423 research outputs found
Kinetic and Cyber
We compare and contrast situation awareness in cyber warfare and in
conventional, kinetic warfare. Situation awareness (SA) has a far longer
history of study and applications in such areas as control of complex
enterprises and in conventional warfare, than in cyber warfare. Far more is
known about the SA in conventional military conflicts, or adversarial
engagements, than in cyber ones. By exploring what is known about SA in
conventional, also commonly referred to as kinetic, battles, we may gain
insights and research directions relevant to cyber conflicts. We discuss the
nature of SA in conventional (often called kinetic) conflict, review what is
known about this kinetic SA (KSA), and then offer a comparison with what is
currently understood regarding the cyber SA (CSA). We find that challenges and
opportunities of KSA and CSA are similar or at least parallel in several
important ways. With respect to similarities, in both kinetic and cyber worlds,
SA strongly impacts the outcome of the mission. Also similarly, cognitive
biases are found in both KSA and CSA. As an example of differences, KSA often
relies on commonly accepted, widely used organizing representation - map of the
physical terrain of the battlefield. No such common representation has emerged
in CSA, yet.Comment: A version of this paper appeared as a book chapter in Cyber Defense
and Situational Awareness, Springer, 2014. Prepared by US Government
employees in their official duties; approved for public release, distribution
unlimited. Cyber Defense and Situational Awareness. Springer International
Publishing, 2014. 29-4
Is Phaseolus vulgaris Leucoagglutinin (PHA-L) a Useful Marker for Labeling Neural Grafts?
The lectin Phaseolus vulgaris leucoagglutinin
(PHA-L) has come into wide use as an anterograde
neuroanatomical tracer. The ability of this
lectin to fill entire neurons and remain in place
over long periods suggested it might be an ideal
marker for donor cells to be grafted into hosts
for long survival periods. We have used the lectin
PHA-L to mark fetal rat olfactory bulb (OB)
cells prior to grafting into host rat OBs. Hosts
were sacrificed at various times up to 9 weeks after
grafting, and tissue was immunohistochemically
processed for PHA reactivity. After 2 and 4
weeks survival, sparse patterns of labeled cells
were observed within the host OBs. However, after
9 weeks survival, few if any labeled cells were
visible within host tissue. We conclude that
PHA-L may be a less than satisfactory marker
for fetal rat cells (other than astrocytes) which
are to be identified in host tissue after a period of
several weeks
Temperature-dependent transport in a sixfold degenerate two-dimensional electron system on a H-Si(111) surface
Low-field magnetotransport measurements on a high mobility (mu=110,000
cm^2/Vs) two-dimensional (2D) electron system on a H-terminated Si(111) surface
reveal a sixfold valley degeneracy with a valley splitting <= 0.1 K. The
zero-field resistivity rho_{xx} displays strong temperature dependence for 0.07
< T < 25 K as predicted for a system with high degeneracy and large mass. We
present a method for using the low-field Hall coefficient to probe intervalley
momentum transfer (valley drag). The relaxation rate is consistent with Fermi
liquid theory, but a small residual drag as T->0 remains unexplained.Comment: 5 pages, 4 figures; revised and slightly shortened for publication
Hidden diversity in Antarctica: Molecular and morphological evidence of two different species within one of the most conspicuous ascidian species
The Southern Ocean is one of the most isolated marine ecosystems, characterized by high levels of endemism, diversity, and biomass. Ascidians are among the dominant groups in Antarctic benthic assemblages; thus, recording the evolutionary patterns of this group is crucial to improve our current understanding of the assembly of this polar ocean. We studied the genetic variation within Cnemidocarpa verrucosa sensu lato, one of the most widely distributed abundant and studied ascidian species in Antarctica. Using a mitochondrial and a nuclear gene (COI and 18S), the phylogeography of fifteen populations distributed along the West Antarctic Peninsula and Burdwood Bank/MPA Namuncurá (South American shelf) was characterized, where the distribution of the genetic distance suggested the existence of, at least, two species within nominal C. verrucosa. When reevaluating morphological traits to distinguish between genetically defined species, the presence of a basal disk in one of the genotypes could be a diagnostic morphological trait to differentiate the species. These results are surprising due to the large research that has been carried out with the conspicuous C. verrucosa with no differentiation between species. Furthermore, it provides important tools to distinguish species in the field and laboratory. But also, these results give new insights into patterns of differentiation between closely related species that are distributed in sympatry, where the permeability of species boundaries still needs to be well understood.Fil: Ruiz, Micaela Belén. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Taverna, Anabela Jesús. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Servetto, Natalia. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Sahade, Ricardo Jose. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Held, Christoph. Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung; Alemani
Quantitative Measurement of Cyber Resilience: Modeling and Experimentation
Cyber resilience is the ability of a system to resist and recover from a
cyber attack, thereby restoring the system's functionality. Effective design
and development of a cyber resilient system requires experimental methods and
tools for quantitative measuring of cyber resilience. This paper describes an
experimental method and test bed for obtaining resilience-relevant data as a
system (in our case -- a truck) traverses its route, in repeatable, systematic
experiments. We model a truck equipped with an autonomous cyber-defense system
and which also includes inherent physical resilience features. When attacked by
malware, this ensemble of cyber-physical features (i.e., "bonware") strives to
resist and recover from the performance degradation caused by the malware's
attack. We propose parsimonious mathematical models to aid in quantifying
systems' resilience to cyber attacks. Using the models, we identify
quantitative characteristics obtainable from experimental data, and show that
these characteristics can serve as useful quantitative measures of cyber
resilience.Comment: arXiv admin note: text overlap with arXiv:2302.04413,
arXiv:2302.0794
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
The vulnerability of cyber-physical systems to cyber attack is well known,
and the requirement to build cyber resilience into these systems has been
firmly established. The key challenge this paper addresses is that maturing
this discipline requires the development of techniques, tools, and processes
for objectively, rigorously, and quantitatively measuring the attributes of
cyber resilience. Researchers and program managers need to be able to determine
if the implementation of a resilience solution actually increases the
resilience of the system. In previous work, a table top exercise was conducted
using a notional heavy vehicle on a fictitious military mission while under a
cyber attack. While this exercise provided some useful data, more and higher
fidelity data is required to refine the measurement methodology. This paper
details the efforts made to construct a cost-effective experimentation
infrastructure to provide such data. It also presents a case study using some
of the data generated by the infrastructure.Comment: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-86
Fundamental Concepts of Cyber Resilience: Introduction and Overview
Given the rapid evolution of threats to cyber systems, new management
approaches are needed that address risk across all interdependent domains
(i.e., physical, information, cognitive, and social) of cyber systems. Further,
the traditional approach of hardening of cyber systems against identified
threats has proven to be impossible. Therefore, in the same way that biological
systems develop immunity as a way to respond to infections and other attacks,
so too must cyber systems adapt to ever-changing threats that continue to
attack vital system functions, and to bounce back from the effects of the
attacks. Here, we explain the basic concepts of resilience in the context of
systems, discuss related properties, and make business case of cyber
resilience. We also offer a brief summary of ways to assess cyber resilience of
a system, and approaches to improving cyber resilience.Comment: This is a preprint version of a chapter that appears in the book
"Cyber Resilience of Systems and Networks," Springer 201
- …