Filters
Results 1 - 10 of 1077
Results 1 - 10 of 1077.
Search took: 0.055 seconds
Sort by: date | relevance |
Chen, Die; Xu, Maochao; Shi, Weidong, E-mail: mxu2@ilstu.edu2018
AbstractAbstract
[en] Highlights: • We consider an important mechanism of early warning for defending a cyber system that has become a key component of constructing network defense in practice. • The reliability function of a system under attack from one or multiple sources is derived. • We propose the optimal strategy for defending a cyber system with early warning components in the worst attack scenario. - Abstract: Due to the increasing reliance on networks, defending a cyber system is of vital importance. In this paper, we consider an important mechanism of early warning for defending a cyber system that has become a key component of constructing network defense in practice. We study the reliability of a system under attack from single or multiple sources. In particular, we discuss the effect of an early warning mechanism on the system reliability. We then propose the optimal strategy for defending a cyber system with early warning components in the worst attack scenario. The theoretical results are further validated by simulation evidence.
Primary Subject
Source
S0951-8320(17)30105-9; Available from http://dx.doi.org/10.1016/j.ress.2017.08.021; Copyright (c) 2017 Elsevier Science B.V., Amsterdam, The Netherlands, All rights reserved.; Country of input: International Atomic Energy Agency (IAEA)
Record Type
Journal Article
Journal
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] According to Ursel Lorenzen, former secretary to the Nato director responsible for theoretical war games, Nato headquarters, Brussels, the Nato alliance plans to make first use of atomic weapons in any conflict with the Soviet bloc. She made this statement at a specially called Press conference in East Berlin, after she had defected to the Russians following 11 years' duty in her sensitive Nato post. The author discusses this statement
Original Title
World war three
Primary Subject
Record Type
Journal Article
Journal
To the Point; v. 9(5); p. 8-11
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] This pastoral letter explains the criteria for distinguishing a just from an unjust war. It also contains a commentary on the conduct of war, including the use of nuclear weapons; and an assessment of the current US deterrence policy
Primary Subject
Source
Haley, P.E.; Merritt, J; 378 p; ISBN 0-8133-0749-X;
; 1988; p. 193-205; Westview Press Inc; Boulder, CO (United States); Westview Press Inc., 5500 Central Ave., Boulder, CO 80301 (United States)

Record Type
Book
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
Guo, Liang; He, Bingshun; Ma, Meihong; Chang, Qingrui; Li, Qing; Zhang, Ke; Hong, Yang, E-mail: guol@iwhr.com, E-mail: hebss@163.com, E-mail: mmhkl2007@163.com, E-mail: changqingrui@126.com, E-mail: kzhang@hhu.edu.cn, E-mail: hongyang@tsinghua.edu.cn2019
AbstractAbstract
[en] The original article needs the addition of another affiliation.
Primary Subject
Source
Copyright (c) 2019 Springer Nature B.V.; This record replaces 51108625; Country of input: International Atomic Energy Agency (IAEA)
Record Type
Journal Article
Journal
Natural Hazards; ISSN 0921-030X;
; v. 99(2); p. 1191

Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] The latest available import data from the US Department of Energy show greater US dependence on imported crude oil, a two percentage point increase in 1992 above 1991. In fact, the share of imported crude oil of the sum of the US crude production and imports has grown from less than one-third in 1986 to nearly 46% in 1992. A closer look at the data reveals that US crude oil dependence is become increasingly centered on a small number of countries. In 1992, more than 85% of crude oil imports originated in seven countries: Saudia Arabia, Nigeria, Venezuela, Canada, Mexico, Angola, and the United Kingdom. Many people worry that US import dependence is at dangerous levels. However, the recent trend of joint ventures between US companies and oil producers should allay those fears by providing oil producers an incentive for stable oil supply in the US
Primary Subject
Record Type
Journal Article
Journal
Energy Detente; CODEN EDETDB; v. 14(5); p. 1-16
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
Chen, Linfeng; Wang, Yi; Shi, Lulu; Zhao, Jingchan; Wang, Wenhuai, E-mail: wangyi1003@sina.com, E-mail: wangyi1003@xauat.edu.cn2019
AbstractAbstract
[en] This paper studied the inhibitory effect of pomegranate peel (PP) extract on the growth of Microcystis aeruginosa, the model of harmful algal blooms in aquatic environment. The allelochemicals were identified by HPLC–MS/MS from PP and tested by batch experiment through measurement of algal density, chlorophyll a (Chl-a) concentration, maximum quantum yield of photosystem II (Fv/Fm), superoxide dismutase (SOD), and malondialdehyde (MDA) contents. Results showed that both PP powder and PP extract had obvious inhibitory effect on M. aeruginosa growth. Quercetin and luteolin were identified as the allelochemicals to M. aeruginosa growth. However, the inhibitory capacity of luteolin was stronger than that of quercetin. The growth inhibition ratio of luteolin can reach up to 98.7 and 99.1% of the control on day 7 at the dosages of 7 and 10 mg/L, respectively. Moreover, the changes of Chl-a, Fv/Fm, SOD, and MDA in M. aeruginosa confirmed jointly that the allelochemicals cause inhibition of photosystem and oxidative damage to M. aeruginosa cells with the antioxidant defense system being activated, which leads to the aggravation of membrane lipid peroxidation. Thus, luteolin could be used as a promising algaecide for emergency handling of M. aeruginosa blooms. This study might provide a new direction in the management of eutrophication in the future.
Primary Subject
Source
Copyright (c) 2019 Springer-Verlag GmbH Germany, part of Springer Nature; Country of input: International Atomic Energy Agency (IAEA)
Record Type
Journal Article
Journal
Environmental Science and Pollution Research International; ISSN 0944-1344;
; v. 26(22); p. 22389-22399

Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] The authors take issue with the assessment that the advent of antisatellite weapons implies that the beneficial role of satellites in arms control, confidence building, and conflict resolution has been judged less important than their ability to support actual military operations. They argue that there is still an opportunity to negotiate a militarily significant and verifiable constraint on the growth of antisatellite technology that would be in the security interest of the US and the world as a whole. They base their opinion on an assessment of the roles of the existing military satellites and their vulnerability to antisatellite weapons and the probable impact of antisatellite weapons on various kinds of crisis and conflict. 10 figures, 1 table
Primary Subject
Record Type
Journal Article
Journal
Scientific American; ISSN 0036-8733;
; v. 250(6); p. 45-55

Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] Papers are presented on powder metallurgy in ordnance and other defense-related technologies
Primary Subject
Source
1978; 94 p; Metal Powder Industries Federation; Princeton, NJ; P/M in ordinance seminar; Aberdeen, MD, USA; 29 - 30 Sep 1977; CONF-7709161--; ISBN 0-918404-46-0; 

Record Type
Book
Literature Type
Conference
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] Nowadays, there are a lot of defense mechanisms to secure IT-systems against Cyber attacks. Thus, Cyber attacks have to be more sophisticated than they used to be in order to stay undetected as long as possible and to bypass defense mechanisms. As a result, current threats frequently use steganographic techniques to hide malicious functions in a harmless looking carrier. In [1] an attack for Siemens S7 Sirnatic Programmable Logic Controllers (PLCs) is presented, where the control logic of the PLC is modified while the source code which the PLC presents the engineering station is retained. As a result, the PLCs functionality is different from the control logic presented to the engineering station. Furthermore, steganographic techniques are frequently used to hide information in media files.
Primary Subject
Record Type
Journal Article
Journal
Atw. Internationale Zeitschrift fuer Kernenergie; ISSN 1431-5254;
; v. 65(10); p. 504-508

Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
AbstractAbstract
[en] At Physics Today's invitation, two physicists with opposing views on the proposed Strategic Arms Limitation Talks discuss the arguments for and against US approval
Primary Subject
Record Type
Journal Article
Journal
Physics Today; ISSN 0031-9228;
; v. 32(6); p. 32-38

Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
1 | 2 | 3 | Next |