243 research outputs found

    ESA Gives a Hoot about the Owl: Forest Conservation Council v. Rosboro Lumber Co.

    Get PDF

    ESA Gives a Hoot about the Owl: Forest Conservation Council v. Rosboro Lumber Co.

    Get PDF

    Relapse primary central nervous system lymphoma successfully consolidated with allogeneic stem cell transplantation with thiotepa/busulfan/fludarabine conditioning

    Get PDF
    Primary central nervous system lymphoma (PCNSL) is generally characterized by a poor prognosis and frequent relapsing disease. Consolidation therapy in the upfront setting usually consists of an autologous stem cell transplantation. We report the case of a 19-year-old Caucasian male who had previously undergone an allogeneic stem cell transplantation with complete engraftment for the treatment of juvenile myelomonocytic leukemia when he was 1 year old. He presented with two episodes of (donor-derived) PCNSL from allogeneic stem cells; however, after induction chemotherapy, he failed to harvest stem cells for the consolidation with autologous stem cell transplantation. He was consolidated successfully with a second allogeneic stem cell transplantation with another donor after conditioning with thiotepa, busulfan, and fludarabine

    A Firewall Optimization for Threat-Resilient Micro-Segmentation in Power System Networks

    Full text link
    Electric power delivery relies on a communications backbone that must be secure. SCADA systems are essential to critical grid functions and include industrial control systems (ICS) protocols such as the Distributed Network Protocol-3 (DNP3). These protocols are vulnerable to cyber threats that power systems, as cyber-physical critical infrastructure, must be protected against. For this reason, the NERC Critical Infrastructure Protection standard CIP-005-5 specifies that an electronic system perimeter is needed, accomplished with firewalls. This paper presents how these electronic system perimeters can be optimally found and generated using a proposed meta-heuristic approach for optimal security zone formation for large-scale power systems. Then, to implement the optimal firewall rules in a large scale power system model, this work presents a prototype software tool that takes the optimization results and auto-configures the firewall nodes for different utilities in a cyber-physical testbed. Using this tool, firewall policies are configured for all the utilities and their substations within a synthetic 2000-bus model, assuming two different network topologies. Results generate the optimal electronic security perimeters to protect a power system's data flows and compare the number of firewalls, monetary cost, and risk alerts from path analysis.Comment: 12 pages, 22 figure

    Multi-Source Data Fusion for Cyberattack Detection in Power Systems

    Full text link
    Cyberattacks can cause a severe impact on power systems unless detected early. However, accurate and timely detection in critical infrastructure systems presents challenges, e.g., due to zero-day vulnerability exploitations and the cyber-physical nature of the system coupled with the need for high reliability and resilience of the physical system. Conventional rule-based and anomaly-based intrusion detection system (IDS) tools are insufficient for detecting zero-day cyber intrusions in the industrial control system (ICS) networks. Hence, in this work, we show that fusing information from multiple data sources can help identify cyber-induced incidents and reduce false positives. Specifically, we present how to recognize and address the barriers that can prevent the accurate use of multiple data sources for fusion-based detection. We perform multi-source data fusion for training IDS in a cyber-physical power system testbed where we collect cyber and physical side data from multiple sensors emulating real-world data sources that would be found in a utility and synthesizes these into features for algorithms to detect intrusions. Results are presented using the proposed data fusion application to infer False Data and Command injection-based Man-in- The-Middle (MiTM) attacks. Post collection, the data fusion application uses time-synchronized merge and extracts features followed by pre-processing such as imputation and encoding before training supervised, semi-supervised, and unsupervised learning models to evaluate the performance of the IDS. A major finding is the improvement of detection accuracy by fusion of features from cyber, security, and physical domains. Additionally, we observed the co-training technique performs at par with supervised learning methods when fed with our features

    Isotopic and velocity distributions of Bi produced in charge-pickup reactions of 208Pb at 1 A GeV

    Full text link
    Isotopically resolved cross sections and velocity distributions have been measured in charge-pickup reactions of 1 A GeV 208Pb with proton, deuterium and titanium target. The total and partial charge-pickup cross sections in the reactions 208Pb + 1H and 208Pb + 2H are measured to be the same in the limits of the error bars. A weak increase in the total charge-pickup cross section is seen in the reaction of 208Pb with the titanium target. The measured velocity distributions show different contributions - quasi-elastic scattering and Delta-resonance excitation - to the charge-pickup production. Data on total and partial charge-pickup cross sections from these three reactions are compared with other existing data and also with model calculations based on the coupling of different intra-nuclear cascade codes and an evaporation code.Comment: 20 pages, 12 figures, background information on http://www-w2k.gsi.de/kschmidt

    Fragmentation of Nuclei at Intermediate and High Energies in Modified Cascade Model

    Get PDF
    The process of nuclear multifragmentation has been implemented, together with evaporation and fission channels of the disintegration of excited remnants in nucleus-nucleus collisions using percolation theory and the intranuclear cascade model. Colliding nuclei are treated as face--centered--cubic lattices with nucleons occupying the nodes of the lattice. The site--bond percolation model is used. The code can be applied for calculation of the fragmentation of nuclei in spallation and multifragmentation reactions.Comment: 19 pages, 10 figure

    Predicting total reaction cross sections for nucleon-nucleus scattering

    Get PDF
    Nucleon total reaction and neutron total cross sections to 300 MeV for 12C and 208Pb, and for 65 MeV spanning the mass range, are predicted using coordinate space optical potentials formed by full folding of effective nucleon-nucleon interactions with realistic nuclear ground state densities. Good to excellent agreement is found with existing data.Comment: 10 pages, 4 figure
    • …
    corecore