5 resultados para Montmorency-Luxembourg
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
Surface water and deep and shallow groundwater samples were taken from selected parts of the Grand-Duchy of Luxembourg to determine the isotopic composition of nitrate and sulfate, in order to identify sources and/or processes affecting these solutes. Deep groundwater had sulfate concentrations between 20 and 40 mg/L, d34Ssulfate values between -3.0 and -20.0‰, and d18Osulfate values between +1.5 and +5.0‰; nitrate was characterized by concentrations varying between
Resumo:
This report concerns the provisions and practices on betting-related match fixing in sports
within the 28 Member States. Carried out in late 2013/early 2014, respondents in each Member
State reported on that state’s gambling-related provisions in respect of football and tennis and
(in each country) a third sport determined on the basis of either its popularity (in terms of
participation or television viewing) or the existence of betting-related “scandals” in that sport
within that particular jurisdiction. Those reports helped the authors to compare the Member
States’ regulatory and self-regulatory frameworks relating to risk assessment and conflict of
interest management, with a view to indicating areas of best practice, identifying particularly
good legislative frameworks and highlighting areas where change was either desirable or
necessary. While some individual Member States have legislation which might provide
templates that others could adapt for their own use, the authors were not convinced that “more
law”, whether at the national or European level, was desirable. Rather, more effective
cooperation among the stakeholders was identified as being more likely to provide tangible
benefits than would new legal frameworks.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.