974 resultados para 104-644
Resumo:
Experiments were carried out by the method of direct effect of the tested substance on increase of biomass (1,2). Daphnia magna was cultured under laboratory conditions.The author concludes that concentrations of aniline from 5000 to 0.1 mg/1 appear acutely lethal. The disturbance of feeding, reproduction, the disorganization of the nervous system, speak of the toxicity of the substance.
Resumo:
The high spin levels of a very neutron-rich Zr-104 nucleus have been reinvestigated by measuring the prompt. rays in the spontaneous fission of Cf-252. The ground-state band has been confirmed. A new sideband has been identified with a band-head energy at 1928.7 keV. The projected shell model is employed to investigate the band structure of Zr-104. The results of calculated levels are in good agreement with the experimental data, and suggest that the new band in Zr-104 may be based on the neutron nu 5/2(-)[532] circle times nu 3/2(+)[411] configuration.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.
Resumo:
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.