Effects of angle of incidence on proton-induced single-event latchup
Abstract not provided.
Abstract not provided.
Abstract not provided.
This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.
This report focuses on and presents the capabilities of insulator-based dielectrophoresis (iDEP) microdevices for the concentration and removal of water-borne bacteria, spores and inert particles. The dielectrophoretic behavior exhibited by the different particles of interest (both biological and inert) in each of these systems was observed to be a function of both the applied electric field and the characteristics of the particle, such as size, shape, and conductivity. The results obtained illustrate the potential of glass and polymer-based iDEP devices to act as a concentrator for a front-end device with significant homeland security and industrial applications for the threat analysis of bacteria, spores, and viruses. We observed that the polymeric devices exhibit the same iDEP behavior and efficacy in the field of use as their glass counterparts, but with the added benefit of being easily mass fabricated and developed in a variety of multi-scale formats that will allow for the realization of a truly high-throughput device. These results also demonstrate that the operating characteristics of the device can be tailored through the device fabrication technique utilized and the magnitude of the electric field gradient created within the insulating structures. We have developed systems capable of handling numerous flow rates and sample volume requirements, and have produced a deployable system suitable for use in any laboratory, industrial, or clinical setting.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Proposed for publication in Analytical Chemistry.
Abstract not provided.
International Journal of Electronics
Network intrusion detection systems (NIDS) are critical network security tools that help protect computer installations from malicious users. Traditional software-based NIDS architectures are becoming strained as network data rates increase and attacks intensify in volume and complexity. In recent years, researchers have proposed using FPGAs to perform the computationally-intensive components of intrusion detection analysis. In this work, we present a new NIDS architecture that integrates the network interface hardware and packet analysis hardware into a single FPGA chip. This integration enables a higher performance and more flexible NIDS platform. To demonstrate the benefits of this technique, we have implemented a complete and functional NIDS in a Xilinx Virtex II Pro FPGA that performs in-line packet analysis and filtering on multiple Gigabit Ethernet links using rules from the open-source Snort attack database. © 2006 Taylor & Francis Group, LLC.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Proposed for publication in Nature.
Abstract not provided.
Proposed for publication in Nature.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.