918 resultados para collision attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The discovery of P/2010 A2 by the LINEAR survey in January 2010 revealed an object displaying a large trail of material similar in shape to a cometary tail although no central condensation or coma could be detected. The appearance of this object in an asteroidal orbit in the inner main belt attracted attention as a potential new member of the Main Belt Comets class (MBCs) but the discovery of a nucleus, with an estimated diameter of 120 m, around 1500 km away from the trail implied that the extended object we were seeing could be the debris trail from a recent collision rather than the tail of a comet. Due to the low inclination of its orbit, it is difficult to conclude about the nature of P/2010 A2 from Earth-based data only, as different scenarios lead to the same appearance in the orbital configuration at the times of observations. We present here another set of images, acquired from the unique viewing geometry provided by ESA's Rosetta spacecraft en route to comet 67P/Churyumov-Gerasimenko. Albeit faint (22 magnitude), the object could be observed by the high-resolution camera OSIRIS. We used a Finson-Probstein model to simulate the shape of the trail, and estimate the time of emission and β parameter (ratio between solar radiation pressure and gravity) for the dust grains. Simulations were compared to the OSIRIS images and ground based observations acquired at NTT and Palomar telescopes. Thanks to the different phase angle provided by Rosetta, we could reduce the number of solutions to a unique model, leading to the conclusive demonstration that the trail is due to a single event rather than a period of cometary activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The peculiar object P/2010A2 was discovered in January 2010 and given a cometary designation because of the presence of a trail of material, although there was no central condensation or coma. The appearance of this object, in an asteroidal orbit (small eccentricity and inclination) in the inner main asteroid belt attracted attention as a potential new member of the recently recognized class of main-belt comets. If confirmed, this new object would expand the range in heliocentric distance over which main-belt comets are found. Here we report observations of P/2010A2 by the Rosetta spacecraft. We conclude that the trail arose from a single event, rather than a period of cometary activity, in agreement with independent results. The trail is made up of relatively large particles of millimetre to centimetre size that remain close to the parent asteroid. The shape of the trail can be explained by an initial impact ejecting large clumps of debris that disintegrated and dispersed almost immediately. We determine that this was an asteroid collision that occurred around 10 February 2009.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper employs a unique decentralised cooperative control method to realise a formation-based collision avoidance strategy for a group of autonomous vehicles. In this approach, the vehicles' role in the formation and their alert and danger areas are first defined, and the formation-based intra-group and external collision avoidance methods are then proposed to translate the collision avoidance problem into the formation stability problem. The extension–decomposition–aggregation formation control method is next employed to stabilise the original and modified formations, whilst manoeuvring, and subsequently solve their collision avoidance problem indirectly. Simulation study verifies the feasibility and effectiveness of the intra-group and external collision avoidance strategy. It is demonstrated that both formation control and collision avoidance problems can be simultaneously solved if the stability of the expanded formation including external obstacles can be satisfied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The alkali activation of waste products has become a widespread topic of research, mainly due to environmental benefits. Portland cement and alkali-activated mortar samples were prepared to compare their resistance to silage effluent which contains lactic acid. The mechanism of attack on each sample has also been investigated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Petaflop architectures are currently being utilized efficiently to perform large scale computations in Atomic, Molecular and Optical Collisions. We solve the Schr\"odinger or Dirac equation for the appropriate collision problem using the R-matrix or R-matrix with pseudo-states approach. We briefly outline the parallel methodology used and implemented for the current suite of Breit-Pauli and DARC codes. In this report, various examples are shown from our theoretical results compared with experimental results obtained from Synchrotron Radiation facilities where the Cray architecture at HLRS is playing an integral part in our computational projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We review the development of the time-dependent close-coupling method to study atomic and molecular few body dynamics. Applications include electron and photon collisions with atoms, molecules, and their ions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective collision strengths for electron-impact excitation of the phosphorus-like ion Cl III are presented for all fine-structure transitions among the levels arising from the lowest 23 LS states. The collisional cross sections are computed in the multichannel close-coupling R-matrix approximation, where sophisticated configuration-interaction wave functions are used to represent the target states. The 23 LS states are formed from the basis configurations 3s23p3, 3s3p4, 3s23p23d, and 3s23p24s, and correspond to 49 fine-structure levels, leading to a total possible 1176 fine-structure transitions. The effective collision strengths, obtained by averaging the electron collision strengths over a Maxwellian distribution of electron velocities, are tabulated in this paper for all 1176 transitions and for electron temperatures in the ranges T(K)=7500-25,000 and log T(K)=4.4-5.4. The former range encompasses the temperatures of particular importance for application to gaseous nebulae, while the latter range is more applicable to the study of solar and laboratory-type plasmas. © 2001 Academic Press.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective collision strengths for the 10 astrophysically important fine-structure forbidden transitions among the 4So, 2Do and 2Po levels in the 3s23p3 configuration of Cl III are presented. The calculation employs the multichannel R-matrix method to compute the electron-impact excitation collision strengths in a close-coupling expansion, which incorporates the lowest 23 LS target eigenstates of Cl III. These states are formed from the 3s23p3, 3s3p4, 3s23p23d and 3s23p24s configurations. The Maxwellian-averaged effective collision strengths are presented graphically for all 10 fine-structure transitions over a wide range of electron temperatures appropriate for astrophysical applications [log T(K) = 3.3 - log T(K) = 5.9]. Comparisons are made with the earlier seven-state close-coupling calculation of Butler & Zeippen, and in general excellent agreement is found in the low-temperature region where a comparison is possible [log T(K) = 3.3 - log T(K) = 4.7]. However, discrepancies of up to 30 per cent are found to occur for the forbidden transitions which involve the 4So ground state level, particularly for the lowest temperatures considered. At the higher temperatures, the present data are the only reliable results currently available.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective collision strengths for electron-impact excitation of the N-like ion S x are calculated in the close-coupling approximation using the multichannel R-matrix method. Specific attention is given to the 10 astrophysically important fine-structure forbidden transitions among the 4SO, 2Do and 2Po levels in the 2s22p3 ground configuration. The total (e- + ion) wavefunction is expanded in terms of the 11 lowest LS eigenstates of S x, and each eigenstate is represented by extensive configuration-interaction wavefunctions. The collision strengths obtained are thermally averaged over a Maxwellian distribution of velocities, for all 10 fine-structure transitions, over the range of electron temperatures log T(K) = 4.6-6.7 (the range appropriate for astrophysical applications). The present effective collision strengths are the only results currently available for these fine-structure transition rates.