960 resultados para 319.104


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The high spin levels of a very neutron-rich Zr-104 nucleus have been reinvestigated by measuring the prompt. rays in the spontaneous fission of Cf-252. The ground-state band has been confirmed. A new sideband has been identified with a band-head energy at 1928.7 keV. The projected shell model is employed to investigate the band structure of Zr-104. The results of calculated levels are in good agreement with the experimental data, and suggest that the new band in Zr-104 may be based on the neutron nu 5/2(-)[532] circle times nu 3/2(+)[411] configuration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La doctrina de la Proliferación teórica de Paul Karl Feyerabend ha sido interpretada por sus especialistas como un intento de salvaguardar el ideal del progreso científico. Aunque tales estudios hacen justicia, en parte, a la intencionalidad de nuestro filósofo no explicitan la crítica fundamental que implica para Feyerabend el pluralismo teórico. La proliferación teórica constituye en sí misma una reductio ad absurdum de los distintos intentos del positivismo lógico y del racionalismo crítico por definir la ciencia a expensas de lo metafísico. Este artículo presenta la proliferación teórica como una reivindicación del papel positivo que ocupa la metafísica en el quehacer científico. Se consigna la defensa que hace Feyerabend de la metafísica en cuanto que ésta constituye la posibilidad de superar el conservadurismo conceptual, aumentar de contenido empírico de la ciencia y recuperar el valor descriptivo de las teorías científicas.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.