack
Resumo:
In hypersonic flight, the prediction of aerodynamic heating and the construction of a proper thermal protection system (TPS) are significantly important. In this study, the method of a film cooling technique, which is already the state of the art in cooling of gas turbine engines, is proposed for a fully reusable and active TPS. Effectiveness of the film cooling scheme to reduce convective heating rates for a blunt-nosed spacecraft flying at Mach number 6.56 and 40 deg angle of attack is investigated numerically. The inflow boundary conditions used the standard values at an altitude of 30 km. The computational domain consists of infinite rows of film cooling holes on the bottom of a blunt-nosed slab. Laminar and several turbulent calculations have been performed and compared. The influence of blowing ratios on the film cooling effectiveness is investigated. The results exhibit that the film cooling technique could be an effective method for an active cooling of blunt-nosed bodies in hypersonic flows.
Resumo:
Efficiently exploring exponential-size architectural design spaces with many interacting parameters remains an open problem: the sheer number of experiments required renders detailed simulation intractable.We attack this via an automated approach that builds accurate predictive models. We simulate sampled points, using results to teach our models the function describing relationships among design parameters. The models can be queried and are very fast, enabling efficient design tradeoff discovery. We validate our approach via two uniprocessor sensitivity studies, predicting IPC with only 1–2% error. In an experimental study using the approach, training on 1% of a 250-K-point CMP design space allows our models to predict performance with only 4–5% error. Our predictive modeling combines well with techniques that reduce the time taken by each simulation experiment, achieving net time savings of three-four orders of magnitude.
Resumo:
The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:
• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.
• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.
• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.
Resumo:
The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.
Resumo:
PURPOSE: To report a case of malignant glaucoma after diode laser cyclophotocoagulation. METHOD: Case report. RESULTS: A 45-year-old man with uncontrolled secondary glaucoma in his right eye after corneoscleral graft and cataract extraction underwent diode laser cyclophotocoagulation. The right eye was aphakic, with an intact posterior capsule. Two weeks later, the patient presented with blurred vision, edematous cornea, and flat anterior chamber. The posterior capsule was touching the endothelium. Intraocular pressure was 20 mm Hg. Repeated Nd:YAG laser capsulotomy was effective in reversing the malignant glaucoma attack, and the anterior chamber deepened. CONCLUSION: Malignant glaucoma can occur after diode laser cyclophotocoagulation.
Resumo:
This article offers a sustained examination of how the vicissitudes of the Cold War shaped changing interpretations of the Spanish Civil War in Britain. Considering the perspectives of participants and historians, it focuses on the diverse strands of the Left that frequently drew on the civil war to attack each other and to make wider arguments about the global Cold War. First, with the aim of criticizing Communist take-overs in Eastern Europe in the late 1940s, the article analyzes retrospective assaults on Communist party tactics and Soviet foreign policy in Spain. Second, in order to argue that the Soviet Union took a counter-revolutionary line after 1956, it investigates the re-emergence of debates over the Spanish revolution. Third, to express disapproval of the United States, it examines the increasing use of the civil war as an analogy in Cold War international affairs from the 1960s. Fourth, in support of non-Soviet Left-of-Centre collaboration, most notably Eurocommunism in the 1970s and opposition to Margaret Thatcher’s Conservative government in the 1980s, it considers the renewed emphasis on the popular front. The trajectories of these debates reveal that, over time, the weight of the Left’s criticism moved from the Soviet Union towards the United States.
Resumo:
Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.
