1,123 research outputs found

    Performance evaluation of the Boron Coated Straws detector with Geant4

    Get PDF
    The last decade has witnessed the development of several alternative neutron detector technologies, as a consequence of upcoming neutron sources and upgrades, as well the world-wide shortage of 3^3He. One branch of development is the family of 10^{10}B-based gaseous detectors. This work focuses on the boron coated straws (BCS) by Proportional Technologies Inc., a commercial solution designed for use in homeland security and neutron science. A detailed Geant4 simulation study of the BCS is presented, which investigates various aspects of the detector performance, e.g. efficiency, activation, absorption and the impact of scattering on the measured signal. The suitability of the BCS detector for Small Angle Neutron Scattering (SANS), direct chopper spectrometry and imaging is discussed.Comment: 50 pages, 37 figures, minor changes after review, results unchange

    Identifying and Detecting Attacks in Industrial Control Systems

    Get PDF
    The integrity of industrial control systems (ICS) found in utilities, oil and natural gas pipelines, manufacturing plants and transportation is critical to national wellbeing and security. Such systems depend on hundreds of field devices to manage and monitor a physical process. Previously, these devices were specific to ICS but they are now being replaced by general purpose computing technologies and, increasingly, these are being augmented with Internet of Things (IoT) nodes. Whilst there are benefits to this approach in terms of cost and flexibility, it has attracted a wider community of adversaries. These include those with significant domain knowledge, such as those responsible for attacks on Iran’s Nuclear Facilities, a Steel Mill in Germany, and Ukraine’s power grid; however, non specialist attackers are becoming increasingly interested in the physical damage it is possible to cause. At the same time, the approach increases the number and range of vulnerabilities to which ICS are subject; regrettably, conventional techniques for analysing such a large attack space are inadequate, a cause of major national concern. In this thesis we introduce a generalisable approach based on evolutionary multiobjective algorithms to assist in identifying vulnerabilities in complex heterogeneous ICS systems. This is both challenging and an area that is currently lacking research. Our approach has been to review the security of currently deployed ICS systems, and then to make use of an internationally recognised ICS simulation testbed for experiments, assuming that the attacking community largely lack specific ICS knowledge. Using the simulator, we identified vulnerabilities in individual components and then made use of these to generate attacks. A defence against these attacks in the form of novel intrusion detection systems were developed, based on a range of machine learning models. Finally, this was further subject to attacks created using the evolutionary multiobjective algorithms, demonstrating, for the first time, the feasibility of creating sophisticated attacks against a well-protected adversary using automated mechanisms

    Intergrating the Fruin LOS into the Multi-Objective Ant Colony System

    Get PDF
    Building evacuation simulation provides the planners and designers an opportunity to analyse the designs and plan a precise, scenario specific instruction for disaster times. Nevertheless, when disaster strikes, the unexpected may happen and many egress paths may get blocked or the conditions of evacuees may not let the execution of emergency plans go smoothly. During disaster times, effective route-finding methods can help efficient evacuation process, in which the directors are able to react to the sudden changes in the environment. This research tries to integrate the highly accepted human dynamics methods proposed by Fruin into the Ant-Colony optimisation route-finding method. The proposed method is designed as a multi-objective ant colony system, which tries to minimize the congestions in the bottlenecks during evacuations, in addition to the egress time, and total traversed time by evacuees. This method embodies the standard crowd dynamics method in the literature, which are Fruin LOS and pedestrian speed. The proposed method will be tested against a baseline method, that is shortest path, in terms of the objective functions, which are evacuation time and congestion degree. The results of the experiment show that a multi-objective ant colony system performance is able to reduce both egress time and congestion degree in an effective manner, however, the method efficiency drops when the evacuee population is small. The integration of Fruin LOS also produces more meaningful results, as the load responds to the Level of Service, rather than the density of the crowd, and the Level of Service is specifically designed for the sake of measuring the ease of crowd movement

    Modelling and Design of Resilient Networks under Challenges

    Get PDF
    Communication networks, in particular the Internet, face a variety of challenges that can disrupt our daily lives resulting in the loss of human lives and significant financial costs in the worst cases. We define challenges as external events that trigger faults that eventually result in service failures. Understanding these challenges accordingly is essential for improvement of the current networks and for designing Future Internet architectures. This dissertation presents a taxonomy of challenges that can help evaluate design choices for the current and Future Internet. Graph models to analyse critical infrastructures are examined and a multilevel graph model is developed to study interdependencies between different networks. Furthermore, graph-theoretic heuristic optimisation algorithms are developed. These heuristic algorithms add links to increase the resilience of networks in the least costly manner and they are computationally less expensive than an exhaustive search algorithm. The performance of networks under random failures, targeted attacks, and correlated area-based challenges are evaluated by the challenge simulation module that we developed. The GpENI Future Internet testbed is used to conduct experiments to evaluate the performance of the heuristic algorithms developed

    An Integrated Framework for the Methodological Assurance of Security and Privacy in the Development and Operation of MultiCloud Applications

    Get PDF
    x, 169 p.This Thesis studies research questions about how to design multiCloud applications taking into account security and privacy requirements to protect the system from potential risks and about how to decide which security and privacy protections to include in the system. In addition, solutions are needed to overcome the difficulties in assuring security and privacy properties defined at design time still hold all along the system life-cycle, from development to operation.In this Thesis an innovative DevOps integrated methodology and framework are presented, which help to rationalise and systematise security and privacy analyses in multiCloud to enable an informed decision-process for risk-cost balanced selection of the protections of the system components and the protections to request from Cloud Service Providers used. The focus of the work is on the Development phase of the analysis and creation of multiCloud applications.The main contributions of this Thesis for multiCloud applications are four: i) The integrated DevOps methodology for security and privacy assurance; and its integrating parts: ii) a security and privacy requirements modelling language, iii) a continuous risk assessment methodology and its complementary risk-based optimisation of defences, and iv) a Security and Privacy Service Level AgreementComposition method.The integrated DevOps methodology and its integrating Development methods have been validated in the case study of a real multiCloud application in the eHealth domain. The validation confirmed the feasibility and benefits of the solution with regards to the rationalisation and systematisation of security and privacy assurance in multiCloud systems

    Operational Research: Methods and Applications

    Get PDF
    Throughout its history, Operational Research has evolved to include a variety of methods, models and algorithms that have been applied to a diverse and wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first aims to summarise the up-to-date knowledge and provide an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion. It should be used as a point of reference or first-port-of-call for a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order. The authors dedicate this paper to the 2023 Turkey/Syria earthquake victims. We sincerely hope that advances in OR will play a role towards minimising the pain and suffering caused by this and future catastrophes
    • …
    corecore