3 research outputs found

    The identification of critical facilities from the position of cybersecurity violation by the example of energy

    Get PDF
    The article describes methods for identification of critical facilities, being a significant trend in researching critical infrastructures, particularly in the energy sector. The proposed methods are focused on the investigation of the energy object state in relation to the violation of cybersecurity of its information infrastructure. The cyber threats are believed to be important contemporary threats to energy security in Russia. The proposed methods formed the basis of development information-analytical system used for monitoring of cybersecurity violations in energy sector

    Resonant transmission of light through subwavelength holes in thick metal films

    Get PDF
    7 pages, 5 figures.In this paper, we study how extraordinary transmission through an array of holes in a metallic film appears as a function of the number of holes and their distribution. We have used a theoretical formalism able to analyze the optical properties of finite collections of apertures placed at arbitrary positions in a metallic film. First, we describe how the total transmission in a hexagonal two-dimensional hole array evolves as the number of holes in the array is increased. Second, we study the extraordinary transmission appearing in a single one-dimensional chain of holes. We find that the transmission through this structure is very sensitive to the incident polarization. Third, we show that a single hole flanked symmetrically by two finite chains of dimples can also present extraordinary transmission properties.This work was supported in part by the Spanish MCyT under Grant BES-2003-0374, Contract MAT2002-01534, and Contract MAT2002-00139, and in part by the European Commission (EC) under Project FP6-2002-IST-1-507879 and Project FP6-NMP4-CT-2003-505699.Peer reviewe
    corecore