423 research outputs found

    Kinetic and Cyber

    Full text link
    We compare and contrast situation awareness in cyber warfare and in conventional, kinetic warfare. Situation awareness (SA) has a far longer history of study and applications in such areas as control of complex enterprises and in conventional warfare, than in cyber warfare. Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones. By exploring what is known about SA in conventional, also commonly referred to as kinetic, battles, we may gain insights and research directions relevant to cyber conflicts. We discuss the nature of SA in conventional (often called kinetic) conflict, review what is known about this kinetic SA (KSA), and then offer a comparison with what is currently understood regarding the cyber SA (CSA). We find that challenges and opportunities of KSA and CSA are similar or at least parallel in several important ways. With respect to similarities, in both kinetic and cyber worlds, SA strongly impacts the outcome of the mission. Also similarly, cognitive biases are found in both KSA and CSA. As an example of differences, KSA often relies on commonly accepted, widely used organizing representation - map of the physical terrain of the battlefield. No such common representation has emerged in CSA, yet.Comment: A version of this paper appeared as a book chapter in Cyber Defense and Situational Awareness, Springer, 2014. Prepared by US Government employees in their official duties; approved for public release, distribution unlimited. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. 29-4

    Is Phaseolus vulgaris Leucoagglutinin (PHA-L) a Useful Marker for Labeling Neural Grafts?

    Get PDF
    The lectin Phaseolus vulgaris leucoagglutinin (PHA-L) has come into wide use as an anterograde neuroanatomical tracer. The ability of this lectin to fill entire neurons and remain in place over long periods suggested it might be an ideal marker for donor cells to be grafted into hosts for long survival periods. We have used the lectin PHA-L to mark fetal rat olfactory bulb (OB) cells prior to grafting into host rat OBs. Hosts were sacrificed at various times up to 9 weeks after grafting, and tissue was immunohistochemically processed for PHA reactivity. After 2 and 4 weeks survival, sparse patterns of labeled cells were observed within the host OBs. However, after 9 weeks survival, few if any labeled cells were visible within host tissue. We conclude that PHA-L may be a less than satisfactory marker for fetal rat cells (other than astrocytes) which are to be identified in host tissue after a period of several weeks

    Temperature-dependent transport in a sixfold degenerate two-dimensional electron system on a H-Si(111) surface

    Full text link
    Low-field magnetotransport measurements on a high mobility (mu=110,000 cm^2/Vs) two-dimensional (2D) electron system on a H-terminated Si(111) surface reveal a sixfold valley degeneracy with a valley splitting <= 0.1 K. The zero-field resistivity rho_{xx} displays strong temperature dependence for 0.07 < T < 25 K as predicted for a system with high degeneracy and large mass. We present a method for using the low-field Hall coefficient to probe intervalley momentum transfer (valley drag). The relaxation rate is consistent with Fermi liquid theory, but a small residual drag as T->0 remains unexplained.Comment: 5 pages, 4 figures; revised and slightly shortened for publication

    Hidden diversity in Antarctica: Molecular and morphological evidence of two different species within one of the most conspicuous ascidian species

    Get PDF
    The Southern Ocean is one of the most isolated marine ecosystems, characterized by high levels of endemism, diversity, and biomass. Ascidians are among the dominant groups in Antarctic benthic assemblages; thus, recording the evolutionary patterns of this group is crucial to improve our current understanding of the assembly of this polar ocean. We studied the genetic variation within Cnemidocarpa verrucosa sensu lato, one of the most widely distributed abundant and studied ascidian species in Antarctica. Using a mitochondrial and a nuclear gene (COI and 18S), the phylogeography of fifteen populations distributed along the West Antarctic Peninsula and Burdwood Bank/MPA Namuncurá (South American shelf) was characterized, where the distribution of the genetic distance suggested the existence of, at least, two species within nominal C. verrucosa. When reevaluating morphological traits to distinguish between genetically defined species, the presence of a basal disk in one of the genotypes could be a diagnostic morphological trait to differentiate the species. These results are surprising due to the large research that has been carried out with the conspicuous C. verrucosa with no differentiation between species. Furthermore, it provides important tools to distinguish species in the field and laboratory. But also, these results give new insights into patterns of differentiation between closely related species that are distributed in sympatry, where the permeability of species boundaries still needs to be well understood.Fil: Ruiz, Micaela Belén. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Taverna, Anabela Jesús. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Servetto, Natalia. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Sahade, Ricardo Jose. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Instituto de Diversidad y Ecología Animal. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Instituto de Diversidad y Ecología Animal; Argentina. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas, Físicas y Naturales. Departamento de Diversidad Biológica y Ecológica; ArgentinaFil: Held, Christoph. Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung; Alemani

    Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

    Full text link
    Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our case -- a truck) traverses its route, in repeatable, systematic experiments. We model a truck equipped with an autonomous cyber-defense system and which also includes inherent physical resilience features. When attacked by malware, this ensemble of cyber-physical features (i.e., "bonware") strives to resist and recover from the performance degradation caused by the malware's attack. We propose parsimonious mathematical models to aid in quantifying systems' resilience to cyber attacks. Using the models, we identify quantitative characteristics obtainable from experimental data, and show that these characteristics can serve as useful quantitative measures of cyber resilience.Comment: arXiv admin note: text overlap with arXiv:2302.04413, arXiv:2302.0794

    An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

    Full text link
    The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Researchers and program managers need to be able to determine if the implementation of a resilience solution actually increases the resilience of the system. In previous work, a table top exercise was conducted using a notional heavy vehicle on a fictitious military mission while under a cyber attack. While this exercise provided some useful data, more and higher fidelity data is required to refine the measurement methodology. This paper details the efforts made to construct a cost-effective experimentation infrastructure to provide such data. It also presents a case study using some of the data generated by the infrastructure.Comment: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-86

    Fundamental Concepts of Cyber Resilience: Introduction and Overview

    Full text link
    Given the rapid evolution of threats to cyber systems, new management approaches are needed that address risk across all interdependent domains (i.e., physical, information, cognitive, and social) of cyber systems. Further, the traditional approach of hardening of cyber systems against identified threats has proven to be impossible. Therefore, in the same way that biological systems develop immunity as a way to respond to infections and other attacks, so too must cyber systems adapt to ever-changing threats that continue to attack vital system functions, and to bounce back from the effects of the attacks. Here, we explain the basic concepts of resilience in the context of systems, discuss related properties, and make business case of cyber resilience. We also offer a brief summary of ways to assess cyber resilience of a system, and approaches to improving cyber resilience.Comment: This is a preprint version of a chapter that appears in the book "Cyber Resilience of Systems and Networks," Springer 201
    corecore