6,001 research outputs found

    James Henry Faulkner (1861-1936)

    Get PDF

    ADOPTING IMMUNOLOGICAL METAPHORS IN CYBERSECURITY APPLICATIONS

    Get PDF
    The evolution of the computer virus remains constant, yet the metaphors used to explain the abstract ideas of computer science remain static. Previous cybersecurity research frames issues of security in physical security metaphors, using tangible ideas or icons, such as castles, to illustrate the need for defense-in-depth models for computer security. Research confirms that security techniques drawn from the castle metaphor serve to prevent infection by a previously identified variant of the virus, but those techniques are weak against novel strain or zero-day exploit. This thesis set out to answer the following question: What role can metaphors from emergent fields play in augmenting the dominant metaphors in cybersecurity applications? This research found metaphors provide limits for defenses and often carry assumptions about system design with them, allowing exploitation in unusual ways. When attacking computer systems designed around physical security models, malicious actors may take advantage of a system’s inherent weak points, and infection is inevitable in any networked system. Because complex attacks cannot be prevented by adopting ideas from a single metaphor or discipline of study, this thesis proposes reimagining cybersecurity threats through a wide variety of metaphorical lenses and adopting a plurality of defenses to augment physical security or defense-in-depth metaphors when addressing wicked problems in cybersecurity applications.Civilian, Department of Homeland SecurityApproved for public release. Distribution is unlimited

    Searching for Earth-mass planets around α\alpha Centauri: precise radial velocities from contaminated spectra

    Full text link
    This work is part of an ongoing project which aims to detect terrestrial planets in our neighbouring star system α\alpha Centauri using the Doppler method. Owing to the small angular separation between the two components of the α\alpha Cen AB binary system, the observations will to some extent be contaminated with light coming from the other star. We are accurately determining the amount of contamination for every observation by measuring the relative strengths of the H-α\alpha and NaD lines. Furthermore, we have developed a modified version of a well established Doppler code that is modelling the observations using two stellar templates simultaneously. With this method we can significantly reduce the scatter of the radial velocity measurements due to spectral cross-contamination and hence increase our chances of detecting the tiny signature caused by potential Earth-mass planets. After correcting for the contamination we achieve radial velocity precision of 2.5ms1\sim 2.5\,\mathrm{m\,s^{-1}} for a given night of observations. We have also applied this new Doppler code to four southern double-lined spectroscopic binary systems (HR159, HR913, HR7578, HD181958) and have successfully recovered radial velocities for both components simultaneously.Comment: accepted for publication in the International Journal of Astrobiology (published by Cambridge University Press); will appear in a revised form, subsequent to editorial input by Cambridge University Pres

    Characterization Test Report for the Mnemonics-UCS Wireless Surface Acoustic Wave Sensor System

    Get PDF
    The scope of this testing includes the Surface Acoustic Wave Sensor System delivered to KSC: two interrogator (transceiver) systems, four temperature sensors, with wooden mounting blocks, two antennas, two power supplies, network cables, and analysis software. Also included are a number of additional temperature sensors and newly-developed hydrogen sensor

    Teaching Spatial Data Analysis: A Case Study with Recommendations

    Get PDF
    Learning from data is a valuable skill for nonprofit professionals and researchers. Often, data have a spatial component, and data relevant to the nonprofit sector are no exception. Understanding spatial aspects of the nonprofit sector may provide immense value to social entrepreneurs, funders, and policy makers, by guiding programmatic decisions, facilitating resource allocation, and development policy. As a result, spatial thinking has become an essential component of critical thinking and decision making among nonprofit professionals. The goal of this case study is to support and encourage instruction of spatial data analysis and spatial thinking in nonprofit studies. The case study presents a local nonprofit data set, along with open data and code, to assist the instructors teaching spatial aspects of the nonprofit sector. Pedagogical approaches are discussed

    Exploring Niche Alteration in Nonprofit Organizations

    Get PDF
    The organizational niche is a concept integral to organizational ecology, reflecting an organization’s mission, expertise, capacity, and resource requirements. The choice of niche is crucial to the viability of the organization; however, the reasons organizations alter their niche are poorly understood. We hypothesize that nonprofit organizations alter their niche to reduce environmental pressure and gain access to resources. The results indicate that niche alteration predicts increases in total revenue with average increases in revenue from program services and contributions (depending on the measure). Additionally, nonprofits that are younger, larger, and have more concentrated revenue, are more likely to alter their niche
    corecore