Resumo:
The GHMP kinases are a structurally related family of small molecule kinases named after four of its members - galactokinase, homoserine kinase, mevalonate kinase and phosphomevalonate kinase. The group also includes the enzymes N-acetylgalactosamine kinase, arabinose kinase, mevalonate 5-diphosphate decarboxylase, archeal shikimate kinase and 4-(cytidine 5'-diphospho)-2-c-methyl-D-erythritol kinase. In addition the group includes two members not known to be catalytically active, the Caenorhabditis elegans sex-fate determining protein XOL-1 and the Saccharomyces cerevisiae transcriptional activator Gal3p. Two catalytic mechanisms have been proposed for GHMP kinases. The structure of mevalonate kinase suggests that an aspartate residue acts as an active site base, removing a proton from the substrate to facilitate attack on the ? phosphate of MgATP. In contrast, in homoserine kinase there is no potential catalytic base and it is proposed that catalysis is driven by transition state stabilisation. Potential chemotherapeutic interventions against GHMP kinases fall into three main categories: inhibition of galactokinase to assist suffers of galactosemia, inhibition of mevalonate kinase or mevalonate 5-diphosphate decarboxylase to reduce flux through the cholesterol biosynthesis pathway and inhibition of bacterial GHMP kinases for novel anti-microbial therapies. These are in the early stages of development, but the accumulation of structural and mechanistic data will assist future progress.
Resumo:
In hypersonic flights, the prediction of aerodynamic heating and the construction of a proper thermal protection system (TPS) are significantly important. In this study, the method of a film cooling technique, which is already the state of the art in cooling gas turbine engine, is proposed for a fully reusable and active TPS. Effectiveness of the film cooling scheme to reduce convective heating rates for a blunt nosed spacecraft flying at Mach number 6.56 and 40 degree angle of attack is investigated numerically. The inflow boundary conditions used the standard values at an altitude of 30 km. Computational domain consists of infinite rows of film cooling holes on the bottom of a blunt-nosed slab. Laminar and several turbulent calculations have been performed and compared each other. The influence of blowing ratios on the film cooling effectiveness is investigated. The results exhibit that the film cooling technique could be an effective method for an active cooling of blunt-nosed bodies in hypersonic flows.
Resumo:
Positioned in relation to an emerging geographical interest into the effects of different atmospheric and observational conditions in shaping sensory engagements with the Earth's surfaces, this paper considers how a critical examination of the practices of camouflage can open up new dialogues into how the Earth's surfaces become known, are interacted with, and transformed in the conditions of darkness. With an empirical focus on the cultural and historical geographies of nocturnal camouflage practised during the Second World War, the paper examines the systematic attempts of civil camoufleurs to understand how natural and artificial landforms were visibly 'present' in the nocturnal landscape, despite darkness often being conceived as producing an environment of 'visual absence' through diminished sensory engagement. Furthermore, the paper highlights how the tensions between visual presence/absence that shape both the nocturnal experience and the 'knowing' of landscape can often be exploited for social, cultural, and political ends, in this case, to enable protection against aerial attack. © 2013 Pion and its Licensors.
Resumo:
In this study, the environmentally induced cracking behaviour of the NiTi weldment with and without post-weld heat-treatment (PWHT) in Hanks’ solution at 37.5 °C at OCP were studied by tensile and cyclic slow-strain-rate tests (SSRT), and compared with those tested in oil (an inert environment). Our previous results in the tensile and cyclic SSRT showed that the weldment without PWHT showed high susceptibility to the hydrogen cracking, as evidenced by the degradation of tensile and super-elastic properties when testing in Hanks' solution. The weldment after PWHT was much less susceptible to hydrogen attack in Hanks' solution as no obvious degradation in the tensile and super-elastic properties was observed, and only a very small amount of micro-cracks were found in the fracture surface. The susceptibility to hydrogen cracking of the NiTi weldment could be alleviated by applying PWHT at the optimized temperature of 350 °C after laser welding.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.
Resumo:
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.
Resumo:
We consider the problem of self-healing in reconfigurable networks e.g., peer-to-peer and wireless mesh networks. For such networks under repeated attack by an omniscient adversary, we propose a fully distributed algorithm, Xheal, that maintains good expansion and spectral properties of the network, while keeping the network connected. Moreover, Xheal does this while allowing only low stretch and degree increase per node. The algorithm heals global properties like expansion and stretch while only doing local changes and using only local information. We also provide bounds on the second smallest eigenvalue of the Laplacian which captures key properties such as mixing time, conductance, congestion in routing etc. Xheal has low amortized latency and bandwidth requirements. Our work improves over the self-healing algorithms Forgiving tree [PODC 2008] andForgiving graph [PODC 2009] in that we are able to give guarantees on degree and stretch, while at the same time preserving the expansion and spectral properties of the network.